Documente Academic
Documente Profesional
Documente Cultură
MS.Net Project
NETWORKING
MOBILE COMPUTING
MULTIMEDIA
IMAGE PROCESSING
Others
• HARD DISK : 40 GB
• MOUSE : Logitech.
• RAM : 256 MB
Software Requirements
Intermittently connected mobile networks are wireless networks where most of the
time there does not exist a complete path from the source to the destination. There
are many real networks that follow this model, for example, wildlife tracking sensor
networks, military networks, vehicular ad hoc networks, etc. In this context,
conventional routing schemes fail, because they try to establish complete end-to-end
paths, before any data is sent. To deal with such networks researchers have
suggested to use flooding-based routing schemes. While flooding-based schemes
have a high probability of delivery, they waste a lot of energy and suffer from severe
contention which can significantly degradetheir performance. Furthermore, proposed
efforts to reduce the overhead of flooding-based schemes have often been plagued
by large delays. With this in mind, we introduce a new family of routing schemes
that “spray” a few message copies into the network, and then route each copy
independently towards the destination. We show that, if carefully designed, spray
routing not only performs significantly fewer transmissions per message, but also
has lower average delivery delays than existing schemes;furthermore, it is highly
scalable and retains good performance under a large range of scenarios. Finally, we
use our theoretical framework proposed in our 2004paper to analyze the
performance of spray routing. We also use this theory to show how to choose the
number of copies to be sprayed and how to optimally distribute these copies to
relays.
EXISTING SYSTEM
Whenever it encounters another node, the two nodes exchange all messages
that they don’t have in common.
Firstman Software Solution
The nodes, which received the message copy, now acts as source and
distributes message copies to all nodes with in its transmission, range.
Single-copy schemes generate and route only one copy per message (in
contrast to flooding schemes that essentially send a copy to every node), in
order to significantly reduce the number of transmissions.
PROPOSED SYSTEM
Spray and Wait bounds the total number of copies and transmissions per
message without compromising performance.
Under low load, Spray and Wait results in much fewer transmissions and comparable
or smaller delays than flooding-based schemes.
• Under high load, it yields significantly better delays and fewer transmissions
than flooding-based schemes.
• For every message originating at a source node, L message copies are initially
spread – forwarded by the source and possibly other nodes receiving a copy –
to L distinct “relays”.
WAIT PHASE
If the destination is not found in the spraying phase, each of the L nodes
carrying a message copy performs direct transmission (i.e. will forward the
message only to its destination.
Processor : Pentium-III
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : KeyBoard, Monitor , Mouse
Abstract:
Under the assumption that all channels have the same transmission rate but possibly
different time-invariant error rates, we derive the probability generating function of
the resequencing buffer occupancy and the probability mass function of the
resequencing delay. Then, by assuming the Gilbert–Elliott model for each channel,
we extend our analysis to time-varying channels.
Through examples, we compute the probability mass functions of
the resequencing buffer occupancy and the resequencing delay for
Firstman Software Solution
time-invariant channels. We analyze trends in the mean resequencing buffer
occupancy and the mean resequencing delay as functions of system parameters.
Gilbert–Elliott Model.
Algorithm Description:
Very simple mode: channel states
1. Good state: signal above “threshold”, BER is virtually Zero
2. Poor state: “signal outage”, BER s ½, reciver falls out of sync, etc.
Markov model approach.
1. Memory less transistions.
2. Exponential distribution sojoum time.
Existing System:
An analytical approach for analyzing the mean % packet delay and mean queue
length at the transmitting terminal in % wireless packet networks using the selective
repeat (SR) automatic % repeat request (ARQ) scheme to control the errors
introduced by the % non-stationary transmission channel. Each transmitting terminal
is % modeled as a discrete time queue with an infinite buffer. The% non-stationary
transmission channel is modeled as a two-state Markov % chain. Comparisons of
numerical predictions and simulation results are % presented to highlight the
accuracy of the proposed analytical approach
Proposed System:
Hardware Requirements:
Firstman Software Solution
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 256 Mb.
Software Requirements:
The main technique that we introduce in this paper is the use of simple
lightweight cryptographic constraints on forwarding entries. We show that it is
possible to prevent a large class of attacks on end-hosts and bound the flooding
attacks that can be launched on the infrastructure nodes to a small constant value.
INTRODUCTION:
Sevral recent proposals have argued for giving third parties and end-
users control over routing in the network infrastructure. Some examples of such
routing architectures include TRIAD , NIRA , DataRouter , and Network Pointers.
While exposing control over routing to third parties departs from conventional
network architecture, these proposals have shown that such control significantly
increases the flexibility and extensibility of these networks. Using such control, hosts
can achieve many functions that are difficult to achieve in the Internet today.
Examples of such functions include mobility, multicast, content routing, and service
composition. Another somewhat surprising application is that such control can be
used by hosts to protect themselves from packet-level denial-of-service (DoS)
attacks, since, at the extreme, these hosts can remove the forwarding state that
malicious hosts use to forward packets to the hosts. While each of these specific
Firstman Software Solution
functions can be achieved using a specific mechanism—for example, mobile IP allows
host mobility—we believe that these forwarding infrastructures (FIs) provide
architectural simplicity and uniformity in providing several functions that makes them
worth exploring.
Source routing or allowing users to insert a forwarding state in
the infra structure and . Allowing forwarding entries enables functions like mobility
and multicast that are hard to achieve using source-routing alone. While there seems
to be a general agreement over the potential benefits of user-controlled routing
architectures, the security vulnerabilities that they introduce has been one of the
important
concerns that has been not addressed fully. The flexibility that the FIs provide allows
malicious entities to attack both the FI as well as hosts connected to the FI. For
instance, consider , which is an indirection-based FI that allows hosts to insert
forwarding entries of the form , so that all packets addressed to are forwarded to .
An attacker can eavesdrop
or subvert the traffic directed to a victim by inserting a forwarding entry ; the
attacker can eavesdrop even when it does not have access to the physical links
carrying the victim’s
traffic. Alternatively, consider an FI that provides multicast; an attacker can use such
an FI to amplify a flooding attack by replicating a packet several times and directing
all of the replicas to a victim. These vulnerabilities should come as no surprise; in
general,
the greater the flexibility of the infrastructure, the harder it is to make it secure .
Module:
We use the following module to achieve the user controlled routing. The
modules are as follows.
Login Module
Assigning Rule
Securing File
Sending the file
Receiving File
Login module:
In this each and every user will sign in, and if he is a new user they he will
sign up to perform the operation.
Assigning module:
Firstman Software Solution
In this the user will select the rule and those rules are unique to the user. And
then in each and every rule the user can have as many systems as they need. And
with this info we will allow the user to send the file.
Securing file:
If the user has to send the file which is confidential then we will use the
cryptography to secure it. In this we will have the encryption key and decryption
key.This key is unique and available only to the user and also the receiver.
Securing file:
If the user has to send the file which is confidential then we will use the
cryptography to secure it. In this we will have the encryption key and decryption
key.This key is unique and available only to the user and also the receiver.
Sending File:
In this module we are going to use the technique to send the files. Now the
user chooses a particular rule. After choosing the rule he starts sending the file. The
file moves through the route which is provided by the rule.
Receiving File:
In this module the receiver receives the file. The file which is sent by
encrypting is decrypted in the receiver. This makes only the authorized receiver to
get file in the proper format.
INPUT/OUTPUT:
The user allots the rule for each server. He encrypts the file he chooses and
chooses the rule of the particular server. Then he starts sending the file.
After sending the file it finds the particular path provided by the rule and reaches
the server through that path. After reaching the destination the file gets decrypted
by
Hardware Requirements:
PROCESSOR : PENTIUM IV 2.6 GHz
RAM :512 MB DD RAM
MONITOR :15” COLOR
HARD DISK :40 GB
FLOPPY DRIVE :1.44 MB
CDDRIVE :LG 52X
Firstman Software Solution
KEYBOARD :STANDARD 102 KEYS
MOUSE :3 BUTTONS
Software Requirements:
FRONT END : V.S.NET 2005
OPERATING SYSTEM : Window’s XP
BACK END : SQL SERVER 2000
Abstract:
Algorithm Description:
Existing System:
The problem of link and route stability has been widely addressed in the literature.
Routing protocols accounting for route stability while selecting the source-destination
path can be found , just to name a few. In particular, the work in considers nodes
moving along nonrandom patterns and exploits some knowledge of the nodes motion
to predict the path duration. Studies on link and path availability and duration are
presented. A partially deterministic and a Brownian motion, where nodes start
moving from the same location, are considered.
Proposed System:
We focus on the stability of a routing path, which is subject to link failures caused by
node mobility. We define the path duration as the time interval from when the route
is established until one of the links along the route becomes unavailable, while we
say that a path is available at a given time instant t when all links along the path are
active at time t. Then, our objective is to derive the probability of path duration till
time t and the probability of path availability at time t.
Hardware Requirements:
Software Requirements:
Abstract
Network overload is one of the key challenges in wireless LANs (WLANs). This
goal is typically achieved when the load of access points (APs) is balanced. Recent
rectify such overload, several load balancing schemes have been proposed. These
methods are commonly require proprietary software or hardware at the user side for
controlling the user-AP association. In this paper we present a new load balancing
method by controlling the size of WLAN cells (i.e., AP’s coverage range), which is
conceptually similar to cell breathing in cellular networks. This method does not
require any modification to the users neither the IEEE 802.11 standard. It only
requires the ability of dynamically changing the transmission power of the AP beacon
messages. We develop a set of polynomial time algorithms that find the optimal
beacon power settings which minimize the load of the most congested AP. We also
show that the performance of the proposed method is comparable with or superior to
Existing System
Cell breathing has been studied mostly in the context of CDMA cellular
networks. The coverage and capacity of a CDMA cell are inversely related with each
other .The increase of the number of active users in a cell causes the increase of the
total interference sensed at the base station. Therefore, in congested cells, users
need to transmit with higher power to maintain a certain signal-to-interference ratio
at the receiving base station. As the users in a congested cell increase their
transmission power, they also increase their interference to the neighboring cells
since all cells use the same frequency in CDMA networks. As a result, the overall
network capacity may decrease. Furthermore, since the maximal transmission power
of the users is bounded, the users who are far from the base station may experience
poor services. To overcome these problems, the cell breathing approach was
proposed. In essence, they reduce the size of congested cells.
Proposed System
we address the problem of minimizing the load of the congested APs. Let us
call the AP with the maximal load as congested APs and its load as congestion load.
We designed two polynomial time algorithms that find optimal solutions, one for the
complete knowledge model and the other for the limited knowledge model. These
results are intriguing, because similar load balancing problems are known to be
strong NP-hard. It is particularly interesting that a polynomial time optimal algorithm
exists for the limited knowledge model. Second, we address the problem of min-max
load balancing. This is a strong NP-hard problem. In , it is proved that there exists
no algorithm that guarantees any coordinate wise approximation ratio, and the
approximation ratio of any prefix-sum approximation algorithm is at least nlogn ,
Firstman Software Solution
where n is the number of APs. In this paper, we solve a variant of this min-max
problem, termed min-max priority load balancing, whose optimal solution can be
calculated in polynomial time for both knowledge models. Here, the AP load is
defined as an ordered pair of the aggregated load contributions of its associated
users and a unique AP priority.
Requirements Specification
Hardware Requirements
2 HARD DISK : 40 GB
5 MOUSE : Logitech.
6 RAM : 256 MB
Software Requirements
Abstract:
Hardware Requirements:
Software Requirements:
Module:
We have the following module to prove the effective resource allocation. They
are as follows.
• Add nodes
• Resource allocation
• Source and Destination
• Lagrangean path
Add nodes:
In this module we provide number of nodes we required in the network. Once
our requirement is provided group of nodes get arranged in each cell randomly. Each
cell accesses the nodes according to its capability.
Resource allocation:
The resource allocation will find the nearest tower to the mobile. Then we will
find the nearest tower to that. The main advantage of finding this is to use the
available bandwidth. And by this way we will connect the mobile to the nearest
tower. And by this way we will maintain good band width usage.
Lagrangean path:
In this module we divide the problem into two sub problems. With the help of
first sub problem we find the method of accessing the nearest cell. With the help of
second sub problem the consumption of bandwidth is found. Finally the Lagrangean
iteration process provides the shortest path to access the mobile.
Hardware Requirements
• SYSTEM : Pentium IV 2.4 GHz
• HARD DISK : 40 GB
• FLOPPY DRIVE : 1.44 MB
• MONITOR : 15 VGA colour
• MOUSE : Logitech.
• RAM : 256 MB
• KEYBOARD : 110 keys enhanced.
Software Requirements
• Operating system :- Windows XP Professional
• Front End :- Microsoft Visual Studio .Net 2005
• Coding Language : - vb.net 2005.
ABSTRACT
Firstman Software Solution
A data distributor has given sensitive data to a set of supposedly trusted
agents (third parties). Some of the data is leaked and found in an unauthorized place
(e.g., on the web or somebody’s laptop). The distributor must assess the likelihood
that the leaked data came from one or more agents, as opposed to having been
independently gathered by other means. We propose data allocation strategies
(across the agents) that improve the probability of identifying leakages. These
methods do not rely on alterations of the released data (e.g., watermarks). In some
cases we can also inject “realistic but fake” data records to further improve our
chances of detecting leakage and identifying the guilty party.
OBJECTIVE
• A data distributor has given sensitive data to a set of supposedly trusted
• Some of the data is leaked and found in an unauthorized place (e.g., on the
• The distributor must assess the likelihood that the leaked data came from one
means.
• We propose data allocation strategies (across the agents) that improve the
watermarks). In some cases we can also inject “realistic but fake” data
• Our goal is to detect when the distributor’s sensitive data has been leaked by
agents, and if possible to identify the agent that leaked the data.
Firstman Software Solution
EXISTING SYSTEM
• Watermarks can be very useful in some cases, but again, involve some
modification of the original data.
PROPOSED SYSTEM
• After giving a set of objects to agents, the distributor discovers some of those
• If the distributor sees “enough evidence” that an agent leaked data, he may
• Finally, we also consider the option of adding “fake” objects to the distributed
• If it turns out an agent was given one or more fake objects that were leaked,
then the distributor can be more confident that agent was guilty.
Hardware Requirements
• SYSTEM : Pentium IV 2.4 GHz
• HARD DISK : 40 GB
• FLOPPY DRIVE : 1.44 MB
• MONITOR : 15 VGA colour
• MOUSE : Logitech.
• RAM : 256 MB
• KEYBOARD : 110 keys enhanced.
Software Requirements
• Operating system :- Windows XP Professional
• Front End :- Microsoft Visual Studio .Net 2005
• Coding Language :- C#
Firstman Software Solution
• Database :- SQL SERVER 2000
1. User Detail
2. Posting Question
3. Posing Answer
4. Calculate Rating
ABSTRACT
Active learning and training is a particularly effective form of education. In
various domains, skills are equally important to knowledge. We present an
automated learning and skills training system for a database programming
Firstman Software Solution
environment that promotes procedural knowledge acquisition and skills training. The
system provides meaningful knowledge-level feedback such as correction of student
solutions and personalized guidance through recommendations. Specifically, we
address automated synchronous feedback and recommendations based on
personalized performance assessment. At the core of the tutoring system is a
pattern-based error classification and correction component that analyzes student
input in order to provide immediate feedback and in order to diagnose student
weaknesses and suggest further study material. A syntax-driven approach based on
grammars and syntax trees provides the solution for a semantic analysis technique.
Syntax tree abstractions and comparison techniques based on equivalence rules and
pattern matching are specific approaches.
EXISTING SYSTEM:
• In Existing system learning and training is a manual system.
PROPOSED SYSTEM:
• In our project we are using artificial intelligence as a main constraint.
• We present an automated learning and skills training system for a database
programming environment that promotes procedural knowledge acquisition
and skills training.
• This system provides meaningful knowledge-level feedback such as correction
of student solutions and personalized guidance through recommendations.
User User
Verification of
syntax, errors, Verification of syntax,
queries are done errors, queries are done
manually by artificial intelligence.
Analysis done
manually
Semantic and syntax
analysis technique
SYSTEM SPECIFICATION
HARDWARE CONFIGURATION
• Hard disk : 40 GB
• RAM : 512mb
• Processor : Pentium IV
• Monitor : 17’’Color Monitor
Firstman Software Solution
SOFTWARE CONFIGURATION
Front-End : VS .NET 2005
Coding Language : VB
Operating System : Windows XP.
Back End : SQLSERVER 2005
MODULES :
1) Image as input
2) Watermark embedding
3) Authenticator Watermark
4) Swap Embedding
5) Watermarked Image
MODULE DESCRIPTION :
1)Image as input :
We give image as input ,process an image in 2x2 pixel blocks. This allows flexibility
in tracking the edges and also achieves high computational complexity. The two
processing cases that flipping the candidates of one does not affect the flippability
conditions of another are employed for orthogonal embedding .
2)Watermark embedding :
watermarking is a technology for embedding various types of information in
digital content. In general, information for protecting copyrights and proving the
Firstman Software Solution
validity of data is embedded as a watermark. Watermarked content can prove its
origin, thereby protecting the data.
3)Authenticator Watermark :
In this module we encrypt the data embedded image.The purpose of
authenticator watermark of a block is invariant in the watermark embedding
process, hence the watermark can be extracted without referring to the original
image .The encryption and decryption technices used in this module.
4)Swap Embedding :
We flipp an edge pixel in binary images is equivalent to shifting the edge
location horizontally one pixel and vertically one pixel. A horizontal edge exists if
there is a transition between two neighboring pixels vertically and a vertical edge
exists if there is a transition between two neighboring pixels horizontally. We swap
an morphological images.
5)Watermarked image
The watermarked image is obtained by computing the inverse for the main
processing block to reconstruct its candidate pixels.use this module we going to see
the original watermarked image.
SYSTEM SPECIFICATION
HARDWARE CONFIGURATION
• Hard disk : 40 GB
• RAM : 512mb
• Processor : Pentium IV
• Monitor : 17’’Color Monitor
SOFTWARE CONFIGURATION
Front-End : VS .NET 2005
Coding Language : C#.Net
Operating System : Windows XP.
Back End : SQLSERVER 2005
Abstract
The structured light vision system is a successfully used for the measurement
of 3D surface in vision. There is some limitation in the above scheme, that is tens of
picture are captured to recover a 3D sense. This paper presents an idea for real-time
Acquisition of 3-D surface data by a specially coded vision system. To achieve 3-D
measurement for a dynamic scene, the data acquisition must be performed with only
a single image. A principle of uniquely color-encoded pattern projection is proposed
Firstman Software Solution
to design a color matrix for improving the reconstruction efficiency. The matrix is
produced by a special code sequence and a number of state transitions. A color
projector is controlled by a computer to generate the desired color patterns in the
scene. The unique indexing of the light codes is crucial here for color projection since
it is essential that each light grid be uniquely identified by incorporating local
neighborhoods so that 3-D reconstruction can be performed with only local analysis
of a single image. A scheme is presented to describe such a vision processing
method for fast 3-D data acquisition. Practical experimental performance is provided
to analyze the efficiency of the proposed methods.
Existing System:
Proposed System:
In case of the proposed system we over come the problem in the existing
system. And also we propose a structured pattern in order to manage the image
from a computer.
We are getting the image in a matrix, converting to grayscale. Using encoded
pattern project, we getting the combination of image from the matrix and adding
new pixel colors according to the encoded one, with out using any similar images.
With our method, filtering with multiple S.E.s can be performed by a single operator
for a slightly reduced computational cost per size or shape, which makes this method
more suitable for use in granulometries, dilation-erosion scale spaces, and template
matching using the hit-or-miss transform. The discussion focuses on erosions and
dilations, from which other transformations can be derived.
3.1 HARDWARE SPECIFICATION:
Processor : Pentium-III
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : KeyBoard, Monitor , Mouse
Introduction:
Modules:
1) RGB Projection
2) Image Utility
3) Comparable Image
4) Similarity Images
5) Result
3.1 HARDWARE SPECIFICATION:
Processor : Pentium-III
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : KeyBoard, Monitor , Mouse
Processor : Pentium-III
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : KeyBoard, Monitor , Mouse
HARDWARE SPECIFICATION:
Processor : Pentium-III
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : KeyBoard, Monitor , Mouse
SOFTWARE SPECIFICATION:
HARDWARE REQUIREMENTS –
• Hard disk : 40 GB
• RAM : 512 MB
• Processor Speed : 3.00GHz
• Processor : Pentium IV Processor
SOFTWARE REQUIREMENTS –
• Front End : VS .NET 2008
• Code Behind : C#.net
• Back End : SQL SERVER 2005
1.ABSTRACT:
Description:
Modules:
o Terminal Handling
o File Searching
Firstman Software Solution
o Change Privileges
o System Configuration
Terminal Handling: This module is designed to handle the remote computer
situated at different place like how to connect the remote module, the different ways
of connecting the remote system and resolving the problems thtat are raised when
handling the remote systems.
File Searching: In this module, file in the remote systems are searched.
Change privileges: This module grants the privileges to remote system like
up to what level remote systems can access the files.
System Configuration: This module configure and saves the settings of remote
connections.
Processor : Pentium IV
RAM : 512MB
HD space : 40GB
The Windows clipboard is a convenient tool you can use to copy or move
information from one place to another. To use clipboard, simply select the text,
image, or other item you want to copy or move to another place. After the screen is
captured, it is copied to the clipboard. Then, the same screen is selected from the
clipboard and pasted on the administrator’s desktop. In this way, the administrator
can view the desktop screen of the remote client without informing him.
Firstman Software Solution
This process is repeated according to the administrator’s given interval.
The administrator can store the remote client’s desktop screen if he/she required. He
can either send some alert to the remote client system as warning for their illegal
works or he can even inform about a message as alert to the remote client. The
administrator can either send a group or individual alert to the clients.
When the administrator finds the client performing an illegal action, then
he wants the client by sending him a message. After some time, if he still sees the
client continuing that illegal task, the administrator will look the desktop of the
client. Later the desktop can be unlocked on request from the client.
MODULES:
2. Send Message
Modules Description:
SYSTEM REQUIREMENTS
Software Requirements:
IDE : C#.Net
MODULES INFORMATION:
Administrator module:
Staff module:
Parent module:
Student module:
SMS and E-Mail:
Software Requirements:
Software required for development of the proposed website are:
a. Operating System: Windows 2000 or above with .NET Framework
2005 installed
Firstman Software Solution
b. Database Support: Microsoft’s SQL Server 2000 or above
c. Language used : ASP.Net with C# coding.
Hardware Requirements:
A PC with the following configuration would suffice:
a. Processor : Pentium III or above
b. RAM : 256 MB or above
c. Hard Disk : 80 GB or above (usage 10GB)
5.Abstract: Placements
context. The original usage derives from political economy and economics, where it
was traditionally called labor, one of four factors of production. The more common
usage within corporations and business refers to the individuals within the firm, and
to the portion of the firm’s organization that delay with hiring, firing, training, and
other
Personnel issues.
the organization’s human capital and minimize financial risk. It is the responsibility of
human resource managers to conduct these activities in an effective, legal, fair, and
online.
• Hiring Processes(recruitment)
• Promotions
Firstman Software Solution
• Redundancy
3. 3. SYSTEM ENVIRONMENT
Admin module
The admin can search a particular file or document by just specifying its id, subject,
format, description etc. the transaction process is simplified.
Staff module
• Updation/modifications of documents
The staff will perform actiond based on the admin permission.the staff will allowed to
modify the documents existed in the application.Limited permissions given by the
admin to staff.
User module
• Login.
With successful login he can access the site and use the features. User permissions
are also based on the admin.
Document module
Search module
Based on the admin the searching process will taken place .with specified login the
staff and user can access the search page of this site.
The proposed sytem is more advanced and efficient than the existing system as it is
built with the latest Microsoft technologies .The main objective is to enhance security
and provide a smooth, easy and automated transaction and search facilities to the
users.
The SMS Utility is the best way to develop business or services quickly and easily.
While other advertising mediums such as television, radio, and the Internet present
performance challenges, mobile messaging presents’ performance opportunities.
This is system allows the user to send free SMS all over the world with limited
character that is decided by the administrator. Because, remaining space will the
occupied by the advertiser of the SMS. Therefore users are less likely to be
distracted or involved with other tasks as opposed to television, radio, and the
Internet, etc., where multitasking is so common. Our system is a one of the best tool
to fulfill this task. In our system users can register their details. After registration of
user they can compose their messages to send SMS through users. This system can
search the composed messages to the current date and sends to the users.
Firstman Software Solution
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : ASP.NET(C#.NET)
Database : Sql Server 2K
With Mobile 3 Party Tool
Main Objective
M o d ule ex p la na t io n :
Fo rm r eg istr a t io n
Gr o up Det a ils
N ew Bullet in
Quer y Tr a nsa ct io n
T r ansactio n o f que r y bve tw e e n use r and bulle tin , and r e spo nse
back to the user ar e car r ie d by the mo dule the tr ansactio n is car r ie d
o ut o nline to the admini str ato r w her e by the te chnical is che cke d and
co rr e ct re spo nse w o uld se nt back to the re spe ctive user as we ll as to
the new bulle tin .
Hardware Specification :
SOFTWARE SPECIFICATION
SERVER
Web Server : Internet Information Server4.0
Frame work : .NET framework
Database : Access
Server Side Script : Asp.Net
CLIENT
Desktop Operating System : Windows 98
Web Browser : Internet Explorer5.0
Client Side Script : Html / Vb Script
SOFTWARE DESCRIPTION
OPERATING SYSTEM
The main objective of this proposed system is to online all the activities of
a bank. The system is like to enable the bank employees to open accounts for
their customers with ease and to add the details, to transfer amount from one
account to another account and doing all the activities related to loan, making all
type of transactions. Using the system employees can also generate different
types of modules.
Firstman Software Solution
• Issue Loans
• Issue DD’s
Using the system client can also generate different type of modules.
Cache : 512 KB
Hard disk : 16 GB hard disk recommended for primary
partition.
2.4.4 SOFTWARE SPECIFICATIONS
Software:
Operating system : Windows XP or later
INTRODUCTION TO PROJECT
Introduction to Modules
• Admin
o Home
• User
o Home
• Home
o Roadways.
Reservation
View Bus Details
o Railways
Reservation
View Train Details
o Airways.
Reservation
View Airbus Details
Admin
Firstman Software Solution
Admin is the one who is going to monitor all the information about the
Reservation and details of the Transportation. This module contains all the details of
the user like when it was created and what all the transactions done by the user,
detailed information of the user can be accessed or can be manipulated by the
administrator. Admin can manipulate the details of the Transactions; Admin can
enter with Unique Login and Password.
User
User can access all the information about the details of the particular
Transportation. He can enter into the home page and view the details and as well as
make the reservation with photo identification. Any time he can have the complete
information.
Home
In this module user can get the details of different transport modes:
• Roadways
User can go to “View bus details” sub module and get all the information
about the timings and departure date of the particular bus. If he wants to make the
reservation he can enter into Reservation sub module.
• Railways
User can go to “View Train details” sub module and get all the information
about the timings and departure date of the particular Train If he wants to make the
reservation he can enter into Reservation sub module.
• Airways
User can go to “View Airbus details” sub module and get all the
information about the timings and departure date of the particular Airbus. If he
wants to make the reservation he can enter into Reservation sub module.
SYSTEM ANALYSIS
General requirements
Hardware Requirements
Cache : 512 KB
Software Requirements
ABSTRACT
Firstman Software Solution
Mobile communication has seen a manifold increase in the various types
of services provided through it during the past decade. The objective of the online
examination service is to provide a greater reach for conducting mock examinations.
ABSTRACT
Software Requirements:
MWorld
The Mobile advertiser is the best way to develop business or services quickly and
easily. While other advertising mediums such as television, radio, and the Internet
present performance challenges, mobile advertising presents performance
opportunities.
Mobile users view their mobile content in downtime while at home, traveling, in a
meeting, or waiting for an appointment. Therefore users are less likely to be
distracted or involved with other tasks as opposed to television, radio, and the
Internet, etc., where multitasking is so common. So companies are interested to give
advertisements to mobile. Our system is a one of the best tool to fulfill this task. In
our system companies & users can register their details. After registration of
company they can compose their advertisements to send message to the users on a
particular date. This system can search the composed messages to the current date
and sends to the users. If user receives messages then user can earn money from
the Mobile Advertiser. Advertiser can send composed messages to the users group
simultaneously and this project can allow users & company registrations by their
mobile.
Modules:
Access information:
Administrator, User, Companies agent
1. Requirements:
• Hardware requirements:
Number Description
1 PC with 2 GB hard-disk
and 256 MB RAM
• Software requirements:
Number Description
1 Windows 2000/ XP/ or
Higher with MS-office
2. MS-SQL
server2000/2005
3. Ms-Visual Studio .Net
2005
4. Ms-Internet Explorer
ABSTRACT
Human faces can be identified with different biometric features, which are genetic
properties of a human being. If the biometric features can be extracted from facial
image then they can be used for face recognition. Robust face recognition system
has potential application in the area of surveillance and physical security. An attempt
is being made to implement “facial feature extraction” with a new technique
developed by us, for extraction of the facial features in facial feature extraction.
It consists of a new technique for extracting facial feature of candidates from
the frontal view of a face has been explored. For detection of correct features, a
confidence measure has been applied for all combinations of features candidates
obtained from an edge-map of the image.
In this work a method is proposed to extract the feature points of the face
automatically. It provides a feasible way to locate the positions of the mouth, nose
and the two eyebrows from face image. This approach would help to extract useful
Firstman Software Solution
features on human face automatically and improve the accuracy of face recognition.
The experiments show that the method presented in this paper could locate the
three feature points from faces exactly and quickly.
This system is used to compare human faces with a simplest way to
compare at system start up. It can find the color features of the human beings.
MODULE INFORMATION:
Administration
User
Compare Faces
SCOPE OF PROJECT:
The project titled as “VDCA” is mainly developed for the Visakhaptnam Development
Cricket Association, which maintains all the different details about the tournament
that takes place in their stadium.
Firstman Software Solution
The VDCA conducts different matches of both Division A and B leagues. It has to
maintain all the details such as tournaments, matches, players, batting and bowling
analysis of all the players who played on that ground.
The VDCA have approached us and are asking to develop a software which will
provide them all the above mentioned details easily without having to search them
extensively.
They also want us to do an exclusive advertisement through the site, with all profiles
of players, and complete details of the clubs successes.
Pentium – IV Processor
256 MB RAM
100 MB Hard Disk Space
Ethernet Card with an Internet and Internet zone
16 Abstract: PGP
Description:
While originally used primarily for encrypting the contents of email messages and
attachments from a desktop client, PGP products have been diversified since 2002
into a set of encryption applications which can be managed by an optional central
policy server. PGP encryption applications include email and attachments, digital
signatures, laptop full disk encryption, file and folder security, protection for IM
sessions, batch file transfer encryption, and protection for files and folders stored on
network servers.
The PGP Desktop 9.x application includes desktop email, digital signatures, IM
security, laptop whole disk encryption, file and folder security, self decrypting
Firstman Software Solution
archives, and secure shredding of deleted files. Capabilities are licensed in different
ways depending on features required.
With PGP Desktop 9.0 managed by PGP Universal Server 2.0, released in 2005,
all PGP encryption applications are based on a new proxy-based architecture. These
newer versions of PGP software eliminate the use of email plug-ins and insulate the
user from changes to other desktop applications. All desktop and server operations
are now based on security policies and operate in an automated fashion. The PGP
Universal server automates the creation, management, and expiration of keys
esharing these keys among all PGP encryption applications.
New versions of PGP applications use both OpenPGP and the S/MIME, allowing
communications with any user of a NIST specified standard.
Encryption/decryption.
PGP message encryption uses asymmetric key encryption algorithms that use
the public portion of a recipient's linked key pair, a public key, and a private key. The
sender uses the recipient's public key to encrypt a shared key (aka a secret key or
conventional key) for a symmetric cipher algorithm. That key is used, finally, to
encrypt the plaintext of a message. Many PGP users' public keys are available to all
from the many PGP key servers around the world which act as mirror sites for each
other.
The recipient of a PGP encrypted email message decrypts it using the session
key for a symmetric algorithm. That session key is included in the message in
encrypted form and was itself decrypted using the recipient's private key. Use of two
ciphers in this way is sensible because of the very considerable difference in
operating speed between asymmetric key and symmetric key ciphers (the
differences are often 1000+ times). This operation is completely automated in
current PGP desktop client products.
Digital signatures:
A similar strategy is used to detect whether a message has been altered since
it was completed, and whether it was actually sent by the person/entity claimed to
Firstman Software Solution
be the sender. It is used by default in conjunction with encryption, but can be
applied to plaintext as well. The sender uses PGP encryption to create a digital
signature for the message with either the RSA or DSA signature algorithms. To do
so, PGP products compute a hash (also called a message digest) from the plaintext,
and then creates the digital signature from that hash using the sender's private key.
The message recipient uses the sender's public key and the digital
signature to recover the original message digest. He compares this message
digest with the message digest he computed himself from the (recovered)
plaintext. If the signature matches the received plaintext's message digest,
it must be presumed (to a very high degree of confidence) that the message
received has not been tampered with, either deliberately or accidentally,
since it was properly signed
SOFTWARE SPECIFICATIONS:
ABSTRACT
Software Specifications
ABSTRACT
Thief Detection is motion detection software that monitors our home, office,
or any premise. The system records action triggered by motion or noise as it
Firstman Software Solution
happens. we can view activities monitored by our camera from anywhere with an
Internet connection.
CAPTURING IMAGES
COMPARING IMAGES
CAPTURING IMAGES :
COMPARING IMAGES:
The best one for motion detection application is assume that we have an
original image called current frame (image) a grayscale copy of it (current frame)
and previous video frame also a gray scaled (background frame). By comparing the
current frame and the background frame and if it finds any difference between the
current frame and background frame then the system will send immediate email
notification with a photo directly to mailbox
After the comparison of the current frame and the background frame if the
difference is found in it then it will send a mail by using the Simple Message Transfer
Protocol. We can retrieve the mails periodically by using Internet message protocol.
S/W Requirements:
H/W Requirements:
20.ABSTRACT
PROJECT TITLE: INSTITUTE ADMINISTRATION SYSTEM
DESCRIPTION:
Now a days computer institutions facing problems with manual data entry.
Its difficult to generate customized reports like institute daily, monthly and yearly
collection, course dues, fee dues, admission., enquiry, installments, batches,
expenses, salaries, leaves of staff etc., IAS is a best system to fulfill these issues.
IAS maintains the staff details and defines their authority to use this system. By their
authority we can give the accessing permissions. Administrator has all permissions to
add/change/delete/report master details of the data, Other than admin can access
data up to their self. Counselor has permissions to enter enquiry details of students
with follow-up details.
Firstman Software Solution
IAS generates the customized reports like staff salaries, leaves, batches,
student enquiry, admission, installments, collection (daily, monthly and yearly),
material, expenses reports and so on. IAS can also generate summery reports for
the past years.
S/W Requirements:
Operating System : Windows XP/2000 Professional
Database Support : MSSQL Server 2000
IDE : VB.NET
Web Server : IIS Server
H/W Requirements:
Processor : Pentium III or Above
Ram : 256MB or Above
Hard Disk : 4GB or Above
INTRODUCTION
Introduction:
It is a web application engaged in real estate marketing for better and complete
solution for visitors where buyers, sellers and brokers can exchange information
easily, quickly, effectively and inexpensively.
Aim/Objective:
The aim of this web application is to provide in-depth information on buying, selling
and renting out properties.
Purpose:
The purpose of the project is to provide an ideal medium for independent owners,
real estate agents and builders to advertise their listings on the Internet and for
potential buyers to search for properties in a private, hassle free environment.
At this site one can advertise a property, search for a property, and browse through
properties and visit other Indian and International sites.
Scope:
It is an internet domain engaged in real estate marketing for better and complete
solutions for visitors where buyers, sellers and brokers can exchange information
easily, quickly, effectively and inexpensively.
• HARDWARE REQUIREMENTS:
• SOFTWARE REQUIREMENTS:
24.ABSTARCT: AUCTION
ABSTRACT
The title of this project is “Auction”.The main objective of this project is to make the
process of auction so that the sellers can sell their products by just placing their
products details on the internet and get them sold.
This project has been implemented using asp.net and vb.net .For
storing data, this system uses the MS access database
CLIENT SIDE SPECIFICATIONS:
• Keeping track of the diagnosis patients records also costlier and time
consuming and not secured.
• The doctor don’t know how many appointment's he has for that day
.
• Patients can see all the doctor’s who are existing for the concerned disease.
• Patients can register and take the appointment of their concerned doctor’s on
on-line.
• The doctor can see the appointments with out concerning the admin.
• The record’s of the patient are maintained in the system.
Modules
Administrator module
Doctor’s module
Patient module
Software Requirements
IDE : VS.NET (ASP. net & C#)
Backend : MSSQL
Web server : IIS
(Internet information service)
Hardware Requirements
Processor :P IV
Hard disk :80GB
RAM :512MB
This project is intended to develop a tool called Packet Sniffer. The Packet
Sniffer allows the computer to examine and analyze all the traffic passing by its
network connection. It decodes the network traffic and makes sense of it.
The output is appended into normal text file, so that the network
administrator can understand the network traffic and later analyze it.
SOFTWARE SPECIFICATIONS:
HARDWARE SPECIFICATIONS:
This project is entitled COMPUTER SPARES SALES SYSTEM for the office
executives using Dot Net with MS-SQL Database. To provide a quick & faster service.
The system is also developed with full security to prevent unauthorized access
of the system. The project maintains all the reports can be generated on daily,
monthly and yearly basis. The project has been developed using DOT NET as Front-
Hardware Specification
GHZ)
Hard disk 80 GB
Software Specification
ABSTRACT
This project is entitled CAR SPARES SALES SYSTEM for the office
executives using Dot Net with MS-SQL Database. To provide a quick & faster
service.
Firstman Software Solution
The project is concerned with computerization of Distributors Details, Enquire
The system is also developed with full security to prevent unauthorized access
of the system. The project maintains all the reports can be generated on daily,
monthly and yearly basis. The project has been developed using DOT NET as Front-
Hardware Specification
GHZ)
Hard disk 80 GB
Software Specification
Firstman Software Solution
Operating System WINDOWS XP
29.ABSTARCT : CRYTOGRAPHY
ABSTRACT
This project is designed for transmitting the message and data via network
(LAN/Remote) in a safe and secure manner. The project is mainly divided in to two
modules. The first module describes the DES algorithm using, which the message is
encrypted first and it can be decrypted using the same algorithm. The second
module describes the AES algorithm, which is used for creating the Digital Signatures
of the message. This module is mainly used for authentication purpose. All these two
algorithms are integrated for a safe transmission of the message via the network.
The same concept is embedded in network using the concept of socket
programming. The usage of Socket Programming is that it is used for identifying the
Destination using the port number, which is used for identifying a system on the
network.
This project which is a chatting application, needs two systems which are to
be connected in the network by using of the cross cable. So, we provide security for
the data by connecting the systems in the network.
SOFTWARE REQUIREMENTS
HARDWARE CONSIDERATIONS
TITLE: E-LEARNING
MODULES:
• Administarator
• Training
• Examination
•Results
S/W Requirements:
ABSTRACT
Air force security using Thumb checker has a facility to check valid passport
holders from the available fingerprints, if the fingerprint is not found then it shows an
alert message to the air force security. If found then search for the behavior of the
passport holder. If holder behavior is not good then it will play emergency alarm.
Reasons to take fingerprints:
For over 100 years, police agencies have had a powerful tool in
combating crime. The use of fingerprinting allows crime fighters an extremely
accurate means of identification. Other means of identification (such as hair color or
style, weight or eye color) may change, but fingerprints do not.
In earlier civilizations, branding, tattooing, or even maiming was used to
mark and identify criminals. Although man had been aware of the fact that each
person possessed a unique set of ridges on the fingers and hands, the use of these
prints for criminal identification was not accepted until the early 1900s.
The FBI identification division was born in 1924, with the receipt of
810,188 fingerprints files, mostly from Leavenworth Penitentiary. This collection
became increasingly important due to the emergence of criminals who regularly
crossed state lines.
Currently, the FBI possesses over 250 million sets of fingerprint records.
This enormous collection is composed of both criminal and civil prints. The civil file
includes the prints of both government employees and applicants for federal jobs.
All standard fingerprint cards are eight-inch square pieces of paper, with
a thickness much like that of thin cardboard. At the present time, the FBI receives
over 34,000 fingerprint cards each workday. The photograph to the right is an
example of a standard FBI fingerprint card.
Firstman Software Solution
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
INTRODUCTION TO PROJECT
The Objective of this system is to illustrate the use of Online satellite Forecast.
IMSDP is used to provide the Satellite Reports.
The intent of IMSDP is to provide a complete source of Satellite
Information. This is intended to satisfy the needs of common people and it can be a
tool for the casual user as well. The graphics and data are displayed, as a
meteorologist would expect to see.
In this IMSDP application we can have the detailed explanation pages to
guide them through the various images for the novice user.
Introduction to Modules
• Admin
• Visitors
• Forums
Admin
Admin is the one who is going to maintain all the information related to Weather.
Admin can have the information related to the user like what, all the entire
Firstman Software Solution
transactions user is doing. This application provides such option to the admin to
keep track of entire information related to the Temperature as well as the
information about the users.
Visitors
Visitors can enter into the module and view the information about the
weather condition time to time anywhere in India in detail.
Forums
The purpose of having the forums in this system is anyone can express
their views for having the better environment. They can discuss or present their
views on their government policies regarding the environment and suggestions are
accepted.
Hardware Requirements
Cache : 512 KB
Software Requirements
1. SYNOPSIS
This project is intended to develop a tool called Network Monitoring Tool. The
Network Monitoring Tool allows the computer to examine and analyze all the traffic
passing by its network connection. It decodes the network traffic and makes sense of
it.
The output is appended into normal text file, so that the network
administrator can understand the network traffic and later analyze it.
SOFTWARE SPECIFICATIONS:
35.ABSTARCT : WMI
ABSTRACT
Description:
(WMI) in my last article 'My Explorer'. I will show how to access operating system
Firstman Software Solution
information, services, and processes running on your machine as well as on a remote
machine on your network, provided you have administration rights to them. Also I
will show you how to start and stop services, terminate processes, and create new
In this WMI application, I have created a WMIControlLibrary which contains four user
controls. The four user controls are as follows: Explorer, SystemInfo, Services, and
Processes. Each one of these controls does its own specific task.
system.
system.
(* Note: This control can be used to monitor local or remote system on the network.)
Every one of these controls uses the System.Management namespace to access their
HARDWARE REQUIREMENTS:
Processor : Pentium IV
HDD : 40GB or Above
RAM : 512 / Above
SOFTWARE REQUIREMENTS:
ABSTRACT
Now a days it’s very important to estimate project before development. Therefore,
we need a good experienced project analyst. If the project analyst does wrong
estimation then entire project estimation cost will be effected. Generally it depends
on system analysis and design. So, we need to have a tool which get all the
necessary information from the project analyst and generate size, effort, schedule
and cost of the system.
The proposed system is responsible for getting all the details of classes, object,
events, functions, modules, actors and so on and will helps us to get the size of the
project. This will get all the details of staff and their capability about project
development to generate effort and schedule of the project and it can get all the
details of infrastructure, computers, royalty, rent, expenses, traveling details and
generate cost of the project.
Project estimation is one of the most challenging and important activities in the
development of a project. It is one of the corner stones of effective project planning.
So the proposed system is a simple but effective tool that acquires all the necessary
information from the project analyst and generates size,effort,schedule and cost of a
project.
TASK OVERVIEW
Size estimation .
– First need to estimate the size of the program to be build.
Determining development effort.
– Need accurate size estimates to determine effort.
Scheduling the work.
– With size and effort estimates, schedule is easy.
Computing project costs.
-Project cost estimate defines the budget.
HARDWARE REQUIRMENTS:
Processor : Pentium IV HDD : 40GB or
Above
RAM : 512 / Above
SOFTWARE REQUIRMENTS:
ABSTRACT
Firstman Software Solution
Description:
Now a day’s College attendance managing is too difficult to handle. That’s purpose
according to our project we can use finger print device to handle this type of
complicated issues. Here we can place some fingerprint while enter into the
classroom, whenever we give the fingerprint, attendance will be automatically
updated both for student and also for lecturer
Attendance:
Attendance section plays different roles for Students and Employees. Student's
attendance details act as a tool to identify irregularities in the academic interests of
the students. The same can be used to assess the student and give individual
attention to the causes of repetitive or long absences.
Time Table :
Only on one-time input of the basic information about the allocation of subjects to
the teacher, Teacher to the classes and no of lectures for each subject to each class;
the system intelligently generates the most probable combination of the timetable
and allocation of the timetable for the session.
With computerized assistance, the time table can be modified by the time table in-
charge person to suit more specific needs of the school as well as the staff while the
computer will keep on prompting about the clashes and suggest possible resolution.
The whole painful task of timetable preparation will be turned into a playful task.
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Abstract:
The hide a message, open a bitmap file, then enter a password or select a key file.
The key file can be any file, another bitmap for example. This password or key will
be treated as a stream of bytes specifying the space between two changed pixels. I
don't recommend text files, because they may result in a quite regular noise pattern.
The longer your key file or password is, the less regular the noise will appear.
Next step, enter the secret message or choose a file, and click the Hide button. The
application writes the length of the message in bytes into the first pixel. After that it
reads a byte from the message, reads another byte from the key, and calculates the
coordinates of the pixel to use for the message-byte. It increments or resets the
index) with the message-byte, and repeats the procedure with the next byte of the
message. At last, the new bitmap is displayed. Save the bitmap by clicking the Save
button. If the grayscale flag is set, all components of the color are changed.
To extract a hidden message from a bitmap, open the bitmap file and specify the
password or key you used when hiding the message. Then choose a file to store the
extracted message in (or leave the field blank, if you only want to view hidden
Unicode text), and click the Extract button. The application steps through the pattern
specified by the key and extracts the bytes from the pixels. At last, it stores the
extracted stream in the file and tries to display the message. Don't bother about the
character chaos, if your message is not a Unicode text. The data in the file will be all
right. This works with every kind of data, you can even hide a small bitmap inside a
Firstman Software Solution
larger bitmap. If you are really paranoid, you can encrypt your files with PGP or
S/W Requirements:
Operating System : Windows XP/2000 Professional
IDE : VB.NET
H/W Requirements:
Processor : Pentium III or Above
Ram : 256MB or Above
Hard Disk : 4GB or Above
Abstract
The STUDENT HELPER is the best way to develop school maintenance quickly and
easily.
This is system allows the user to add the classes and as well as to view the
classes, and to maintain schedule to the classes and to add classes to the schedule.
The user can add the teacher and as well as he could able to view the teacher
details, at the same time user can add the exam details when it should be conducted
and he could able to view the exam details , at the same time user can add the
contact details and can view the contact details.
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : MS.NET
Database : Xml Reports
Firstman Software Solution
1. INTRODUCTION
The company can post a job, as well as the candidate can post his resume.
This application makes the searching process more efficient. This application
provides global service, so that anybody around the world can access the
information. The candidate any where in the world can get to know about the job
openings, this provides online information on job posting and job searching. This
application helps the company helps to place qualified and eligible candidates.
Any company can put their advertisement in this site, so that they improve
their sales and viewers will get more information about the company. They will be
charged to put their advertisements.
1.2 OBJECTIVES
• Candidates anywhere in the world can get to know the job openings.
Firstman Software Solution
Modules Are
1. Registration Module
2. Requirement Module
3. Testing Module
4. Selection Module
5. Account Module
REGISTRATION
The candidate can also list out their preferences online and can also
quote their criteria regarding their job and in accordance with the qualifications.
Once they register their resume, they are relieved from the burden of
job hunting and their jobs directly come over to their job steps.
REQUIREMENT
TESTING
The short listed candidates who are qualified for the particular position
are send to the respective company for the different terms of interview and group
discussions. The time, venue, date and the attested forms are some important
documents which need to be taken by the candidates to the specified company.
SELECTION
ACCOUNT
Processor : PENTIUM 3
Ram : 256
Hard Disk : 20 GB
Peripherals : CD ROM, FLOPPY DRIVE, INKJET PRINTER.
SYNOPSIS
The project is developed in the environment of .NET. The server side scripting for
the website is done through ASP.NET, client presentations do net through HTML and
VB Script with data stored in SQL SERVER database
1. INTRODUCTION
1.1PROJECT OVERVIEW
Firstman Software Solution
The project “Call Center Management” automates the
operations of a call center by giving replies to the customer’s queries. By
adding more entries to the data base store, the application can respond to
more number of queries from the customers. The importance is giving
correct reply to the input queries. A mail service is provided to send
information from the call center executive to the customer. In turn customer
can also send mails to the company regarding the clarification of their doubts
about the product details and the company details.This project has 2
modules. These are
Chat services
Mail services
CHAT SERVICES
Chat application help to the company to provide a source of directly
solving the entries of the customer through the call center executive. When
ever the customer call the server name and put for the some queries, these
calls are directed towards the executive who in turn chat with customer and
clear the queries. It involves the following sub modules
Administrator Level
Executive Level
Customer Level
MAIL SERVICES
The mail services is provided to the customer and the call center
administrator to communicate between them. The company should also send
mail to customer during the features added to the existing product and price
variation in a regular fashion. It involves the following sub modules.
Compose
Inbox
1.2 EXISTING SYSTEM
The organization maintains their existing application in Visual basic and data in
MS Access tables. This application can not be worked out by their product
in a LAN network and not suited for internet application. Some of the processes
The proposed system solves the drawback of the existing system and works
possible in any particular time. The mail service is also provided to have a
communication between the call center executive and the customers. The
provided quickly.
ADVANTAGES
2. SYSTEM SPECIFICATION
SERVER
Network Operating System : Windows 2000 Server
Web Server : Internet Information Server5.0
Firstman Software Solution
Database : SQL Server 7.5
Server Side Script : Asp.Net
CLIENT
Desktop Operating System : Windows 98
Web Browser : Internet Explorer5.5
Client Side Script : Html / VB Script
Introduction
also the first version of our program that offers one level of undo.
The idea is that the pixel we are processing, and the eight that surround it, are
each given a weight. The total value of the matrix is divided by a factor, and
optionally an offset is added to the end value. The matrix above is called an identity
Firstman Software Solution
matrix, because the image is not changed by passing through it. Usually the factor
is the value derived from adding all the values in the matrix together, which ensures
the end value will be in the range 0-255. Where this is not the case, for example, in
should also mention that convolution filters come in a variety of sizes, 7x7 is not
unheard of, and edge detection filters in particular are not symmetrical. Also, the
bigger the filter, the more pixels we cannot process, as we cannot process pixels that
do not have the number of surrounding pixels our matrix requires. In our case, the
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Abstract
Image Processing Lab is a simple tool for image processing, which includes different
filters and tools to analyze images available in AForge.NET framework. It's easy to
develop your own filters and to integrate them with the code or to use the tools in
HSL filtering);
extraction/replacement);
morph);
You can create (save and load) your own convolution filters or filters based on
You can scroll an image using mouse in preview area. All filters are applied only to
A PhotoShop like histogram allows you to get information about mean, standard
The program allows to copy to or paste from clipboard, save and print images.
Hardware Requirements:
Processor : Pentium IV
Ram : 256 MB or above
Hard Disk : 40 GB or above
Software Requirements:
Abstract
S/W Requirements:
VB/.NET/JAVA/J2EE
Oracle 9i/MSSQL/MS-Access
H/W Requirements:
P IV 900 MHz+
Firstman Software Solution
128 MB RAM
40 GB HDD
57.ABSTARCT : EXPLORER
Abstract:
First we need to gather information on all the drives my computer have access to,
and display the name and type of drive in the TreeView control. We can query the
requested. We now have all the drives information at our disposal (such as drive
drive or directory exists, before proceeding any further. Now we can get the
directories for the current selection in the TreeView by using the Directory class from
current node path as the parameter, will return an array of directories. We can loop
through the directories array to populate sub-nodes under the current selected node.
To get the currently selected node's files, we need to call the Directory.GetFiles
method with the current node path as the parameter. This will return an array of files
for the selected drive or directory. Now we can populate the ListView with the file
array by looping through each array element and call FileInfo class to get the file
Formating Numbers
Firstman Software Solution
Instead of writing string parsing functions to format the file size with comma in the
SYSTEM IMPLEMENTATION
The completion of this thesis requires the following Software & Hardware
Software Requirements
Hardware Requirements
PROCESSOR - Pentium IV
RAM - 32 MB
SECONDARY STORAGE - 1 MB
MOUSE - Logitech
Software Requirements:
60.ABSTRACT: APPARTMENT
Abstract
The APPARTMENTS is the best way to develop appartments maintenance quickly and
easily.
This is system allows the admin to add the flat details and as well as to view
the enquries, and to maintain flat occupation details and to check the payments and
problems and rents regarding each flat. The user can view the flat details and as well
as he could able to view the enquiry details, at the same time user can add the
payment details .
Firstman Software Solution
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : MS.NET
Database : SQL-SERVER
The Client Pioneer is the best way to develop for quickly and easily maintenance of
a company.
This is system allows the user to add the customer details and supplier details
and item details and material details, and to maintain the sales order and voucher
details. The admin can provide the purchase bill and as well as he could able to view
the purchase order details, at the same time displays the customer details and
customer wise invoice details and sales order .this system helps to maintain the
whole details regarding a company infrastructure of the sales and purchases which
helps in ease in maintenance.
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : MS.NET
Firstman Software Solution
Database : SQL SERVER
2. SYSTEM CONFIGURATION
ABSTRACT
For any leading production company, organizing its activities like purchase of
raw materials, sales details, production details and maintaining personnel
information is an important task. In order to make it flexible and easily updateable,
all these processes can be automated through computerization.
The major activities such as purchasing the raw material from other company,
maintaining the market strategy, marketing the finished products, tracking the
production phase and maintaining the personnel information about the employees
and vendors are fully computerized. This project also provides a complete report
generation utility, which generates necessary reports as and when required.
Abstract
The GYM APPLICATION is the best way to add the details of the employees and to
add the products details.
This is system allows the user to add the employees and as well as to view
the employees, and to maintain schedule to the employees and to add employee
details. The admin can add the employee and as well as he could able to view the
employee details, at the same time user can add the products details and he could
able to view the products details , at the same time user can add the contact details
and can view the contact details.
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Firstman Software Solution
Language : MS.NET
Database : SQL SERVER
Description :
Homeo soft project is an medical management system. This helps the shop
maintainers to maintains there goods in the shop. This Homeo-Soft is Very friendly,
easy to use Software for HOMEOPATHS. Office Software that keeps you in control of
daily operations like maintaining group details, types of medicines and there
details,distributor details. This also helps in maintains the transaction like Purchase
and Sales of the medicines and providing reports regarding stock.
modules
1. Add groups
2. Medicine type
3. Medicine Details
4. Add distributors
5. Sales
6. Purchase
SOFTWARE REQUIREMENTS:
Operating system : Windows XP/2000
Front end : VB.NET
Back end : Oracle9i
HARDWARE REQUIREMENTS:
Hard disk : 40 GB
RAM : 512 MB
Firstman Software Solution
Processor : PENTIUM IV
Features
Processor : Pentium IV
RAM : 256MB or above
Hard disk : 40GB or above.
Software Requirements:
Operating system : Windows XP/2000 Professional
Front end software : VB.NET
Description:
"Content-based" means that the search will analyze the actual contents of the image.
The term 'content' in this context might refer colors, shapes, textures, or any other
information that can be derived from the image itself. Without the ability to examine
image content, searches must rely on metadata such as captions or keywords, which
may be laborious or expensive to produce.
History
The term CBIR seems to have originated in 1992, when it was used by T. Kato to
describe experiments into automatic retrieval of images from a database, based on
the colors and shapes present. Since then, the term has been used to describe the
process of retrieving desired images from a large collection on the basis of
syntactical image features. The techniques, tools and algorithms that are used
originate from fields such as statistics, pattern recognition, signal processing, and
computer vision.
Firstman Software Solution
Technical progress
There is growing interest in CBIR because of the limitations inherent in metadata-
based systems, as well as the large range of possible uses for efficient image
retrieval. Textual information about images can be easily searched using existing
technology, but requires humans to personally describe every image in the database.
This is impractical for very large databases, or for images that are generated
automatically, e.g. from surveillance cameras. It is also possible to miss images that
use different synonyms in their descriptions. Systems based on categorizing images
in semantic classes like "cat" as a subclass of "animal" avoid this problem but still
face the same scaling issues.
Potential uses for CBIR include:
• Art collections
• Photograph archives
• Retail catalogs
• Medical records
Query by example
Query by example is a query technique that involves providing the CBIR system with
an example image that it will then base its search upon. The underlying search
algorithms may vary depending on the application, but result images should all share
common elements with the provided example.
Options for providing example images to the system include:
This query technique removes the difficulties that can arise when trying to describe
images with words.
An example of a system that allows users to draw their search criteria can be found
here:
Semantic retrieval
The ideal CBIR system from a user perspective would involve what is referred to as
semantic retrieval, where the user makes a request like "find pictures of dogs" or
even "find pictures of Abraham Lincoln". This type of open-ended task is very difficult
for computers to perform - pictures of chihuahuas and Great Danes look very
different, and Lincoln may not always be facing the camera or in the same pose.
Current CBIR systems therefore generally make use of lower-level features like
texture, color, and shape, although some systems take advantage of very common
higher-level features like faces (see facial recognition system). Not every CBIR
system is generic. Some systems are designed for a specific domain, e.g. shape
matching can be used for finding parts inside a CAD-CAM database.
Color
Examining images based on the colors they contain is one of the most
widely used techniques because it does not depend on image size or
orientation. Color searches will usually involve comparing color
histograms, though this is not the only technique in practice.
Texture
Texture measures look for visual patterns in images and how they are spatially
defined. Textures are represented by texels which are then placed into a number of
sets, depending on how many textures are detected in the image. These sets not
only define the texture, but also where in the image the texture is located.
Shape
Shape does not refer to the shape of an image but to the shape of a particular region
that is being sought out. Shapes will often be determined first applying segmentation
or edge detection to an image. In some cases accurate shape detection will require
human intervention because methods like segmentation are very difficult to
completely automate.
Some software producers are aggressively trying to push CBIR based applications
into the filtering and law enforcement markets for the purpose of identifying and
censoring images with skin-tones and shapes that could indicate the presence of
nudity, with controversial results.
Required Hardware
• 256 MB RAM
• 40 GB HDD
• PENTIUM IV
Required Software
By taking the drawbacks the existing system it gives the following solution.
END-OF-DAY:
In the end-of-day module we will collect the information of all the National stock
Exchange information in the certain period of time.
STOCK-QUOTE:
Stock-Quote is for fetch the details of particular company share details by using the
shortcut name of the particular company.
CURRENCY_CONVERTER:
In the currency convertor module we can convert the currency from country to other.
PORTFOLIO:
In the portfolio module we get the information about cashaccount ,shareaccount of
our account information.
REPORT:
We get the details of particular share of particular company for the given range.
FIX:
In this module we get the information of the data in the form of xml like
EXPORTDATA, EXPORTSChema.
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
ABSTRACT
DESCRIPTION:
For our society, the learning with the help of electronical media has become an
important factor for the preservation and the creation of qualified jobs. But this type
of learning is lacking of a checking of the contents the students have learned. Only
with an enormous organisational effort and a lot of time, consultation could be
realised. Another factor that blockades the efficient learning is the time that is spent
on correcting and returning the exams.
A regular control of the contents is not possible, because the correction of tests and
exams takes to long. But studies proof that just a regular control leads to better
results.
Online examination system is the new way to conducting exams to the students
using the efficient web technologies and the Internet. Online is the technology of
accessing the application from sitting anywhere in front of a computer with an ease
of operation.
In the manual examination system, student must and should attend for the exam at
the center specified by the authorities that are conducting the exam and has to write
the exam under the supervision of the invigilator.
Not only this, a lot of stationery has to maintain for conducting the exam like answer
sheet and question papers which are prepared prior to exam by putting lots of efforts
each time and for each student.
The main disadvantage is announcing results take a lot of time. Student must wait
until the results announced to take his future decisions. This is the cost issue and
takes a lot of time for preparing the question paper.
In the legacy system these disadvantages are overcome by conducting the exam
online. The main advantage in online examination system is no need to prepare the
question paper manually, no stationery is required, the exam is completed
successfully without any super vision this reduces personnel cost and the results are
announced immediately without any delay.
Firstman Software Solution
The process of this online system is student opens the website of the organization
conducting the online exam by typing the URL in the Internet explorer. After opening
the website he logs as a valid user if he registered already otherwise, he has to
register with the site.
After the log on process, a menu will appear on the web page in this menu select the
test menu and the subject of the exam. After selection, first question in the exam
will be appeared on the page with a time limit allotted for that particular question
within the time period he has to answer the question. Other wise the exam will be
cancelled. When he answered the first question, next question will be appeared on
the screen. In this way total questions will be appeared on the screen.
In this system, the administrator will decide the exam pattern and place the
questions, he can modify the questions according to the need and the pattern of the
examination like time period etc.
After the completion of exam results will be appeared on the screen immediately by
displaying total marks and the grade obtained.
Advantages:
Students can register to administer the online exam right from their computer
Online exam classes can be created in minutes and proctored immediately
Class progress can be monitored during the exam
Access exam results instantly
Upon completion of the exam, examinees are notified whether or not they
passed the exam
Once the entire class is finished, exam results are accessible instantly
Examinees may take a practice exam online
Examinees can review selected questions before completing
Examinees know immediately if they pass the exam
The online format offers convenience and flexibility that benefits both
Examinees, as well as the management
Operator Convenience:
The user interface, which is easy to handle, leads to a short time for orientation and
allows a time saving work.
Fast Analysis:
Because of its very fast evaluation, Online examination system allows an
improvement of the didactics. You have the opportunity to evaluate the exam right
after the handing in and to provide the results to the students. Because of this the
gaps in the student’s knowledge can be recognised and removed quickly.
Furthermore, the correction doesn’t take long, which means a relief for the
instructors.
Firstman Software Solution
Incontestable:
You have the possibility to print the written exams so that the students can sign
them. This turns the online exam into a written exam that is incontestable.
Security:
It is impossible to use other programs in parallel, for example chats or browsers.
Furthermore, the questions as well as the given answer selections are permuted,
which means that no exam is like the others because the questions and the answer
selections are combined at random.
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
ABSTRACT
DESCRIPTION:
For our society, the learning with the help of electronical media has become an
important factor for the preservation and the creation of qualified jobs. But this type
of learning is lacking of a checking of the contents the students have learned. Only
with an enormous organisational effort and a lot of time, consultation could be
realised. Another factor that blockades the efficient learning is the time that is spent
on correcting and returning the exams.
Firstman Software Solution
A regular control of the contents is not possible, because the correction of tests and
exams takes to long. But studies proof that just a regular control leads to better
results.
Online examination system is the new way to conducting exams to the students
using the efficient web technologies and the Internet. Online is the technology of
accessing the application from sitting anywhere in front of a computer with an ease
of operation.
In the manual examination system, student must and should attend for the exam at
the center specified by the authorities that are conducting the exam and has to write
the exam under the supervision of the invigilator.
Not only this, a lot of stationery has to maintain for conducting the exam like answer
sheet and question papers which are prepared prior to exam by putting lots of efforts
each time and for each student.
The main disadvantage is announcing results take a lot of time. Student must wait
until the results announced to take his future decisions. This is the cost issue and
takes a lot of time for preparing the question paper.
In the legacy system these disadvantages are overcome by conducting the exam
online. The main advantage in online examination system is no need to prepare the
question paper manually, no stationery is required, the exam is completed
successfully without any super vision this reduces personnel cost and the results are
announced immediately without any delay.
The process of this online system is student opens the website of the organization
conducting the online exam by typing the URL in the Internet explorer. After opening
the website he logs as a valid user if he registered already otherwise, he has to
register with the site.
After the log on process, a menu will appear on the web page in this menu select the
test menu and the subject of the exam. After selection, first question in the exam
will be appeared on the page with a time limit allotted for that particular question
within the time period he has to answer the question. Other wise the exam will be
cancelled. When he answered the first question, next question will be appeared on
the screen. In this way total questions will be appeared on the screen.
In this system, the administrator will decide the exam pattern and place the
questions, he can modify the questions according to the need and the pattern of the
examination like time period etc.
Firstman Software Solution
After the completion of exam results will be appeared on the screen immediately by
displaying total marks and the grade obtained.
Advantages:
Students can register to administer the online exam right from their
computer
Online exam classes can be created in minutes and proctored immediately
Class progress can be monitored during the exam
Access exam results instantly
Upon completion of the exam, examinees are notified whether or not they
passed the exam
Once the entire class is finished, exam results are accessible instantly
Examinees may take a practice exam online
Examinees can review selected questions before completing
Examinees know immediately if they pass the exam
The online format offers convenience and flexibility that benefits both
Examinees, as well as the management
Operator Convenience:
The user interface, which is easy to handle, leads to a short time for orientation and
allows a time saving work.
Fast Analysis:
Because of its very fast evaluation, Online examination system allows an
improvement of the didactics. You have the opportunity to evaluate the exam right
after the handing in and to provide the results to the students. Because of this the
gaps in the student’s knowledge can be recognised and removed quickly.
Furthermore, the correction doesn’t take long, which means a relief for the
instructors.
Incontestable:
You have the possibility to print the written exams so that the students can sign
them. This turns the online exam into a written exam that is incontestable.
Security:
It is impossible to use other programs in parallel, for example chats or browsers.
Furthermore, the questions as well as the given answer selections are permuted,
which means that no exam is like the others because the questions and the answer
selections are combined at random.
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
77.ABSTARCT : PC LISTER
Processor : Pentium IV
RAM : 256MB or above
Hard disk : 40GB or above.
PC Lister is a smal
Software Requirements:
Operating system : Windows XP/2000 Professional
Front end software : VB.NET
This software tool is a desktop wallpaper changer designed to offer you total and
complete control over your own desktop wallpapers. With Wallpaper Xe, you can use
any of your favorite images or movies as your desktop wallpaper easily and all your
wallpaper settings ( style, position, background color, timer, resolution, etc) are fully
customizable. Enjoy a beautiful and colorful desktop with Wallpaper Xe, one of the
finest wallpaper changers!
Your pictures can be automatically tiled, centered or resized to full screen.
Wallpaper Changer can analyze your picture and will determinate the best
matching background and the most readable icon caption color for every
wallpaper you apply to your desktop. You can create, save and reload your
collections of your favorite wallpapers. Simply add single pictures or whole
directories via drag & drop from Explorer or search your hard drive for all
supported graphics files.
Processor : Pentium IV
RAM : 256MB or above
Hard disk : 40GB or above.
Software Requirements:
Operating system : Windows XP/2000 Professional
Front end software : C#.NET
Abstract
Hardware Requirements:
Processor: Pentium IV
Hard disk: 40GB or above
Firstman Software Solution
Ram : 256 MB or above
Software Requirements:
Use one or more empirical models for software cost and effort estimation
system it has been decided based on the Software Quality Assurance Systems.
5. Implementation Costing
6. Training Costing
Tables created in access will have fewer chances for corruption, when
formulated.
minimize errors.
Provide user to accept, and process. All business rules should be implemented
in the application.
For Accuracy
Hardware Configuration
Processor - Pentium iv
Software Configuration
The configuration of the software used for developing this system is
tax on agency boards. Every agency has its own unique agency code. Then
Firstman Software Solution
issue the reports of the payments and dues.
Municipal Corporation. It deals with the all the information related to the
Every agency has its own unique agency code. The tax on agency boards is
Mainly calculated based on the ward Number, location, board type, zone,
Whether the board is vacant or not, whether the board has illuminated
PRODUCT FUNCTIONS:
1. Agency Registration
3. Calculation of Tax.
4. Generating Reports.
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Software Technologies:
Conclusion:
Manual processing of data is very tedious and time consuming and leads to
erroneous results, at times. In order to overcome these snags computers are being
used extensively in all fields thereby minimizing manual labor and errors to a great
extent.
Taking all the advantages involved in computerizing, the proposed system
“Online Crime Report” integrates all the manual activities by linking them under a
single head. This System processes the day-to-day activities and generates tender
reports that help the user to get a good grasp of the situation(s) and take decisions
quickly and in-time.
85.ABSTARCT:
ABSTRACT
ONLINE CELL PHONE RECHARGES is the project which deals with issuing Any Cell
Phone Recharges through online.
In this project, we have three types of users and modules namely Admin, Customer
and Visitors. Admin adds new Traffic Plans to this site, In this The Administrator will
maintain all kinds of recharges ,Like Airtel,VodaPhone,TataIndicom,Idea,Bsnl…
etc.The Administrator will take care of the recharge requests through customers . He
Maintains All the customer details who logged for recharges and type of recharges.
He Maintains All the traffic plans visible to the customers on the website.
In the Customer module, Customer checks for the new Tariff plans and type of
Recharges like Airtel, VodaPhone, TataIndicom, Idea, Bsnl…etc .He send the request
to the administrator for recharging his mobile. All the transactions made by the
Firstman Software Solution
customer through credit card. The Customer can get the recharge details after the
transaction.
In the Visitors module, The Visitors can see all the details Like Traffic Plans and
recharges details maintaining by the administrator. If he likes any of the plans he
can login into the site and send the request for recharge to the administrator.
HARDWARE ENVIRONMENT
SOFTWARE ENVIRONMENT
This site collects the details about the blood donors and
sends that information to the Recognized Blood Banks
and provides the blood samples information and
availability of blood in various blood banks in the form
of report (Blood Group wise). It also lists the donations
and costs collected by various Blood Banks in providing
the required blood of the specified blood group.
Modules
A user would never feel new to a location with this application on his mobile.
When a user selects to launch Mobile Bill Payment, he is logged on to a screen where
he is asked to select which service he would like to access. Then based upon the
users choice the user is presented with a list of the particular service bill details. If
the user selects the options provided on the screen given he is instantly provide with
the information pertaining to that particular service.
Software used:
ABSTRACT
INTRODUCTION TO MODULES
• Admin
• User
o High Level
o Middle Level
o Low Level
Admin
This module deals with complete information available in this application,
create the user, granting the permissions to the user, denying permissions to the
user or to delete any particular user. Admin mainly deals with the information of the
satellite images. All the products (Images) which are forwarded from the satellites
are stored in a server; admin takes each and every image from the server and
segregate them. Admin classifies each and every image to which department that
particular image belongs to. After segregating the images or information admin adds
the description of that particular image and saves the same to the database in a
department wise. Admin can also monitor the users by restricting them not to
access the other information which is not related to them. Admin will have the
complete rights over the users. Users are 3 different kinds. They are High, Medium
and Low level users. The restriction in accessing the information is done basing on
the level of the user and that is done by the admin. Admin can create or destroy the
Firstman Software Solution
user. Admin creates the user basing on the department and level of the user and
then grants the permission to the user basing on their levels.
User
There are 3 categories in the user Module
• High Level
• Middle Level
• Low Level
High Level
This module is little bit similar to admin but not as it is like admin. User who
ever in this level can access the information related to any department. Information
like the images of any department can be accessed and the text information related
to those images can be accessed. The high level users can have the rights to access
all the information related to any department. High Level users are the people who
are the top cadre employees of the organization. They will be having the complete
rights on all the information of each and every department. They can access the
information and at the same time they have the rights to modify the information
which was entered by the admin.
Middle Level
The middle level users are the people who are next to the high level users.
They have the complete access to the information related to their department and
also they can access the information related to any other department which doesn’t
belongs to them. That means they can access all departments information
irrespective of their department. They are permitted only to access the information
but they can’t modify the information as high level users can. That is the only
difference between High Level and Middle Level users.
Low Level
These low level users are those who come after High and Middle Level. They
can only access the information but they cannot change the information that is
available. This cader user can access the information that belongs to their
department only. This Low level employees or user can access the information
related to their department and they are not permitted to modify the data which is
given for accessing.
Firstman Software Solution
System Requirements:
Hardware Requirements
Cache : 512 KB
Software Requirements
ABSTRACT
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Firstman Software Solution
Database : oracle
ABSTRACT
for public. This is an In tract based application that can be accessed throughout a
region .In this system one can search books or magazines and other information .It
searches the book name and gives all the web links that are available for those. This
is an integrated system that contains both the user component and administrator.
Intranet knowledge management system can beef fictively used to share data
TOOLS USED:
Abstract
The ONLINE COURSE PORTAL is the best way to develop business or services quickly
and easily for student.
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : VB.NET
Database : Sql Server 2K
Abstract
The PRACTICAL APPRAISAL TRACKER is the best way to know the performance of the
individuals who had enrolled.
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Firstman Software Solution
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : VB.NET
Database : Sql Server 2K
1. Abstract:
The “Web-Based Stationery Management System” is designed to maintain all
the requests and stock details of stationery in an organization. This system is a
completely integrated online system. It takes all the stationery request of employees
in an organization and sends them for approval by an administrator.
This system automates a manual procedure in an efficient way. The
automated system facilitates the employee to check the status of his requests and
also the administrator to review the stock details before he can review the request
that is put up by the employee. The administrator can also order for new stock in
case the existing reserves are running low. The administrator can also keep a tab on
the individual requests of the employees and check how much they are requesting
for over a period of time.
The proposed system has been planned to be having the view of distributed
architecture, with centralized storage of the database. Using SQL Server as the
backend and all the user interfaces are developed in Asp .Net Technologies. The
entire project has been developed keeping in mind the client-server architecture.
Keywords:
Generic technology keywords
Database, User interface, Networking
Specific Technology Keywords
MS-SQL server, HTML, Microsoft visual studio 2005
Development of a rich web based VACANT LAND and TAX Details System.
2. Keywords :
3. Environment :
Servers :
Browsers:
1. Internet Explorer
2. Mozilla Firefox
Firstman Software Solution
Tools:
User Interface:
ASP.Net
Code Behind:
VB.Net
Requirements
Software Requirements
Abstract
The main objective of this proposed system is to online all the activities of
a bank. The system is like to enable the bank employees to open accounts for
their customers with ease and to add the details, to transfer amount from one
account to another account and doing all the activities related to loan, making all
type of transactions. Using the system employees can also generate different
types of modules.
Cache : 512 KB
Hard disk : 16 GB hard disk recommended for primary
partition.
2.4.4 SOFTWARE SPECIFICATIONS
Software:
Operating system : Windows XP or later
98.ABSTARCT: CLASSFILEDS
Abstract
The CLASSIFIEDS is the best way to find the event of the city quickly and easily.
While other advertising mediums such as television, radio, and the Internet present
performance challenges, CLASSIFIEDS’ performance opportunities.
This is system allows the user to select a city and view the details of that city and at
the same time the user can change the city and he could view the details of the
changed city, and the user can add a post through his registered user name and his
password and after that he can create his own add simply selecting a city and the
category by keeping a title and subject and the message will be posted to the
database.
Firstman Software Solution
Features of System
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
HD space : 40GB
Software Requirements:
Os : Windows 2000 or Windows Xp
Language : MS.NET
Database : Sql Server 2K
ABSTRACT
This application is going to maintain the information regarding payment of salary &
regarding payment of salary & other monthly deductions and additions to the
employees. Once the employee is registered then the report will be generated
automatically with as per the norms of the college and the acceptance of the
employee. In this Pay roll management system is used by the clerical staff of the
Organization and the pay slips are sent to the employees as per the norms of the
about the salary given to employees, the hra, ta, da, and other deductions and the
payment mode of installments paid in case of any loan repayment. This system is
payments.
Firstman Software Solution
TOOLS USED:
ABSTRACT
This project is a complete package of Medicos management. It deals with each and
every aspect of a Patient and his/her treatment which includes maintaining patient’s
history like his/her personal and family details, nature of treatment and medicines
issued to him/her and finally his/her test reports. In this system user can take print-
outs of a particular patient’s details and also maintain his/her complete treatment
history with an ease of operation. This is a windows application which can be
developed in VB.NET.
In Patient details module, all the information regarding a particular patient will be
maintained.
Treatment module will contain all the treatment information of the patient. All the
details of the Medicine issued to the patient will be maintained in the Medicine
module.
Diagnosis module will contain all the information about the diagnosis.
SYSTEM REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Language : VB.NET
Database : Oracle8i
HARDWARE REQUIREMENTS:
Hard disk : 40 GB
RAM : 512 MB
Processor : PENTIUM IV
102.ABSTARCT:INFO PRO
ABSTRACT
The INFO is the best way to develop file maintenance. This is system allows the user
to get “general information” of the persons. And in that the user can view the details
in “data sheet view” and in “form view” and the user can “edit” and “take the print
out. And there is “new information” to post. And in report view user can view and
take a print out of the given information.
Features of System
• Windows Applications
• Quick & Easy Way To file maintenance.
• Advanced Reporting And Analytics
Hardware requirements
Software requirements
ABSTRACT
The recruitment process for most organizations is
Designed along the same path; applications are received, either via an online
application form, a postal form or a CV. Candidate are short-listed and invited
for interview. The interview format can vary considerably, as we discuss later, and
can include assessment centers. The number of interviews also varies.
Some companies are satisfied after just one interview whereas others will want
to bring back a further shortlist of candidates for one or more interviews. If you are
successful at the interview stage you will receive an official letter offering you the
job. This information describes what you can expect at interviews and assessment
centers, and takes you through to making a decision about any offers that may
result.
105.VOTING
ABSTRACT
According to our project here four modules are there, first one is the
administrator another one is the user, in the administrator module,
administrator will maintain all the users details and their finger prints in the
database, and also maintain all the candidates details along with their party
symbols. They will give intimation to all the voters about the voting date, this
project completely based on networking, especially remoting. While going to
voting, if voter is more than 18 years old with the given registration date of
birth then only they will be eligible to vote. If it’s ok it displays all the party
symbols along with their candidate names, then after they need to vote their
desired candidate.
Then these data will be stored in database for further purpose.
Modules:
• Voting authority
• Users Module
• Voting Process
• Reports and Analysis
SOFTWARE SPECIFICATIONS:
DESCRIPTION:
The project is a developed based on the standards of the coding used by the
developer is tested before giving to the client. System that interacts with the code
developed bye the user. Using this project any developer with minimal knowledge
can easily check correctness of the code easily without any errors.
Before submitting to the client or hosting any site of the project should
maintain a testing tools. Here this developing system is based on this
process only. This project will maintain a database for each project, in
that it maintains project code, bugs. Bug tracking developers read
these bugs and fix the bugs and update the same information in the bug
reports.
The following is the system developed for the above stated needs. An initial
feasibility study was conducted & a conclusion was arrived at that automating such a
system would not only achieve all the things mentioned above.
Hardware Specifications:
Software Specifications
and modify the image such that only these edges retain their respective colors, while
the rest of the image is turned gray. Through the use of lighting the image will then
There are three edge detection filters available. Each of these detects edges
from a different side (possibly considering other parts of the image as being edges)
and will therefore obtain a different resulting image. But we cannot Contrast or
brighten the images. At the same time we cannot view the image in a horizontal or
vertical view.
So, now we can eliminate all those drawbacks in our proposed system as we
can perform all the tasks which we cannot do it such as increasing the brightness,
contrast, viewing the image in a horizontal or vertical view by using Filters concept.
Even, we can zoom the picture to see the picture in a closer way.
Hardware Specifications:
Software Specifications
ABSTRACT:
Hardware Requirements:
Processor : Pentium IV
Software Requirements:
Frontend : VB.NET
112.ABSTRACT: IMPRO
ABSTRACT
Objective:
Description:
Every Organization has many managers, who are responsible for all the
activities in the organization. These managers manage different aspects of the
organizational management issues, such as manufacturing, production, Marketing,
etc; one such essential management issue is IMPRO (INDUSTRIAL MANPOWER
AND RESOURCE ORGANISER).
SOFTWARE REQUIREMENTS:
Operating system : Windows 2000 or later
HARDWARE SPECIFICATIONS
Processor : Intel Pentium or more
Abstract
Using a computer to create, edit, and print documents. Of all computer applications,
word processing is the most common. To perform word processing, you need a
Firstman Software Solution
computer, a special program called a word processor, and a printer. A word
processor enables you to create a document, store it electronically on a disk, display
it on a screen, modify it by entering commands and characters from the keyboard,
and print it on a printer.
The great advantage of word processing over using a typewriter is that you can
make changes without retyping the entire document. If you make a typing mistake,
you simply back up the cursor and correct your mistake. If you want to delete a
paragraph, you simply remove it, without leaving a trace. It is equally easy to insert
a word, sentence, or paragraph in the middle of a document. Word processors also
make it easy to move sections of text from one place to another within a document,
or between documents. When you have made all the changes you want, you can
send the file to a printer to get a hardcopy.
Hardware Requirements:
Processor : Pentium IV
Software Requirements:
Frontend : VB.NET
115.ABSTARCT: COURIER
ABSTRACT
There are many services, which are utilized by a citizen provided by the
government or private sector. The Project entitled "COURIER SERVICE
SYSTEM" is an intranet application developed to maintain the transactions
through net for Courier Service System .
Abstract
The main objective of this proposed system is all the activities of a bank.
The system is like to enable the bank employees to open accounts for their
customers with ease and to add the details, to transfer amount from one account
to another account and doing all the activities related to loan, making all type of
transactions. Using the system employees can also generate different types of
modules.
• Issue Loans
• Generate Reports
Cache : 512 KB
Hard disk : 16 GB hard disk recommended for primary
partition.
2.4.4 SOFTWARE SPECIFICATIONS
Software:
Operating system : Windows XP or later
119.ABSTRACT: RTO
ABSTRACT
This project RTO Automation aims to automate all the processes happening in
the RTO office. In the existing system all the details of the areas in the RTO office
are maintained manually in paper records. In our system everything is atomized,
thus reducing the paper work and increasing the efficiency of the RTO office process.
INTRODUCTION
RODUCTION
This project RTO Automation aims to automate all the processes happening in
the RTO office. In the existing system all the details of the areas in the RTO office
are maintained manually in paper records. In our system everything is atomized,
thus reducing the paper work and increasing the efficiency of the RTO office process.
Hardware Requirements:
Software Requirements:
121.ABSTARCT:CARRER MART
ABSTRACT
Features:
The candidates seeking job (referred as job seekers now onwards) can perform
following operations:
System Requirements:
Hardware:
Cache : 512 KB
Hard disk : 16 GB hard disk recommended
102.ABSTARCT : COOL CAB SERVICE
• INTRODUCTION:
Cool cab Service is the most trusted and reliable name in the travel business. Cab
and car hire in India, making full use of information technology to improve the level
of our efficiency. However, this is only one aspect of our services. For us, what is
even more important is the quality of service in its entirety. And we continually strive
to offer the best of services - both in terms of man and machine, to our clients.
We offer online cab hire service for house holds and individuals, we also offer fleet
services to corporate houses. We offer both inter city and intra-city cab facilities. All
our cabs have proper permits and documentation so that our clients couldn't be
hassled for the lack of documents. However, we have strategic backup system for
any eventuality. Our cab drivers are educated, polite, reliable and are trained to
handle acute breakdowns. The cab service includes all categories of cars from luxury
to budget.
Further, our utmost priority is quality. To achieve this, our vehicles are well
Firstman Software Solution
maintained and tested for delivering optimum and uninterrupted performance. Our
team of professionals in the travel business enables us to design trips that suits to all
budgets and preferences of the travelers. In addition, our workforce including drivers
and administrative staff are well trained to discharge their duties with a lot of
efficiency.
• Purpose Of Project
Our cab rental services are intended to offer quality, experience of traveling.
We provide hassle free services with trained chauffeur to our clients. Further, our
vehicles are well maintained, luxurious and comfortable to ensure pleasurable
traveling for our clients. We have an array of cars that suit the different purposes
of our clients.
• Project Overview:
We aim to become a pioneer in the vehicle industry by completely focusing on
customers, our employees, growth, innovation and efficiency. All of these elements
will drive us towards success and show us as one company.
With the new system the following activities get more momentum.
The actual process of the organization can be modularized into six different
independent views
Admin view
HR Manager View
Administrator module:
HR manager module:
• Vehicle Billing.
• Vender Billing.
• Spare Part Billing.
• View Profile.
• Accident details.
• View profile.
Firstman Software Solution
SOFTWARE CONFIGURATION
HARDWARE CONFIGURATION
RAM : 128MB
ABSTRACT
Target groups of customer of the E-Gift Shoppy are huge. The customers can
have a payment option through credit card only. In order to use the load writing
procedure, the customer registers itself and receives a login for its purchases
name. It is an Internet application.
Users of the system: Customer is the user of the system. An administrator of
the website is the super user. When the user types in the URL of the website, a
Welcome page is shown which has a menu on the left hand side, a banner at the
top and any related links to other sites. This site contains an online catalog for
the user. User has to login to Welcome Page before ordering anything. Login
functionality should check the authenticity of the user from the database.
Functional components of the project: Following is a list of functionality of
the system:
• Products Order: This screen will show all the types of different
product with their values and minimum quantity that should be ordered. If
possible, provide the image of each of the product. On selecting any one of
the product, user is shown the columns for the quantity to be entered. After
entering the quantity, price is automatically set by the system based on the
product price data. On adding to catalog, kindly check the inventory and take
appropriate action.
• Terms and Conditions – A Brief text on the website explaining terms and
conditions and printable copy of it.
Firstman Software Solution
• Contact Information – Contact information regarding the office addresses
with phones and faxes are provided on this screen
In order to develop an e-commerce website, a number of Technologies must be
studied and understood. These include multi-tiered architecture, server and client
side scripting techniques, implementation technologies such as ASP.NET,
programming language (such as C#, VB.NET), relational databases (such as
MySQL, Access).
This is a project with the objective to develop a basic website where a consumer
is provided with a E-Gift Shoppy application and also to know about the
technologies used to develop such an application.
This document will discuss each of the underlying technologies to create and
implement an e-commerce website.
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Target groups of customer of the e-Post Office are predominantly little and
middle-class business. The customers can have a payment alternative through
credit card. In order to use the load writing procedure, the customer registers
itself in the e-Post Office and receives a login for its purchases name. You have to
develop this website, which captures the above functionality. It is an Internet
application.
• Stamps and Bulk Stamps Order: This screen will show all the types
of Stamps with their values and minimum quantity that should be ordered. If
possible, provide the image of each of the stamp types. On selecting any one
of the Stamp type, user is shown the columns for the quantity to be entered.
After entering the quantity, price is automatically set by the system based on
the product price data. On adding to catalog, kindly check the inventory and
take appropriate action.
• Letter Order: This Screen will show different types of letter, which
can be ordered, online. Provide an image for each type of letter. On selecting
any one of the Letter type, user is shown the columns for the quantity to be
entered.. After entering the quantity, price is automatically set by the system
based on the product price data. On adding to catalog, kindly check the
inventory and take appropriate action.
Firstman Software Solution
• Terms and Conditions – A Brief text on the website explaining terms and
conditions and printable copy of it.
Contact Information – Contact information regarding the office
addresses with phones and faxes are provided on this screen
Firstman Software Solution
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
ABSTRACT
The status of women in India has been subject to many great changes over the past
few millennia. From a largely unknown status in ancient times through the low
points of the medieval period, to the promotion of equal rights by many reformers,
the history of women in India has been eventful.
The term women’s rights refer to freedom and entitlements of women and girls
of all age. These rights may or may not be institutionalized, ignored or suppressed
by law, local custom, and behavior in a particular society.
These liberties are grouped together and differentiated from broader notions of
human rights because they often differ from the freedoms inherently possessed by or
recognized for men and boys and because activists for this issue claim an inherent
historical and traditional bias against the exercise of rights by women and girls.
EXISTING SYSTEM
Firstman Software Solution
The present system is semi-automated system. Maintaining critical information
in the files and manuals is full of risk and a tedious process .The existing system
needs to save his information in the form of excel sheets or Disk Drives. The system
gives us very less security for saving data; some data may be lost due to
mismanagement.
The Current system is semi automated system or manual system. The existing
system is a manual system. Here the user’s needs to save his information in the form
of excel sheets or Disk Drives. There is no sharing is possible if the data is in the form
of paper or Disk drives. The manual system gives us very less security for saving
data; some data may be lost due to mismanagement. It’s a limited system and fewer
users friendly. Searching of particular information is very critical it takes lot of time.
There is no Email and chat facilities are implemented. The system doesn’t have the
facility of 24 X 7. There is no interface provided to show success stories of women in
various fields. Profile management using this manual system is a tedious job.
Creating Forms for students, mentors and NGO’s is not possible. Providing various
tests and tutorials to be accessed by the mentor for making it available to the student
is a critical one. There is no possibility to sending regular news letter should be sent
to various universities to make them aware of the e-monitoring system. If a student
wants to send progress report to the mentors, then the student need to prepare it
manually on the paper.
PROPOSED SYSTEM
The development of this new system contains the following activities, which try
to automate the entire process keeping in the view of database integration approach.
User Friendliness is provided in the application with various controls provided by
system Rich User Interface. The system makes the overall project management much
easier and flexible. It can be accessed over the Intranet. The user information files
can be stored in centralized database which can be maintained by the system. This
can give the good security for user information because data is not in client machine.
Authentication is provided for this application only registered members can access.
Members can share is data to others, and also he can get data from others. There is
no risk of data management at any level while the project development is under
process. Report generation features is provided using crystal reports to generate
different kind of reports. This system provides clear forms for students, mentors as
well as NGO’s. The system should be create profiles of both registered students and
mentors, this will cause give results of best suited mentor for each student based on
the profile.
Firstman Software Solution
MODULES:
The system after careful analysis has been identified to be presented with the
following modules:
The Modules involved are
1. Students
3. Data Manager
5. NGO’s
6. Web Registration
7. Search
8. Reports
ENVIRONMENT:
Software Requirements:
Operating System Server: Windows XP or later
Database Server: Microsoft SQL Server-2005
Client: Microsoft Internet Explorer
Tools: Microsoft Visual Studio .Net-2008
User Interface: Asp.Net with Ajax
Code Behind: VC#.Net
Hardware Specification:
Processor: Intel Pentium or More
Ram: 512 MB Ram
Hard Disk: PC with 20GB
4. Proposed System:
6. Modules:
The application comprises the following major modules.
• Organizer
• Sponsorships
• Administrator
7. Requirements:
• Hardware requirements:
Content Description
HDD 20 GB Min
40 GB Recommended
RAM 1 GB Min
2 GB Recommended
• Software requirements:
Content Description
OS Windows XP with SP2 or Windows Vista
Database MS-SQL server 2005
Technologies ASP.NET with VB.NET
IDE Ms-Visual Studio .Net 2008
Browser IE
This allows Wings customers the opportunity to relax and appreciate the value
of our products while concentrating on the business of buying small-scale
industry products at the most competitive price.
SOFTWARE REQUIREMENTS:
Software Requirements:
• WINDOWS OS (XP / 2000 / 200 Server / 2003 Server)
• Visual Studio .Net 2008 Enterprise Edition
• Internet Information Server 5.0 (IIS)
• Visual Studio .Net Framework (Minimal for Deployment) version 3.5
This project is very popular and widely used in many big supermarkets/Departmental
stores and is used the cater the need of the sales system there. This is an online
system and is used maintain/control most of the activities happening in big stores.
This maintains and controls the stock details and does online billing and generates
various online reports. This project is helpful to customers if anybody want to do
online Shoppe.
Number of Modules
The system after careful analysis has been identified to be presented with the
following modules:
HARDWARE REQUIREMENTS
SYSTEM : Pentium IV 2.4 GHz
HARD DISK : 40 GB
RAM : 1 GB
SOFTWARE REQUIREMENTS
Operating system : Windows XP Professional
Firstman Software Solution
Front End : Microsoft Visual Studio .Net 2008
Coding Language : Visual C# .Net
Web Technology :ASP.Net
Back End : SQL Server 2005
The Student Record System maintains records of students, the courses and modules
on which they are registered and the outcome of their studies.
The system maintains personal information for each student registered at the
University. This information consists of the student’s registration number, forename,
surname, gender, home address, term-time address and date of birth. There are two
distinct categories of student within the University under Graduate Students and Post
Graduate Students. For each undergraduate student the system must also maintain a
record of the name of the student’s Local Education Authority and an indication of
whether they have taken out a student loan. For each post graduate student the
system must maintain a record of the name of their sponsor and a flag which indicates
whether they are European or International student.
Hardware Requirements:
• PIV 2.8 GHz Processor and Above
• RAM 512MB and Above
• HDD 40 GB Hard Disk Space and Above
Software Requirements:
• WINDOWS OS (XP / 2000 / 200 Server / 2003 Server)
• Visual Studio .Net 2008 Enterprise Edition
• Internet Information Server 5.0 (IIS)
• Visual Studio .Net Framework (Minimal for Deployment) version 3.5
• SQL Server 2005 Enterprise Edition
114.ABSTRACT:TEAM WORK
Firstman Software Solution
13. Teamwork
Before building the key components of the application, one has to build the
infrastructure first. This infrastructure is common in many applications that you will
build. Most applications have to have a user authentication method of some sort. In
this application, you’ll be building a structure that allows members (the term for
users in this application) to be added to any number of teams. Data in the project,
file sharing, and discussion forum systems will all be related to the teams created by
members. The team leader can add and remove members at will. When a member is
added or removed, a message is generated automatically and sent to the member. I
chose to create a separate system for messaging instead of sending the messages to
external email programs. By keeping the messages internal to the system, you could
change the web site to a secure one using SSL (Secure Socket Layer) and provide
even better security for the message being sent.
The application should capture the details of the project, its location and the
company. It must also maintain the employees their specialization along with his pay
details. The employees must be kept track of number of hours they spent on a
specific project. It also has the provision to enter details of the task carried out for
that specific project. The application provides for generation of reports, like total
number of hours put in by an employee during a specific period of time, total number
of hours a specific project has taken etc. This software must be designed to access
universally and different higher-level officials from hr and other departments should
be provided with employee performance track. As an add-on for this provide a smart
device/pocket pc application for all these higher-level officials to instantly find the
same info from other applications like excel, pdf’s or even with proprietary
application. The appraisal process can be very simple using this application and it
even should provide features as Automation, password-protection, confidentiality and
restrictions. In simple terms this should be an application that combines multiple
human resources functions related to appraisal into one package.
Reporting is the effective requirement of this application. User should be able
to view the work and employees information by providing different queries. Every
report should also be generated so that it can be easily later edited using office
packages like word, excel etc. To publish the same on smart phones or pocket pc’s
users should be provided on-demand with pdf’s also.
Firstman Software Solution
The project has been planned to be having the view of distributed
architecture, with centralized storage of the database. The application for the storage
of the data has been planned. Using the constructs of MS-SQLServer and all the user
interfaces have been designed using the ASP.Net technologies. The database
connectivity is planned using the “SQL Connection” methodology. The standards of
security and data protective mechanism have been given a big choice for proper
usage. The application takes care of different modules and their associated reports,
which are produced as per the applicable strategies and standards that are put
forwarded by the administrative staff.
• Team members
• Tasks
• Teams
• Projects
• Tasks
• Search
• Admin
• Reports
Teams:
There will be different teams in the project and in each team there should be a
project leader, a project manager and team members. Team leader will add a
member into his team or delete a member from his team at his will.
Projects:
The project manager should assign projects to the teams, Hr people should add a
new project into the database and project managers should assign a project to the
teams.
Tasks:
Each person (Team leader, project manager, Team member) in the team should
have a task such as for team leader adding and deleting team members at his will
Firstman Software Solution
and project manager should assign projects to the teams and he can view reports of
team member and team leader.
Search:
Search option should be provided to search for an employee by his employee id.
Admin
Admin can create, modify and delete or otherwise manage the users and.
a) Create: Creates a new user with all the required elements
b) Modify: Modifies an existing user to change its access privileges
c) Delete: Deletes an existing user, where there is no longer any activity.
Reports:
Team member should add hourly report, so that team leader can see what he has
done in that day. Team Leader should also add hourly report, so that project
manager can view the status of the project. By seeing both reports project manager
should add a daily report, so that they can see the status of the project.
Methodology
• RAD/Waterfall Model
Project Instructions:
• Identify the significant class entities and carry out class modeling.
• Carry out Detailed design of Classes, Database objects and other solution
components.