Sunteți pe pagina 1din 24

PRIVATE INSTANT MESSAGING

Abstract Instant messaging (IM) and chat are technologies that facilitate near realtime text based communication between two or more participants over a network. It is important to understand that what separates chat and instant messaging from technologies such as e-mail is the perceived synchronicity of the communication by the user - Chat happens in real-time before your eyes. For this reason, some people consider communication via instant messaging to be less intrusive than communication via phone. However, some systems allow the sending of messages to people not currently logged on (offline messages), thus removing much of the difference between Instant Messaging and e-mail. Instant Messaging allows instantaneous communication between a number of parties simultaneously, by transmitting information quickly. IM allows effective and efficient communication, featuring immediate receipt of acknowledgment or reply. In certain cases Instant Messaging involves additional features, which make it even more popular. The project deals with the development of small instant messaging tool over the intranet. This will be used with in the small private network. Requirements HARDWARE Processor: Intel Core 2 Duo RAM: 2 GB Hard Disk: 120 GB SOFTWARE Operating System: Microsoft Windows Vista Home Premium Programming Language: Java (JSDK 1.6) Modules: User Interface Module Network Module

Activity Control system


Abstract Activity Control System (ACTITIME) is a time collection software that is streamlined for billing and invoicing purposes. ACTITIME allows time tracking for customer and project related tasks. After being collected the data can then be exported for invoice generation. The major tasks, which are performed by the current project are:

1. 2. 3. 4. 5.

Create user accounts Register billing types (optionally) Register customers Register projects Add tasks

After completion of these steps we will be ready to submit time-track.

Create user accounts

Login as the Root system user for initial set up of user accounts. To log in provide username 'root' and password 'manager'. The Root is a pre-defined system user that always has all access rights except the right for time-track submission. Access rights of the Root user cannot be modified. The Root user cannot be deleted. For security purposes change the predefined password of the Root user before proceeding with data setup. To change password of the Root user follow the instructions listed in the section Add system users and grant them access rights necessary for their everyday work. Each user can be granted one or more access rights. The role executed by a user, as well as the category a user belongs to, depend on the access rights granted to the user. There are no pre-defined user categories (or roles) in ACTITIME. We need to grant a user those access rights that are necessary for his/her everyday work, and that is all.

If you are going to track overtime, enable overtime tracking when creating user accounts. Otherwise it is recommended to keep overtime tracking disabled because this will simplify interfaces for the time-track submission. Register billing types (optionally) If you are going to classify tasks using billing types, create the necessary billing types now. You can skip this step and return to creation of billing types later. In this case all created tasks will be associated with the default billing type. If you decide to use nondefault billing types, you will have to update this association for all existing tasks after creation of the billing types.
,

Register customers ACTITIME collects time expenses for tasks associated with particular project and customer. So before creation of tasks you should register at least one customer and one project. Register projects Before adding tasks you should create at least one project associated with a customer registered on the previous step.

ABSTRACT
Attendance through SMS This system helps the college management to communicate the details of the attendance and marks to the parents through SMS. This system makes use of the database built using biometric finger print reader for the attendance. Then by generating reports on each day it will identify the students who have less percentage of attendance than the required aggregate percentage .It sends the messages to the mobiles of the parents about the attendance and marks details. Apart from this whenever the parents want to know about their students attendance and marks they can directly login into the site or they can send message to the administrator by giving that particular students registration number and they can get return message.

ABSTRACT

AJAX BROWSER

We propose a new web browser for Ajax approach with asynchronous communication model. Our web browser can improve the operationality that is equivalent to the operationality of desktop applications without revising program codes of the web applications. When the user requests for a page, the browser displays the HTML page according to the source code given by the server. When we click Refresh button, the browser does not load the whole page again as in classic web application model. Instead, the server compares the existing page and the requested page and maintains the differences in a difference table. Only those parts of the page where changes occurred are loaded.

Our browser has the following features (1) No change of client programs and server programs of web applications, (2) Asynchronous communication with web servers, (3) Partial screen update replaces click, wait and refresh user interaction model.

MODULES:

1. Parsing: HTML source is analyzed by a parser based on HTML tags. Syntax trees are generated by the parser. Nodes of the syntax tree mean HTML tags; leaves of the syntax tree mean text contents such as String, numerical, and JavaScript codes.

2. Generating JavaScript: The original HTML source does not have a function of partial updating. Therefore, new JavaScript codes are added to the original HTML source. The JavaScript codes

refer to the difference table. JavaScript codes including innerHTML method are inserted to the original HTML source. 3. Searching difference: With comparing the two syntax trees, difference between the two web pages is detected. If partial update of the web page is required, a difference table is generated. The difference table includes the difference node information such as tag name, ID, tags properties, text

4. Updating partially: According to the difference table, a current web page added JavaScript codes updates partially. In order to update, the current web page accesses to the difference table at constant intervals. The reason of the constant accessing to the difference table is that the current web page in the Main block is executed independently from the communication with a web server in the Sub block. In the Sub block in the model, communication with the web server occurs corresponding to events such as clicking reload button or automatic reload. In short, the Main block and the Sub block in the model are executed independently each other. Only accessing to the difference table is a relationship between the two blocks. Therefore, the asynchronous communication with web servers can be achieved.

TECHNOLOGIES USED: Java script HTML Java Swings

ABSTRACT
COLLEGE ADMINISTRATION SYSTEM College administration led by the administrator works with students, academic and support staff to ensure the effective administration of all matters of students admission, fee details, contact details, transfer of students.

The administrator assigns different userids and passwords to clerk and accountant so that he shares his work These are the people responsible for entering and making changes to the entered data.so,the username and password are highly secured.

The administrator have all rights over the system.clerk is responsible for contact details and transfer of student modules.He can update the contact details and checks the availability for transfer of students in the beginning of second year.

Accountant is responsible for fee module.He enters the fee details into the database. It is easy for the college administration to know the students dues and send particular notice to them.

Abstract Title: Compressor and De-Compressor


In computer science and information theory, data compression or source coding is the process of encoding information using fewer bits (or other information-bearing units) than an unencoded representation would use through use of specific encoding schemes. One popular instance of compression with which many computer users are familiar is the ZIP file format, which, as well as providing compression, acts as an archiver, storing many source files in a single destination output file. As with any communication, compressed data communication only works when both the sender and receiver of the information understand the encoding scheme. For example, this text makes sense only if the receiver understands that it is intended to be interpreted as characters representing the English language. Similarly, compressed data can only be understood if the decoding method is known by the receiver. Compression is useful because it helps reduce the consumption of expensive resources, such as hard disk space or transmission bandwidth. On the downside, compressed data must be decompressed to be used, and this extra processing may be detrimental to some applications. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it's being decompressed (the option of decompressing the video in full before watching it may be inconvenient, and requires storage space for the decompressed video). The design of data compression schemes therefore involves trade-offs among various factors, including the degree of compression, the amount of distortion introduced (if using a lossy compression scheme), and the computational resources required to compress and uncompress the data.

Modules:
Compression Module: This module is used to compress any file to save the disk space. This includes the usage and implementation of data compression algorithm for the compression of the files. De compression Module: This module will take the compressed file as the input and generates or rebuilds the original file by the implementation of de compression algorithm. Technologies Used: Programming Language: Java (Java SDK version 1.5.0) Operating System: Microsoft Windows Xp with Service Pack 2

ABSTRACT CRYPTOGRAPHY
When a number of computers are interconnected to form a network, the protect mechanisms within the individual computers become inadequate to ensure the security of data communications across the network. Preventing the disclosure of original message is not the only aspect of security in data communication systems; others include protection against alterations and introduction of false messages. Cryptography has appeared as the best measure for data security in computer communication systems by transforming the original data into an unintelligible form. It serves as a countermeasure to passive wiretapping attacks and also as a foundation on which countermeasures against active wiretapping can be constructed. There is a strong need for the general tools of utility, which can convert a plain text-file into a cipher file and vice-versa, for every user who intend to transfer/ receive text/data on the network. For this purpose, I implemented the cryptographic techniques as general tools of utility, which can be used to encrypt / decrypt the files, which roam on the network. In this project "Implementation of cryptographic techniques for secure file transfer" three very popular cryptographic techniques: /. Transposition Cipher 2. Substitution Cipher and 3. RSA (Rivest, Shamir & Adleman) public key cryptographic scheme are implemented in software written in 'C'. 1. Implementation of Transposition Cipher In this implementation, the original plain text is transformed by changing the positions of characters of message plain text. A keyword of 8 characters length is used to transform the message text and written to the destination file. The encrypted file may be transferred to the destination where the file is read and arranged according to the 8-character-key, which is then written on to a file. This file contains the original message plain text. 2. Implementation of Substitution Cipher In this implementation, the original plain text is transformed by substituting each character of the message plain text by another character. A mono-alphabetic substitution is used in this implementation.

Here the key taken is 52 characters length, which contains all the small case and capital letters of English text, which are used for substitution. 3. Implementation of RSA (Rivest, Shamir & Adleman) public key Cryptographic scheme Firstly, two large prime numbers p and q, each about 100 decimal digits long are selected and their product n = p*q is obtained. Then Eulers function z = (p -1) (q - 1) is computed. Choose a number relatively prime to z and call it d. Find e such that e x d = 1 mod z. To encrypt a message P, compute C = Pe (mod n). To decrypt C, compute P = Cd (mod n). The pair of positive integers (e, n) is termed as the encryption key and the corresponding pair of integers (d, n) as the decryption key. Each user makes his encryption key public, i.e., known to everyone on the network and keeps the corresponding decryption key secret with himself

This program is used to encrypt data files and decrypt the encrypted files. As data security mechanisms can generally be developed independently of

Defect Tracking for Improving Product Quality and Productivity Vision This project is aimed at developing a Defect Tracking for Improving Product Quality and Productivity useful for applications developed in an organization. The Defect Tracking for Improving Product Quality and Productivity is a web based application that can be accessed throughout the organization. This system can be used for logging defects against an application/module, assigning defects to individuals and tracking the defects to resolution. There are features like email notifications, user maintenance, user access control, report generators etc in this system. This system can be used as an application for the any product based company to reduce the defects in products quality and productivity. User logging should be able to upload the information of the user. Following tasks can be performed with the application: (a) User Maintenance: Creating, Granting & Revoking access and deleting users from application. (b) Component Maintenance: Creating a component (application being developed / enhanced), Granting & Revoking access on components to Users and Marking a component as Active or Closed. (c) Defect Tracking: Creating, Assigning defects to users, Modifying and Closing a defect. A defect screen should at least have following details Defect Number and Title Defect priority Date created Defect description Defect diagnosis Name of originator Name of Assignee Status Resolution (d) Find User: A search screen to find users and display results (e) Find component: A search screen to find components and display results (f) Find defect: A search screen to find defects and display results (g) Report: Generate reports on defects Accordingly there would be following levels of user privileges: Application admin having all privileges. Component admin having privileges (b),(d),(e),(f) for the components they own. Users having privileges for (b),(d),(e),(f) for components they have access to. All should have privileges for (c).

Project Specification Functional Components

1. A user should be able to Login to the system through the first page of the application. Change the password after logging into system. View the defects assigned to the User. Find defects for components on which the user has access. Find components on which the user has access. Modify the defects by changing / putting values in fields. Assign defects to other users having access to the component. Find details of other Users. Generate reports of defects for components on which the user has access. 2. As soon as a defect is assigned to a user a mail should be send to the User. 3. A Component Admin should be able to do the following tasks in addition to 1: Add a User to the component for creating and modifying defects against that component. Remove a user from the component. Mark a component as Active / Closed. No new defects can be created against a Closed component. A component cannot be closed until all defects against the component are also closed. 4. The Application Admin should be able to do the following tasks in addition to 1 & 3: Add a new component. Add a user to a component as Component Admin. Remove Component Admin privilege from a user. Add a new user. Remove a user. User Interface Requirements Database Requirements Integration Requirements Preferred Technologies Web based , user friendly interface

Centralised Web/Pervasive enabled Solutions must be created using HTML, CSS (Web Presentation ) JavaScript (Client-side Scripting) Java (as programming language) JDBC, JNDI, Servlets, JSP (for creating web applications) Eclipse with MyEclipse Plug-in (IDE/Workbench)

Other Details

Oracle/SQL Server/Access (Database) Windows XP/2003 or Linux/Solaris (Operating System) BEA WebLogic/JBoss/WebSphere (Server Deployment)

The application should be highly secured and with different levels & categories of access control.

ABSTRACT

Electronic descriptive examination managing system is a computerized way of conducting present day paper-based descriptive examinations in a university by providing much user-friendliness to students, staff, invigilators and administrator. Every student has to submit his user-id, course, year of study, branch, and subjectcode details before taking the exam. This system eliminates the use of paper from question paper setting to viewing results by the student and also provides the security to the answer sheets from illegal modifications. The actors involved are: 1. Student 2. Staff 3. Invigilator 4. Administrator. After entering into the system, student has to answer the question paper in the text area provided to him for each question. After writing the exam, the student submits the exam. To protect the answer sheet from illegitimate modifications, the system converts it into PDF before storing in the server. Depending on the subject code, answer sheets belonging to a particular subject are automatically uploaded to corresponding staffs user. Staff member who is going to correct this particular subject can access these answer sheets by logging into his user-id. After evaluating the paper, marks are allotted for each answer depending on his performance. These marks will be entered into the database by the staff after correcting the paper. Invigilator logs into the system to authenticate the exam written by the student. He gives feedback regarding absentees, debarred candidates, technical problems etc to the system. After evaluation is carried out, students can view the marks obtained for each subject, and for each question in each subject. Administrator is the main person who maintains the system. He performs main functions like entering and maintaining student details, staff details, invigilator details and exam settings. This system enables us to conduct the exam process completely from the allocation of invigilators, allocation of staff for evaluating each subject, allotting marks, viewing marks etc. The main advantage of the system is that it provides security to the answer sheets written by students.

E-Procurement System ABSTRACT The proposed system is a 24*7 online solution, which provides the traditional tendering process in an electronic form. It should provide an easy way of tendering and these should not be any difficulty in the usage of the system even in the absence of the person. It is meant for use by the department people and contractors. The department people are responsible to invite and evaluate the tenders where as the contractors are responsible to download and submit the tenders. Further the proposed system should be in such a way that it need to be accessed from anywhere.
Advantages of Proposed System: Provides an easy way of selecting a tender. Able to access the information from anywhere in the world. Minimum effort is needed Data consistency is maintained. Requirements Specification: SOFTWARE SPECIFICATION Operating System: Windows XP Front End: J2EE Back End: Oracle 10g HARDWARE SPECIFICATION Pentium III processor 128 MB RAM Hard disk 40 GB Microsoft Compatible 101 or more Key Board

E-Zest

The system aims at the maintenance and management of the different accommodations that are available in the different parts of the world. It mainly takes care of the resort management at the core area of the database. The system provides the information regarding the different resorts that are available and their status specific to availability. The database also manages the atomic information regarding the different units that are available under one resort and the architectural details of the Unit facilities that are available. Each unit is well furnished and is well designed for the basic flexibility of the tourists who are expected to stay. The guests can visit the site and register themselves with the required information that is expected by the system. Each registered guest can raise a request for the unit bookings. The Guests are scheduled with the information of the availability of the units for they have requested the time. The Units maintenance is automated for proper management of the availability status of the units or the scheduled expected date of their availability in near future. The system provides the facility for booking of the required available units as per the number that is available. The system totally built upon the standards of Three Tier Architecture with Client, Business and Data Tiers associated as separate layers, with specification to high cohesion and loose Coupling Standards for easy maintenance.

The entire project has to be developed keeping in view of the Distributed client server computing technology in mind.The specification have been normalized upto 3NF to eliminate all the anomalies that may arise due to the database transactions that are executed by the actual administration and users.The user interfaces are browser specific to give distributed accessability for the overall system.The internal database has beeb selected as Oracle 8i.The basic constructs of the tablespaces, clusters and indexes have been exploited to provide higher consistency and reliability for the data storage.The oracle 9i was a choice as it provides the constructs of high level reliabiity and security.The total front end was dominated using HTML standards applied with the dynamism of JAVA server pages. Thecommunicatin client was designed using servlets and JSPs. At all proper levels high care was taken to check that the system manages the date consistency with proper business validations.The database connectivity was planned using the Java DataBase Connectivity,the authorization and authorization was cross checked at all stages.The user level accessabiity has been restricted into two zones the administrative and the normal user zone. The Bean components have been implemented for proper reusability and authenticity. The standards of security and date portative mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports which re produced as per the applicable strategies and standards that are put forwarded by the administrative staff..

Abstract Hiding Info using Video Steganography


The project entitled Video Steganography is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography.

Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography.

The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.

Abstract

HRMS
The main aim of the project is to develop a Human Resource Management system for the Intranet Automation of HR Software .HR system provides the information regarding the employees I the company. The system has been to facilitate good Interaction/ communication facilities between the employees and HR Administration. The web pages about an employee are created dynamically based on the user id and password and links are provided to web pages containing information about employee General details , Contact details ,skill details etc., he also has the facility of viewing a summary report of all the projects done by a particular employee. A list of all employees is provided along with employees Designation and Department.

Job Scheduling and Status Tracking


ABSTRACT

Job scheduling & Status tracking system is a web based application which helps a workgroup to keep track of tasks (jobs) via a shared central resource. Job Management is todays most advanced job scheduling application designed to automate critical IT processes and workloads intelligently across disparate systems and applications to render business processes securely and reliably.

The data is stored centrally on the server, which make it especially suitable for distributed teams who can use just the web browser to access it. No local software needs to be installed on the client system and all web browsers are support.

The main objective of the system is to prioritize the job schedules and allow us to meet promise dates. Status tracker focuses on workers report on what they have completed, and the materials they have used in real time. Using terminals out on the shop floor, bar coding, or webbased reporting, employees can directly enter their time and materials for the jobs they are working on. The actual cost of the employees time, materials cost and status of a job is available for management analysis. Exception reporting when a job is not running as scheduled.Inventory is also updated.The application itself can be installed virtually on webserver.

Mobile Banking

In todays age of new opportunities and emerging technologies, there is a new communications infrastructure to transform the way business is done. Using simple and cheaper hardware such as mobiles and handheld devices we can communicate & also we can do business transactions. It provides much better mobility than PCs. Technology is moving towards mobiles which has wide spread usage and acceptability. Lot of protocols and softwares has been developed. We are connecting the mobile to bank database using WML (Wireless Markup Language) scripts and java technology. This opportunity is mobile commerce, and it will drive new levels of intense competition in the finance industry. Mobile commerce achieves this by removing the traditional restrictions of geographical location and high entry costs. This time the result on the finance industry will be led by a new weapon i.e., the mobile phone. We are providing a wide range of mobile banking for individual clients, including balance checking, amount transfer, stop payment, request check book, mini statement, etc.

Abstract: Multibanking System Multi Banking System is create a common portal for multiple banks. So users can login here and can. Access any of the available banks and can do required transactions. Existing System:

Currently we are having lot of banks in the market and any person can do transactions of any individual bank either manually or in online. But no one can do all banks transactions with in a single portal or in single Bank.
Drawbacks of Existing System:

No one can do all banks transactions in a single portal or in single Bank. This is the main disadvantage in existing system to avoid this problem we are introducing multi banking system.
Proposed System: The Multi Banking System Interface is targeted to the future banking solution For the users who is having multiple bank accounts in multiple banks. This Interface integrates all existing banks and provides business solutions for both Retail and corporate. This system acts as a standard interface between the clients and all the banks, By using this portal any client who maintain accounts in various banks can directly log on to Multi Banking System Interface and make any kind of transactions.
INTRODUCTION

Repository and Alumuni Search Engine

Abstract
Alumni are the former students of the college. Once a student graduates from the institute, his/her professional life or career begins. The main purpose of this project is to provide a platform for the students through which they can be in contact with the administration of the college and friends after passing out from the college. 1.2 Overview: The Repository and Search Engine is an Internet based application that can be accessed throughout the World. Anyone can access the Search Engine to know about any Alumni of that college. The main functional components of this system are: 1. Administrator 2. Student/Alumni 3. Guest User Administrator can perform the following functions: Responsible for the accounts of all students. Add new event details. Add campus interviews details. Student can perform the following functions: Can register into system. Students can login into the system. Update the profile. Can search any registered student. Can see the events details. Students also can see the campus interview details. Guest user can just view the various details of the college and can search the details of any student.

S-ar putea să vă placă și