Sunteți pe pagina 1din 35

Presentation (Seminar)

on
E-Sales Processing, Authenticating & Dynamic Logistics
System Management
Presented By
Akshay Kshirsagar Badal Sahare
Abhijit Parate Lalit Gaikwad

Department of Computer Science and Engineering


Priyadarshini J. L. College of Engineering, Nagpur
Session 2016-2017
Why we choose this project ?
Advantages of E-Sales
 Convenience
 Better prices
 More variety
 You can send gifts more easily
 Fewer expenses
 Price comparisons
 No crowds
 Buying old or unused items at lower prices
Product Types
 Simple
 Grouped
 Virtual
 Asunder
 Downloadable
What is About Project ?
 Platform Independent
 Easy to Access
 Dynamic
 Full Control
 Reliable
 Easy to Use
 Very Secure
 Compatible
 Easy to Upgrade
 Multiple Accessing
Methodology

 CMS
 Wordpress
 Woocommerce
 Ajax
 HTML
 Java Script
 Data Warehouse Concept
 Data-mining Tools
 Payment Gateways
Objectives

 Global Marketing
 Reach to Everyone
 Advertisements
 Big Platform
 Products
 Purchase/Selling
 Service
 Feed Back
Details
 Order Management
 Change the order
 Edit order Items
 Manage Stock
 Electronic tickets
 Print on demand
 Tele-conferencing
 Instant messaging
 Order Processing
 Pending payment
 Failed
 Processing
 Completed
 On-Hold
 Cancelled
 Refunded
 Authenticated order management

 Cart Discount
 Order Discount
 Shipping cost
 Shipping method
 Cart tax
 Shipping tax
 Payment method
 Authenticated Shipping Management:

 Local Pickup
 Free Shipping
 Local Delivery
 International Delivery
 Configuring Shipping Settings
 Report Generator

 Orders
 Sales by Date
 Sales by Product
 Sales by category
 Customers
 Stock
Presentation (Seminar)
on
Monitoring Suspicious Discussions on
Online Forums Using Data Mining
Presented By
Akshay Kshirsagar Badal Sahare
Abhijit Parate Lalit Gaikwad

Department of Computer Science and Engineering


Priyadarshini J. L. College of Engineering, Nagpur
Session 2016-2017
INTRODUCTION
 This communication channel provides an effective channel for illegal
activities such as dissemination of copyrighted movies, threatening messages
and online gambling.
 We propose a system which will tackle with this problem. In this project we
had used a data mining algorithm to detect criminal activities and illegal
postings.
 Our proposed system will download postings from selected discussion
forums continuously and employ data mining techniques to identify hot
topics and cluster authors into different groups using word-based user
profiles
 This system will use text data mining technique.
 This system monitors and analysis online plain text sources such as Internet
news, blogs, etc. for security purposes.
 This is done with the help of text mining concept.
OBJECTIVE

 To reduce illegal activities on internet.


 To provide the security.
APPLICATION
 This application can be used by many websites for security
purpose.
 Reduce the Illegal Activity held on Internet
HARDWARE AND SOFTWARE
REQUIREMENT
Software Requirements:
 Windows
 Sql
 Visual studio 2010

Hardware Components:
 Processor – Dual Core
 Hard Disk – 50 GB
 Memory – 1GB RAM
 Internet Connection
ADVANTAGES

 This system will reduce illegal activities held on


internet.

 This system will provide security for many websites..

 This system will act as an evidence for investigation.


DISADVANTAGES
 If internet connection fails, this system won’t work.
REFERNCE

 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6079606&queryText=Auto
matic+Online+Monitoring+and+DataMining+Internet+Forums&newsearch=true&sea
rchField=Search_All
Presentation (Seminar)
on
Curser Movement using Hand Gesture
Recognisation

Presented By
Akshay Kshirsagar Badal Sahare
Abhijit Parate Lalit Gaikwad

Department of Computer Science and Engineering


Priyadarshini J. L. College of Engineering, Nagpur
Session 2016-2017
ABSTRACT

 Development of machine-user interface.


 The main aim is to enable human to interface with the machine
and interact naturally without any mechanical devices.
 Hand gesture can be recognition using simple computer vision
and multimedia techniques.
INTRODUCTION

 Vision-Based Human-Computer Interaction through Real-Time


Hand Tracking and Gestur Recognition.
 Vision-based interaction is an appealing option for replacing
mouse or touchpad.
 We propose a system for using a webcam to track a users hand
and recognize gestures to initiate specific interactions.
OBJECTIVE

 Mouse free: To communicate with machine without mouse easily.


 Cost: To reduce the cost of mechanical device.
 Accessiblity: To easily communicate with machine.
PLATFORM

 SOFTWARE REQUIRMENTS:
I. Operating System: Windows XP, Windows vista, Windows
7,8,10.
II. Code Behind: JAVA (Red Hat or Eclipse).
PLATFORM

 HARDWARE REQUIRENTS:
 Processor:Minimum Pentium4.
 Processor Speed: Minimum 1GHz.
 RAM Capacity:Minimum 512 MB.
 Hard disk:Minimum 40GB.
 Monitor:Minimum 15SVGA.
 Webcam.
APPLICATION

The Propose technology has wide applications in the


fields of:

 computer graphics.
 computer gaming.
 Prosthetics.
 Biomedical instrumentation.
ADVANTAGES

 The system is easy to install.


 It can be used as easy as mouse control for users.
 It is not an electronic based system so one can easily make use of
laptops to install this system.
 It is cost effective.
 It reduce energy usage.
DIS-ADVANTAGES

 It requires a lot of mmory.

 The alarm it has limited accuracy.

 The system might run slower on certain computers with low


computational capabilities.
REFERENCE
 Hojoon Park, “A Method for Controlling the Mouse Movement using a
Real Time Camera”, Brown University, Providence, RI, USA, Department
of computer science, 2008.
 Chu-Feng Lien, “Portable Vision-Based HCI – A Realtime Hand Mouse
System on Handheld Devices”, National Taiwan University, Computer
Science and Information Engineering Department.
 Kamran Niyazi, Vikram Kumar, Swapnil Mahe, Swapnil
Vyawahare, “Mouse Simulation Using Two Coloured
Tapes”, Department of Computer Science, University of
Pune, India, International Journal of Information
Sciences and Techniques (IJIST) Vol.2, No.2, March 2012.
THANK YOU !

S-ar putea să vă placă și