+ All Categories
Home > Documents > Application Project Titles & Abstracts

Application Project Titles & Abstracts

Date post: 10-Nov-2014
Category:
Upload: kalamsoftware
View: 37 times
Download: 2 times
Share this document with a friend
Popular Tags:
67
APPLICATION PROJECT ABSTRACTS 1. 1. Remote Task Monitoring System Remote Monitoring System is a versatile utility program that can perform much different protection for our personal computer and network system. On activation of this Remote Monitoring System, it records the process running on the specified system, the applications used by other users and stores them in log files. It will record all the. It records all the applications opened and executed. Remote Monitoring System also performs screen capturing. We can capture all desktop. We can capture the screen when a new window got focus or at fixed time intervals. Access to the Remote Monitoring System can be prevented with a password. The Application can be run minimized in the system tray or invisibly in stealth mode. It also helps the user to work on the files from the client system on a networking system. Some specified application can be blocked by the user which will be terminated by the system automatically.
Transcript
Page 1: Application Project Titles & Abstracts

APPLICATION PROJECT ABSTRACTS

1. Remote Task Monitoring System

Remote Monitoring System is a versatile utility program that can perform much different

protection for our personal computer and network system. On activation of this Remote

Monitoring System, it records the process running on the specified system, the applications used

by other users and stores them in log files. It will record all the. It records all the applications

opened and executed.

Remote Monitoring System also performs screen capturing. We can capture all desktop.

We can capture the screen when a new window got focus or at fixed time intervals. Access to the

Remote Monitoring System can be prevented with a password. The Application can be run

minimized in the system tray or invisibly in stealth mode.

It also helps the user to work on the files from the client system on a networking system.

Some specified application can be blocked by the user which will be terminated by the system

automatically.

It will automatically store all the files and we can view from the server and we can set

options from the server also. The Remote Monitoring System can be run in any of the Windows

Platform such as Windows Me/NT4/2000/XP.

The Remote Monitoring System operates in the background, hidden in the system tray.

The application is fully password protected and is active at the time of boot up.

Page 2: Application Project Titles & Abstracts

2. STUDENT INFORMATION SYSTEM

The project work entitled as “STUDENT INFORMATION SYSTEM” is

designed to manage the student activities of the Department. Student information system

includes Student Details, Student Parent Details, Student HSC marks, Student Academic Details

with Internal marks and Semester marks, Student Achievement Details.

This project gives the user, the following features to perform the activities.

Master Maintenance

Backup and History

Generating Reports

Master Maintenance

System requires maintenance of certain database on activations will be taking

place. The responsibilities of maintaining the data is divided among the user and the modules

of the system.

Backup and History

Daily backup’s are to be taken for all the data maintained in the system. The user

may create history files whenever he or she wishes.

Generating Reports

System provides a number of outputs. All these reports can be either viewed on

the screen or printed by the user.

The software is developed in VISUAL BASIC.NET as front end and SQL

SERVER as back end. This project gives all the details about STUDENT INFORMATION

SYSTEM

Page 3: Application Project Titles & Abstracts

3. ONLINE TEXTILE SHOPPING

This project ONLINE TEXTILE SHOPPING is used mainly to reduce the major part

of the manual work in the concern. And all the data, which is given into the computer, is stored

in the database and this also makes the concern to maintain a very less number of files in them.

Also this project is an online project so the customers has an advantage that they can shop their

Dress by sitting in their home itself with their credit cards.

This project has the search options, which helps a lot for customers who are searching for

a particular Dress. The purchased Dresses will be delivered to their home itself.

This project entitled ONLINE TEXTILE SHOPPING has four main modules and has

been developed with ASP.NET as front end and SQL SERVER 2000 as the back end in

Windows XP platform.

Page 4: Application Project Titles & Abstracts

4. Active Source Routing Protocol

An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily

located in such a manner that the interconnections between nodes are capable of changing on a

continual basis. The primary goal of such an ad-hoc network routing protocol is correct and

efficient route establishment between a pair of nodes so that messages may be delivered in a

timely manner. LAR is an on-demand protocol who is based on the DSR(Dynamic Source

Routing). The Location Aided Routing protocol uses location information to reduce routing

overhead of the ad-hoc network! Normally the LAR protocol uses the GPS(Global Positioning

System) to get these location information’s. With the availability of GPS, the mobile hosts

knows there physical location.

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike

traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure.

Instead, hosts rely on each other to keep the network connected. The military tactical and other

security-sensitive operations are still the main applications of ad hoc networks, although there is

a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main

challenge in design of these networks is their vulnerability to security attacks. In this paper, we

study the threats an ad hoc network faces and the security goals to be achieved. We identify the

new challenges and opportunities posed by this new networking environment and explore new

approaches to secure its communication. In particular, we take advantage of the inherent

redundancy in ad hoc networks — multiple routes between nodes — to defend routing against

denial of service attacks.

Page 5: Application Project Titles & Abstracts

5. DIGITAL STEGANOGRAPHY

Steganography concentrates on hiding a message in an innocuous carrier to try to conceal

the existence of the message. It is the technique to hiding a message within images, or in audio

file, or in video files. To protect the data from attackers and hacking the message this technique

can be of very much important.

In this project deals with hiding the image or text files with in an image and

transmitted .in this project the image or text to be transmitted is being encrypted, compressed and

then embedded with some other image. At the receiving end the file is being extracted,

decompressed and decrypted.

In this project, the message supplied by the user will be inherited with Image files, in

order to make the message as raw one. When hackers trapped the image file containing the

message they can’t see or hear any message embed within it. They could see the clear image

only. The message can be read by the authorized person by providing correct password.

Every pixel of Image files will be extracted and replaced subsequent with text typed by

the user. It could be done by lose less algorithms. Visual Basic.Net will be the front-end tool for

this project.

Modules in this project are:

Text Editor

Image Browser

Hide message with Image File

Password Authentication

Reveal the Original Message

Page 6: Application Project Titles & Abstracts

6. PORT SCANNER

A “Port Scanner” is a piece of software designed to search a network host for open

ports. This is often used by administrators to check the security of their networks and by hackers

to compromise it. To scan the port a host is to scan for multiple listening ports on a single target

host. To port sweep is to scan multiple hosts for a specific listening port. The latter is typically

used in searching for a specific service.

Port Scanning is one of the most popular reconnaissance techniques attackers use to

discover services they can break into. All machines connected to a Local Area Network (LAN)

or Internet run many services that listen at well-known and not so well known ports. A port scan

helps the attacker find which ports are available (i.e., what service might be listing to a port).

Essentially, a port scan consists of sending a message to each port, one at a time. The kind of

response received indicates whether the port is used and can therefore be probed further for

weakness.

TCP - Transmission Control Protocol and UDP - User Datagram Protocol are two of the

protocols that make up the TCP/IP protocol suite which is used universally to communicate on

the Internet. Each of these has ports 0 through 65535 available so essentially there are more than

65,000 doors to lock.

But the virtual port scanning is happening at now. Through this the user can verify

whether any port HTTP, FTP, or SMTP is available, that is open. If so the user can send any

application, or program to the client machine. The server monitor is always keeping on watching

the client machine for port sweeping. The available and open port can be interrupt by the server

administrator.

This application is developed using socket controls, and remoting namespace available in

Visual Basic.Net. The server will ping the client to establish the connection between the server

and client. Once it is achieved the other process is above one.

Page 7: Application Project Titles & Abstracts

7. WEB BASED ADVERTISEMENT AGENCY

SYNOPSIS

In this competitive world everyone needs to achieve their goals within the short span of

time. Like business it developing its wings in enormous way. For that every concern needs to

reach their customers as quick as possible. The mantra for success in marketing field is to

murmuring the success keyword before it comes to the market.

The aim of this project “Web Based Advertisement Agency” is helps the user to post

web based advertisements in online. Users of any kind accessing this website can view the

various free advertisement placed or displayed on this website. In the same way any registered

user can create and can post this advertisement to the website or can order to display on selected

web URL.

To maximize the potential power of every concern, the advertisement plays a vital role.

To computerize the activities developed to succeed the previous manual work. Computerize the

work like Advertising increase its potential, gives reliability, accuracy in any field.

The information supplied by the viewer or user of the website, parsed by the web admin,

verified and checked for the reliability. Once the information acquired from the user is

acknowledged then the admin grants permission to create the advertisement. Then the created

advertisement will be placed in allocated place. The place where the advertisement will be going

to display is decided by the viewer who supplies the information.

This project has been developed by using ASP.Net as Front-end and MS-SQLServer as

Back end.

Page 8: Application Project Titles & Abstracts

8. Residential Life Tracking

The Residential Life Tracking system assists the administrative staff to systematically manage

student residential allocation issues, Resident inventories and room maintenance services.

By specifying the allocation criteria, the system is able to automatically generate room

allocation. Alternatively, the administrator may also arbitrarily choose available rooms for

transfer. Queries and reports are also available to help administrators make decisions based on

updated and relevant information.

Besides that, school administrators have the flexibility to configure and define Resident

buildings, blocks, floors and rooms. Should there be an ongoing renovation or repair work, the

status of the building, block or room affected can be deactivated to exclude it from room

allocation. Buildings can also be allocated by gender while guardians or wardens

responsible for the buildings can be stipulated with schedules generated.

The system also has a check-in and check-out function built in, which can be used for room

transfer and exchange, booking and reservation, key collection and such. This feature enables the

administrator to keep track of the tenant moving in and out of the Resident, and extended stay

during school and public holidays.

Modules

1. Resident area/building record system

2. Residents (Student, Faculty) Information management

3. Resident Room reservation

4. Resident (Student, Faculty) complaint record section

5. Resident Inventory Tracking

6. Resident Services management

Page 9: Application Project Titles & Abstracts

9. Knowledge Base Management System

Knowledge Management is the collection of processes that govern the creation,

dissemination, and utilization of knowledge. Knowledge management is the management of the

organization towards the continuous renewal of the organizational knowledge base - this means

e.g. creation of supportive organizational structures, facilitation of organizational members,

putting IT-instruments with emphasis on teamwork and diffusion of knowledge (as e.g.

groupware) into place.

The project “Knowledge Base Management System” streamlines the entire

documentation process for companies to share information with employees, customers, and

partners. The flexible, self-learning knowledge base captures and presents current, relevant

information to customers, in a Web self-service mode, and to agents through a flexible portal

within the single screen agent interface. It reduces the volume of e-mail access, phone calling,

conferencing, and seminar classes. It provides the facility Powerful search and retrieval

methodologies; ensuring customers receive rapid, accurate, and consistent responses.

This project is developed using Asp.Net as front-end and SQL Server as back-end.

Knowledge Management system is an intelligent, multi-user system. It enhances self-service

customer support, help desk operations, and document management applications.

The interactive users of this system are Authors (Knowledge creators), approver

(Knowledge Management) and customer or employee. The Authors can create, edit and organize

their knowledge. The approver will verify the knowledge and publishing it to the content of the

website. Finally it will deliver to the search process to share knowledge.

Page 10: Application Project Titles & Abstracts

10. HRMS Resource Planning

The revolutionary trends of computerization have reached the peaks achieving

global goals in all fields and sectors. The ERP-HRMS systems getting computerized are

leading to a new and innovative way to approach to above said. With the major organizations

hosting services of HRMS our project specifically aims to the total computerization of the

ERP-HRMS.

With the total automation of ERP-HRMS, the manual dependency is minimized to a large

extent. It inherits all the properties of computerizing a system which includes quick response,

less processing time, non-diligence, fast recovery, robustness, flexibility, reliability,

scalability.

Today’s trend demands high rate of automation for the ERP-HRMS as the organizations

a re growing in exponential form and maintaining employee records in a consistent format.

To satisfy the needs of clients, today’s organization need more and more of workforce. The

ERP-HRMS system takes care of this by taking in resumes from new aspirants and allowing

the HR to view them in and do selections there upon.

Page 11: Application Project Titles & Abstracts

11. Automated Vehicle tracking System

The ‘Vehicle tracking System ’ keeps track the information about the Vehicles, Maintenance,

Repair, Parts, Employees, Location and Vendors. It also keeps track the maintenance performed

for different vehicles which are used for transportation. The super users of the system are the

‘ADMIN’ and the ‘MANAGERS’ of the different departments allocated by the admin. The

admin may be the owner of the transportation organization or the manager of transportation

department of a particular manufacturing company.

If any other vehicle is added to the fleet which already exists for the

organization/department the details of the vehicle is added. The details includes whether it

is a new one or taken any loan/lease. Any employee is newly appointed or the existing

employee is taken off both the details are maintained including their personal details and

profession details.

The details of the maintenance that are being performed such as repairs/services and to

be performed are also maintained. The maintenance to be performed can also be scheduled

for each type of vehicles. The details of the parts/inventory used for the vehicles are

maintained. The reorder level and the reorder quantity are predefined for each particular

type of part.

The Vendors or suppliers of the vehicles, parts and performs maintenance required for

the vehicles. The particulars of the various vendors are maintained in this system.

Page 12: Application Project Titles & Abstracts

12. YARN-DEPOT MANAGEMENT SYSTEM

The project work entitled “YARN-DEPOT MANAGEMENT SYSTEM” is developed

for “Color World”. This project has been developed for any concern handling Yarn Details. The

Main objective of this project is to maintain inward and outward details with stock and to prepare

Billing details.

The system has been developed to reduce the response time and ensure flexibility. The

system also comfortable for further development and enhancement of the exiting system. It

computerizes the process of entire yarn department in real life. The type of yarns used for

production, the needles that are used for production, employee details, and daily transaction will

be maintained in the database.

This project has been developed by using Visual Basic 6.0 as Front-end and MS-Access

as Back-end. The entire application is developed to suite Windows XP/98 and above

configurations.

Modules in this Project are,

Master

Transaction Details

Yarn Availability View

Reports

Page 13: Application Project Titles & Abstracts

13. Advertisement Agency

In this competitive world everyone needs to achieve their goals within the short span of

time. Like business it developing its wings in enormous way. For that every concern needs to

reach their customers as quick as possible. The mantra for success in marketing field is to

murmuring the success keyword before it comes to the market.

To maximize the potential power of every concern, the advertisement plays a vital role.

To computerize the activities of an advertisement agency this project entitled “Advertisement

Agency” has been developed to succeed the previous manual work. Computerize the work like

Advertising increase its potential, gives reliability, accuracy in any field.

Here, this project Advertisement Agency has multiple activities in their day to day

activity. Like, they have to maintain their clients either new or golden customers, the details

regarding their customer, customer ad details, booking details, ad media details etc,.

This entire process has been converted into systemized. Front-end for this application is

Visual Basic 6.0 and MS-Access will be the back-end. Every module has its own unique nature

to maintain the records. The billing calculation module reduces the workload of ad agency owner

in the mean time of preparing the bill for their clients.

To computerize every activity it needs the detail study and grasping of field activity.

Finally the reports can be generated from Data Report to produce detailed reports for a weekly,

monthly or quarterly basis.

This project is categorized into some basic modules, they are, client details, order

booking details module, advertisement details module and billing calculation module. For every

module there should be one report is available.

Page 14: Application Project Titles & Abstracts

14. Efficient Broadcasting

An efficient broadcast scheme in mobile ad hoc networks is to determine a small set of

forward nodes to ensure full coverage. Previously used methods that guarantee coverage when

the local view of each node on its neighborhood information is updated in a timely manner then

we consider a general case where nodes move even during the broadcast process, making it

impractical to maintain up-to-date and consistent local views. A formal framework is used to

model inaccurate local views in MANETs, where full coverage is guaranteed if three sufficient

conditions, connectivity, link availability, and consistency, are met. Three solutions are proposed

to satisfy those conditions. First, we give a minimal transmission range that maintains the

connectivity of the virtual network constructed from local views. Then, we use two transmission

ranges, one for neighborhood information collection and the other for actual data transmission, to

form a buffer zone that guarantees the availability of logical links in the physical network. We

propose a mechanism called aggregated local view to ensure consistent local views. The

effectiveness of the proposed scheme is confirmed with performance analysis.

Page 15: Application Project Titles & Abstracts

15. LIBRARY MANAGEMENT SYSTEM

Library Management is related to library management which provides reading services to

its members. It will deal with the process of maintaining data about the books and many other

things as well as transactions, which are taking place in the library with respect to the issue and

return of the books. This solution helps the administrator to accomplish his tasks at ease.

Any student of any department from this college can become a member of the library by

filling a prescribed form. They can get the book issued, so that they can take home and return

them. Staffs also can take the books from the library. Any student can make use of it for

providing information about author, content of the available books.

Hence in the existing system for Library Management System, the performance

evaluation system and the maintenance are done manually. The proposed system will maintain

all the information in a standard database and will be able to generate reports as and when

necessary. Accessing and the user has the right to search based on the above mentioned criteria.

This Project entitled “Library Management System” is developed with asp.net as front

end and Sql server as back end.

This project Contains modules such as,

Admin Module:

Login, Create Group, Create Member

Books issue, Books Return, Transaction

User Module:

User Login

Update Profile

Page 16: Application Project Titles & Abstracts

View status

16. DEPARTMENTAL STORE MAINTENANCE SYSTEM

The project is entitled as “DEPARTMENTAL STORE MAINTENANCE

SYSTEM”. The main aim of this project is to computerize the daily activity performed in

departmental store. The daily transactions are sales & purchase. So, the computerization is a

must.

This project can be viewed into three modules such as purchase details, sales

details and stock details of garments. The DEPARTMENTAL STORE work as a whole sale

distributor for the products as well as retailer.

Purchase order is prepared once the stock of goods attains reorder level. After the

purchase bill of products, the quantity of that particular products are updated in the stock file.

During the sales also, the sales quantity is updated. Dealer payments are maintained.

The system generates the following reports needed for the organization.

Report on Daily stock details

Reports on Daily Customer details

Report on Daily Supplier details

Report on Daily Purchase details

Report on Daily Sales details

Page 17: Application Project Titles & Abstracts

17. Finance Automation

A broad category of software that deals with accounting and monetary

transactions. It includes payroll, accounts receivables and payables, general ledger, spreadsheets,

financial planning, check writing and portfolio management.

Finance automation is a specialized software application for the finance businesses.

With the Finance automation software will be able to efficiently and accurately manage your

finance contracts and relationships with customer and companies.

Features

Full Windows Application - with mouse, menus, and toolbars. Easy to learn and use, it's

similar to other Windows products. Aesthetically pleasing and readable screens - no codes or

encrypted messages. Get up to speed quickly and even a casual user can remain proficient.

Multiple networking support - runs on Microsoft Windows from 98 to XP. Provides greater

flexibility and ensures long-term support.

Modules

1.Master

a)Company Details

In the Company Detail Module all the Company details are got and maintained.

b)Branch Details

In the Branch Detail Module the Branch code for companies are created. This is based on

the Company Master

Page 18: Application Project Titles & Abstracts

c)Bank Details

In the Bank Detail Module all the details of the banks like Bank code, Bank name,

address are got and maintained.

d)Deposit Details

In the Deposit details Module the details of the depositor are got and maintained. It includes the

details like name of the depositor, address and their informations.

e)FD Party Details

In the Competitor Contact Module the details like the Fixed depositor’s are got and maintained.

It includes the details like name, their designation, department and communication address

f)Transaction Receipt Details

In the Transaction Receipt Details Module the details of the transaction receipt for a

particular transaction are maintained. It includes the details like Transaction no, Transaction Date

,Amount value,Incentives, Issue date,Receipt date,Receipt mode , Cheque, Bank charges and

Bank name.

g)Tax Details

In this module available government taxes for finance are maintained .It includes Tax

code ,Tax name and tax percentage.

2.Transaction

a) HP Transaction

Page 19: Application Project Titles & Abstracts

Through HP Transaction the activities performed by High Purchaser are monitored. It

includes details like name of the customer, Asset Name,Asset value, Amount financed Emi

Amount and Emi date.

b)Deposit Details

In the Deposit Details Module the details of the Deposit type, Interest rate, Deposit

Amount ,period, Repayment mode, renDate, Broker name, Broker type and etc.

c)Payments

In the Deposit Details Module the details of PTC no,name,payment date,coupon no,payment

mode,cheque/ddno,cheque/dddate,place,bank etc.

d)Closure Details

In the Deposit Details Module the details of closure no,closure date,closure

type,Inamt,investment,investment date, maturity date,paidamount,totalamount,payment mode

etc,

e)Part Refund Details

In the Deposit Details Module the details of the PTC no, refund date,depositor,depttype and etc

f)Renewal Details

In the Deposit Details Module the details of the new PTC no, renewal date,renewal type, old

PTC amount,trno,tramount,paidamount,new PTC amount and etc.

Page 20: Application Project Titles & Abstracts

3.Reports

This module generate all PTC information, interest rates, maturity list based on deposit type

wise or Transaction no wise for daily,weekly,monthl and yearly .This MIS report contains all

the details of day by day transactions. The following reports are created

a) PTC ledger

b) Interest Payments

c) Maturity List

d) PTC closure reports

e) PTC renewal reports

Page 21: Application Project Titles & Abstracts

18. Harnessing Depth Edges with Images

The project entitled “Harnessing Depth Edges with Images” has been developed to

identify the sharp edges for the given images, which are useful in various technical applications.

The ability to highlight the depth discontinuities makes it possible to produce stylized

photographs, which are useful in technical applications such as medical imaging. The depth

edges are important low-level features for many computer vision tasks, such as visual

recognition. Instead of using expensive, elaborate equipment for geometry acquisition, the

images can be easily exploited using this technique. The system looks for depth discontinuities

reducing the general 3D problem of depth edge recovery to one of 2D intensity edge detection.

Creating stylized images from photographs has recently received a great deal of attention. The

majority of the available techniques for image stylization involve processing a single image as

the input, using image processing and computer vision techniques like image segmentation etc.

Accurately locating edge point is important for image measurement.

Edges are generally characterized by sharp transition in grey level. They are important in

computer image processing. Many edge detection methods are based on the idea to find the large

difference area between the images. Edge detection is used to locate position where changes of

image values are large. The methods include grayscale method, mean removal method, deep

filter method, difference method etc. The system captures additional information compared to

traditional systems and therefore has the potential to enhance visualization. The system works

for images from devices and stored images. The system works well for the color images as well

as black and white images.

The accurate detection of depth edges is also useful in many object recognition

tasks and human–computer interaction applications. Pathology department’s produces

Page 22: Application Project Titles & Abstracts

documents involving surgical and autopsy specimens. The system involves special methods for

eliminating unwanted shadows, which aid the person in analyzing such documents.

19. PRODUCT SALES MANAGEMENT

Introduction

Product Sales Management software is general software developed for product selling stores and

other shops of the same type. This software helps them to do billing and account maintenance.

Purpose

The purpose of this document is to specify requirements and to give guidelines for the

development of above said project. In particular it gives guidelines on how to prepare the above

said project.

This document is intended to be a practical guide for people who developing this software.

Scope

As this is generic software it can be used by a wide variety of outlets (Retailers and Wholesalers)

to automate the process of manually maintaining the records related to the subject of maintaining

the stock and cash flows.

Goal

The main goal of the application is to maintain the records of Product Sales and account details

with cash transaction maintenance.

Overview

Product Sales Management software is very needy for general product selling stores. This

software help them maintain day to day transaction in a computer.

Page 23: Application Project Titles & Abstracts

20. ONLINE TOURISM

This project ONLINE TOURISM is used to reduce the major part of the manual work in the

concern. Customers can surf the places, hotels, travels and also they can specify their

requirements. Enquiring about places and facilities also available through online tourism. The

data which is given into the computer is stored in the database and this also makes the concern to

maintain a very less number of files in them.

Also this project is an online project so the customers has an advantage that they can Surf for

tourists spots and can make schedule by sitting in their home itself with their credit cards. This

project has the search option which helps a lot for customers who are searching for tourist spots.

Page 24: Application Project Titles & Abstracts

21. PUBLIC AUDITING IN CLOUD

Cloud computing is a long dreamed vision of computing as a utility, where users can

remotely store their data into cloud so as to enjoy the services from a shared pool of configurable

resources. Many users place the data in cloud, so maintaining the data with security is a prime

concern. Thus, enabling public auditability for cloud data storage security is of critical

importance so that users can resort to an external audit party to check the integrity of outsourced

data when needed. This work studies the problem of ensuring the integrity of data storage in

Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on

behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. Cloud

Computing moves the application software and databases to the large data centers, where the

management of the data and services may not be fully trustworthy. This unique attribute,

however, poses many new security challenges which have not been well understood. In this

project, we focus on cloud data storage security, which has always been an important aspect of

quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective

and flexible distributed scheme with two salient features, opposing to its predecessors. By

utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme

achieves the integration of storage correctness insurance and data error localization, i.e., the

identification of misbehaving server(s). Unlike most prior works, the new scheme further

supports secure and efficient dynamic operations on data blocks, including: data update, delete

and append. This project employs the JAVA technology.

Page 25: Application Project Titles & Abstracts

22. Result Automation:

PURPOSE:

The purpose of result automation system is used to manage the student result details of

the college in an efficient manner and no time wasting for checking the paper. In this project we

collecting all mark details and feed them in to database then we calculating the percentage of

individuals and ranking among them. We added comparitive between each subjects and also

departments. We added web scraping technique in our work. It is used to collect web information

automatically. The main objective of result automation system is to efficiently evaluate the

candidate thoroughly through a fully automated system that not only saves lot of time but also

gives fast results.

SCOPE:

Scope of this project is very broad in terms of other manually taking exams.

Few of them are:-

This can be used in educational institutions.

Can be used anywhere any time as it is a web based application(user Location doesn’t

matter).

Staffs can easly calculate the result summary details automatically.

FEATURES:

Secure

Easy to use

Reliable and accurate

Automatically calculate the result percentage

Page 26: Application Project Titles & Abstracts

23. Garments Industry Management

This project titled as “Garments Industry Management” is a network of facilities

and distribution options that performs the functions of procurement of Items, transformation of

these materials into intermediate and finished goods, and the distribution of this finished

products to customer.

This project devoleped in Visual basic 6.0 as front end and Microsoft access

as back end to store informations

These are some of the modules to be computerized.

MODULES:

Material Details:

This module contains detail description about material details used to store in the database. Such

as material name, type, unit etc

Buyer Details

This module used to store buyer details. Such as buyer name, address, phone, cst no, tin no etc

Party Details

This module used to stores the party details Such as party name, address, phone, cst no, tin no etc

Agent Details

This module used to stores the agent details Such as agent name, address, phone, etc

Lorry Details

This module used to stores the transport details Such as lorry no, driver name, phone no

Expenses

This module used to stores the expenses details such as bill no, date, expenses, amount

Reports:

This module generate reports for Buyer, Party, Agent, Lorry Expenses details

Page 27: Application Project Titles & Abstracts

24.24. SALES MANAGEMENT SYSTEM

The project report presented here is SALES MANAGEMENT SYSTEM. This system is

developed in visual basic 6.0 (front end) and ms access 7.0 (back end) .Under Windows NT

platform. The developed system maintains and manipulates the data regarding stores and purchase

department. The main objective of the system is to assist in preparing the inventory analysis for

L&T. This project is to develop an application software to computerize the inventory level of all

materials and the stores Department and also some operations of the purchase department of

GOPINATH ENTERPRISES, COIMBATORE.The project “STOCK MANAGEMENT

SYSTEM” for GOPINATH ENTERPRISES is developed for the use of stores & purchase

department, COIMBATORE. It includes the following activities.

Purchase

Storing the items for the future needs

The main function of the purchase department can be categorized as follows:-

Purchase requestion

Enquiry

Quotation

Purchase order

The main function of stores department can be categorized as follows:

material receiving note

Custody and issues

Inventory control

Page 28: Application Project Titles & Abstracts

25. HOSPITAL TRACKING SYSTEM

Hospitals currently use a manual system for the management and maintenance of critical

information. The current system requires numerous paper forms, with data stores spread

throughout the hospital management infrastructure. Often information (on forms) is incomplete,

or does not follow management standards. Forms are often lost in transit between departments

requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple

copies of the same information exist in the hospital and may lead to inconsistencies in data in

various data stores.

A significant part of the operation of any hospital involves the acquisition, management

and timely retrieval of great volumes of information. This information typically involves; patient

personal information and medical history, staff information, room and ward scheduling, staff

scheduling, operating theater scheduling and various facilities waiting lists. All of this

information must be managed in an efficient and cost wise fashion so that an institution's

resources may be effectively utilized HTS will automate the management of the hospital making

it more efficient and error free. It aims at standardizing data, consolidating data ensuring data

integrity and reducing inconsistencies.

Page 29: Application Project Titles & Abstracts

26. Pump Management System

This project is concerned with developing the service software using Visual Basic with

Oracle Database. To provide a quick & faster service . the daily service calls are recorded in call

registration form the entire service software is designed in such a way that any user can operate

with case and it provide all the information for the service.

In the system all item details are maintained using separate tables. In this information are

used at item to be sales. The contract information are maintained in this company. The contract

means a mutual agreement is made between the customer of the company before the service

begin, that stipulated form is just entered in the contract entry form. It contains the customer

details.

Daily service calls are recorded initially in call registration form, the details required for a

call to get registered are registration no, item code, location, contract type etc.

The investigation into system operation and possible change to the system is

called system analysis system analysis is a important activity that takes place when we are

building new information system or changing the existing one .

Page 30: Application Project Titles & Abstracts

27. Provident Fund Management

Provident Fund Management (PFM) is an integrated software to keep track on the Provident

Fund Investment/Details etc. It has covered practically all the modules that a company looks for

in a Provident Fund Management Software.

PFM has been developed with VisualBasic and back end RDMS tools SQL Server. It's a true

GUI based 32 bit user friendly Software which supports an inbuilt Report Writer and Draft

Mode Printing. The amazing computing speed of the software reduces computing time to a

great extend. Provident fund details are described here

The Employees' Provident Fund & MP Act,1952 is an important piece of  Labour Welfare

legislation enacted by the Parliament to provide social security benefits to the workers . At

present, the Act and the Schemes framed there under provides for three types of benefits -

Contributory Provident Fund, Pensionary benefits to the employees/ family members and the

insurance cover to the members of the Provident Fund.

At the inception of the scheme an employee who was in receipt of pay up to Rs.300/- p.m. ,

and who worked for one year was eligible for membership of the fund. As a result of

amendments made from time to time, the conditions of eligibility for membership of the fund

have been liberalized in favor of employee. Presently an employee at the time of joining the

employment  and getting wages up to Rs.6500/- is required to become a member. Now an

employee is eligible for membership of fund from the very first date of joining a covered

establishment.

Page 31: Application Project Titles & Abstracts

28. SYSTEM SPY

System Spy Software is a versatile utility program that can perform much different

protection for our personal computer and network system. On activation of this System Spy

Software, it records the process running on the specified system, the applications used by other

users and stores them in log files. It will record all the. It records all the applications opened and

executed.

System Spy Software also performs screen capturing. We can capture all desktop. We

can capture the screen when a new window got focus or at fixed time intervals. Access to the

System Spy Software can be prevented with a password. The Application can be run minimized

in the system tray or invisibly in stealth mode.

It also helps the user to work on the files from the client system on a networking system.

Some specified application can be blocked by the user which will be terminated by the system

automatically.

It will automatically store all the files and we can view from the server and we can set

options from the server also. The System Spy Software can be run in any of the Windows

Platform such as Windows Me/NT4/2000/XP.

The System Spy Software operates in the background, hidden in the system tray. The

application is fully password protected and is active at the time of boot up.

Page 32: Application Project Titles & Abstracts

29. Face Recognition

We propose an appearance-based face recognition method called the Laplacianface

approach. By using Locality Preserving Projections (LPP), the face images are mapped into a face

subspace for analysis. Different from Principal Component Analysis (PCA) and Linear Discriminant

Analysis (LDA) which effectively see only the Euclidean structure of face space, LPP finds an

embedding that preserves local information, and obtains a face subspace that best detects the essential

face manifold structure.

The Laplacianfaces are the optimal linear approximations to the eigen functions of the

Laplace Beltrami operator on the face manifold. In this way, the unwanted variations resulting from

changes in lighting, facial expression, and pose may be eliminated or reduced. Theoretical analysis

shows that PCA, LDA, and LPP can obtained from different graph models. We compare the proposed

Laplacianface approach with Eigenface and Fisher face methods on three different face data sets.

Experimental results suggest that the proposed Laplacianface approach provides a better representation

and achieves lower error rates in face recognition.

Page 33: Application Project Titles & Abstracts

30. AUTOMATED DATABASE MIGRATION

XML Database Migration is a project of migrating the existing databases into XML

format. Conversion of databases to XML file format, the databases like Ms-Access, Oracle and

MS-SQL connects in the network or the oracle in the personal computer can be connected for the

generation of XML code. Let us consider, user runs a firm with three companies with different

database’s respectively. User planned to mingle the entire database’s of the firm in to a single

database. The user wants to migrate the entire database in to a single database. Migration of a

database to another database is a huge process and a complex one. In such case our project can

be used as we are converting the entire database into a XML file and then it is to a single

database.

Page 34: Application Project Titles & Abstracts

31. Automated employee information System

Payroll system is the heart of any Human Resource System of an organization. The

solution has to take care of the calculation of salary as per rules of the company, income tax

calculation and various deductions to be done from the salary including statutory deductions like

Income tax and provident fund deductions. It has to generate pay-slip, cheque summary and MIS

reports.

It is understood that we are tired of managing thousand of odd papers, pay slips, payroll

reports, and salary details and so on. Imagine that we have a payroll processing system which

will generate our pay slips and payroll reports within seconds. We can help others automated

your payroll system by developing a customized payroll application that suits your specific

requirements.

Main aim of developing Employee Payroll Managementis to provide an easy way not

only to automate all functionalities involved managing leaves and Payroll for the employees of

Company, but also to provide full functional reports to management of Company with the details

about usage of leave facility.

We are committed to bring the best way of management in the various forms of EPM.We

understand that EPMin not a product to be sold, it is a tool to manage the inner operation of

Company related to employee leave and Payroll.

This Application works in Multiple PC’s installed on multiple Computers but sharing

same database by which users of different department can use it sitting at different locations

simultaneously.

But in future we can make the Application where the database will be hosted in order to

manage the all departments which will be located in different places and by keeping domain of

Application as Online.

Benefits

Page 35: Application Project Titles & Abstracts

To improve the efficiency.

Quickly find out information of an employee details.

To provide easy and faster access information.

To provide user friendly environment.

Page 36: Application Project Titles & Abstracts

32. Network System Information Tool

SYNOPSIS

The project entitled “Network System Information Tool” The Computer plays

an important role in the maintenance of the organization. The project involves in the

development of a tool for getting the network system information of the computer system

that is in use. The software “Network System Information Tool” collects all the

information about the network system.

The system has helped in reducing redundancy of data and improving the consistency of

data in the system. The system excellently checks for most of the entry areas. The system

is flexible, user friendly and has its own full data security. The system helps the top-

management in quick decision-making.

The network information module used to display the details about the network being used

in the network systems. The system information module used to display the details about

the network systems. The hardware information module displays the information about

the output devices and its configuration in network systems.

The drive information module displays the details about the drives in the system that is

being used. The purpose of the project is to display the details about the memory in the

Network systems.

Page 37: Application Project Titles & Abstracts

33. CALL LOGGING SYSTEM

SYNOPSIS

The project entitled “CALL LOGGING SYSTEM” is prepared for the service sectors

and company maintaining information regarding their customer service. This project is dealt with

the maintenance of Call Logging.

This project is developed using Visual Basic 6.0 for programming and user access, which

is connected with backend MS Access using the OLEDB 32bit Middleware.

The project Call Logging is a facility for tracking the problems in Customer Support

Division, which is logged by the customer from a telephone. Logging information includes: the

Customer details like who made the call, problem priority, problem description and duration of

call etc. It is mainly used to solve the problems and maintain the record of the solved

information’s for future reference.

Call logging is a feature or service offered by some private exchanges, virtual private

networks and computer integrated telephony solutions, it provides telephone records for a given

telephone number/extension number/ customer account etc. Depending on the system, call logs

can be output either via a printer or to a PC.

This Call logging project provides a method to appropriation sections of problem solving

period. It provides methods of quality control by allowing the customers to log the call through

network and how fast a telephone call is answered, typical length of call based on the problem

priority – useful for applications including: help desks or sales performance evaluation, etc.

Page 38: Application Project Titles & Abstracts

Some of the modules in this project are,

Customer details

Sales Entry details

Service calls

Problem Assigning

Reports

Page 39: Application Project Titles & Abstracts

34. COURSE REGISTRATION SYSTEM

SYNOPSIS

The “COURSE REGISTRATION SYSTEM” is developed for handling the student’s

course information. This information system is very helpful to the faculties, Students and the

administration etc.

This system divided in to separate modules for reducing the burden of work. There are

six modules in this project. Those are Student Registration, Staff Master, Course Master, Course

Selection, Student Fees, Exam Details and Reports for the above modules.

In the student registration module, it deals with the detailed student information, contact

address, contact number, like vise. In the exam module, it helps the student to attend

examination. It deals with the functions like the examination process and the results.

The exam results module helps to know the overall performance of the student. It

evaluates the student on the basis of monthly, terminally exams.

The proposed system has been designed to replace the existing system. The

computerization of Course Registration System aims to reduce the work load of the staff and

administration is ready for the quick reference on different files to retrieve the necessary

information.

Microsoft Visual Basic is used as the front tool for making an object oriented approach

to development of this software. Microsoft access is used as the backend for this system.

Modules in this project are,

Student Master

Staff Master

Page 40: Application Project Titles & Abstracts

Course Master

Course Registration

Student Fees

Exam Details

Reports

Page 41: Application Project Titles & Abstracts

35. File Distribution Protocol in Peer to Peer Systems

ABSTRACT

In the past few years, P2P file distribution applications (e.g., Bit Torrent) are becoming

so popular that they are the dominating source of Internet traffic. This creates significant

problems to Internet Service Providers (ISPs), not only because of the added complexity in

traffic engineering, but the increase of traffic, in particular on the cross-ISP links, implies

congestion and a higher operating cost. In this paper, we consider an ISP-friendly file

distribution protocol which uses the “exploiting-the-locality principle” (ELP) to reduce the cross-

ISP traffic. To show its benefit, we derive an upper and lower bound of cross-ISP traffic for the

protocols which rely on ELP and show that the cross-ISP traffic can be reduced significantly

when the number of peers within an ISP increases. To carry out realistic study, we design and

implement our ISP-friendly protocol (which is compatible with the current Bit Torrent protocol)

and carry out large scale experiments on Planet Lab to measure the reduction of the cross ISP-

traffic and the file downloading time. More important, we also show how the proposed ISP-

friendly protocol can handle the “black-hole” security attack. This paper sheds light on the merits

and design direction of ISP-friendly content distribution protocols.

Page 42: Application Project Titles & Abstracts

36. Effective key Generation for Multimedia Application

ABSTRACT

The project entitled Effective key Generation for Multimedia Application is the application

developed to embed a video file in another video signal. It is concerned with embedding

information in an innocuous cover Speech in a secure and robust manner. This system makes the

Files more secure by using the concepts Steganography and Cryptography. Steganography, poor

cousin of Cryptography is the art of hiding messages inside other messages such that the very

existence of the message is unknown to third party. The goal of cryptography is to make data

unreadable by a third party, the goal of Steganography is to hide the data from a third party

Through the use of advanced computer software, authors of images and software can place a

hidden trademark in their product, allowing them to keep a check on piracy. This is commonly

known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object

from a similar object is known as finger printing. Together, these two are intended to fight

piracy. The latter is used to detect copyright violators and the former is used to prosecute them.

But these are only examples of the much wider field of Steganography.

The cover data should not be significantly degraded by the embedded data, and the

embedded data should be as imperceptible as possible. The embedded data should be as immune

as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is

necessary that the hidden message should be encrypted.

Page 43: Application Project Titles & Abstracts

37. LIC management System

ABSTRACT

The main objective of the project is to provide full computerization of his agent carrier. This

project is under friendly and reusable to all LIC agents. This project provides all information

about Loans, Mediclaim, children plans, vehicle and pension policies. By this project these

people’s can interest easily towards their customers by giving readymade solutions to customer’s

queries. As such, policy details, premium calculation, etc.

The users of this project can obtained day today customer list, premium details, due

dates, remainder letters and appointment details are generated as report daily. The easy

to use interface allows you to keep track of your policies and their premium. Support for

surrender value, Delete Policy and Lapse Policies. Commission Report, Deposit Slip Report,

Maturity Check etc. have been added.By this project it is very compatible and very helpful to

maintain the customer relationship.

Page 44: Application Project Titles & Abstracts

38. Corporate Training

Corporate Training for the facilities in the campus. This is an Intranet based application that can

be accessed throughout the campus. This system can be used to automate the workflow of

service requests for the various facilities in the campus. This is one integrated system that covers

different kinds of facilities like class-rooms, labs, hostels, mess, canteen, gymnasium, computer

center, faculty club etc. Registered users (students, faculty, lab-assistants and others) will be able

to log in a request for service for any of the supported facilities. These requests will be sent to the

concerned people, who are also valid users of the system, to get them resolved. There are

features like email notifications/reminders, addition of a new facility to the system, report

generators etc in this system.

It is very useful for students to know about the facilities provided in the campus when ever they

want to check easily and it takes less time.In mandatory checking they have to maintain many

files and it takes much time to check about particular facility and all the details. So to overcome

the problems in the mandatory maintainense,the online help desk tool can give the fast and

accurate checking of the facility details in less time.

Page 45: Application Project Titles & Abstracts

39COMPANY ADDRESS BOOK

ABSTRACT

Company address book mainly developed for an organization to store their employee’s personal

data. The System consists of various users like the Administrator, HR manager and Employees.

Everyone have their own responsibilities.HR manager has the privileges to add/delete the

employees. Administrator registers the employees and allocates the IDs for the employees.

Employees can login and store their personal data.

Company address book is a system provided to the adding, deleting, editing the important

addresses. Keeping employees contact records up-to-date plays a vital role in promoting

effective communications.

Features:

Making records of addresses of the employees.

Making records of details of employees

Adding and deleting the employees.

Allocating ids to the employees

Page 46: Application Project Titles & Abstracts

40.Airline Reservation System

ABSTRACT

Airline Reservation System contains the details about flight schedules and its fare tariffs,

passenger reservations and ticket records. An airline’s inventory contains all flights with their

available seats. The inventory of an airline service is generally divided into three category of

classes (e.g. First, Business or Economy class) and each category is having seats up to 26

bookings, along with prices and booking conditions. Inventory data is imported and maintained

through a Schedule Distribution System over standardized interfaces. One of the core functions

of the inventory management of airline reservations is the inventory control. Inventory control

steers how many seats are available for the different booking classes, by opening and closing

individual booking classes for sale. In combination with the fares and booking conditions stored

in the Fare Quote System the price for each sold seat is determined.


Recommended