dotnet projects 2010

33
IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstrainin g.com, www.makefinalyearproject.c om Mobile Synchronization – Sync Easy 1. Introduction: Mobiles are becoming an inevitable part of modern society. People using mobiles to make calls, to send and read SMS, to store contact information, to store person files, photos, videos and music etc. Mobiles so became an important storage device with lot of personal and business related information and messages. The necessity of the information security is increased in this context. So a mobile backup mechanism is important for the people who think their mobile contents should be secured. 2. Challenge: Challenge is to create a mechanism to synchronize the mobile contents with the backup server online. The items need to be synchronized are incoming sms, contacts, videos, photos and music. This process should be made as simple as a click of a button. 3. Proposed Solution: Proposed solution is a Windows mobile client application which will allow users to simply click and upload the mobile contents to a personalized backup server online. Users will have an option to select the items which they don’t want to take a backup. Application will show the last synchronized time and the necessity to do sync. Proposed solution also contains a web site to see the uploaded contents online and a web service to interact the web site and the windows mobile client application. 4. Technology: Technologies used are  Microsoft .Net 2.0   Visual C# language   ASP.Net 2.0   ASP.Net 2.0 web service  SQL Server 2000

Upload: regstrfail

Post on 07-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 1/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Mobile Synchronization – Sync Easy

1. Introduction:

Mobiles are becoming an inevitable part of modern society. People using mobiles tomake calls, to send and read SMS, to store contact information, to store person files, photos,

videos and music etc. Mobiles so became an important storage device with lot of personal and

business related information and messages.

The necessity of the information security is increased in this context. So a mobile backup

mechanism is important for the people who think their mobile contents should be secured.

2. Challenge:Challenge is to create a mechanism to synchronize the mobile contents with the backup

server online. The items need to be synchronized are incoming sms, contacts, videos, photos

and music. This process should be made as simple as a click of a button.

3. Proposed Solution:

Proposed solution is a Windows mobile client application which will allow users to simply

click and upload the mobile contents to a personalized backup server online. Users will have an

option to select the items which they don’t want to take a backup. Application will show the last

synchronized time and the necessity to do sync.

Proposed solution also contains a web site to see the uploaded contents online and a

web service to interact the web site and the windows mobile client application.

4. Technology:

Technologies used are• Microsoft .Net 2.0• Visual C# language• ASP.Net 2.0• ASP.Net 2.0 web service• SQL Server 2000

Page 2: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 2/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

• Windows Mobile 5.0 pocket PC phone SDK • Windows Mobile 5.0 pocket PC phone emulator• Active Sync 5.0 or later

5. System Diagram:

6. Future enhancements:

Mobile Sync can be developed further to restore the back up data to a new mobile incase if the user’s mobile lost or damaged.

7. Conclusion:

Mobile backup mechanism may become an inbuilt feature for all mobiles in future. But

unfortunately this option is not present now. The importance of Mobile Sync is increasing in this

context.

Page 3: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 3/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Anti-Theft Library Organizer ABSTRACT:

Library management has been a big task these days in Software Company, where huge

amount of book are managed for staff reference. There should be Software to track these book issue and return transactions, the application will also control book theft.

The aim of this project is to deal with a RF Receiver through RS-232 conductor which

association the interface between data processing and data communications equipment, and is

widely used to connect microcomputers to peripheral devices.

The data read from the RFID is received and forwarded to application by RF reader via

RS232, the application will sort the information read and make it easy to analyze for the librarymanager, and he will work over the data for book issue or return and then save it to database.

This application contains maximum software based and less hardware based, where

hardware’s like RFID, RS 232 and RF reader are meant for data communication and

identification, the software part plays and pivotal role in this in managing the data

communication.

Retrieving data , analyze and then added to database during the time of issuing new

books, on return of book database is accessed and made changes, the application is robust and

user friendly where less control based operation is done. Where most of the data is

automatically generated from RFID of employees and from RFID in book.

This application acts perfectly between software and hardware, its prime job is to make

the library management much easier and operating this application doesn’t need any prior

study.

INTRODUCTION:

In early days the library management was carried by manual ledger writing of issue and

return, which has the drawback of wrong entry, book theft and many others to the

Page 4: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 4/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

management, later library management was computerized, though it has its own bugs like time

taking in issue and return of book as everything need data input.

To overcome all above said problem this project is developed, the project deals library

application communicating and managing with a RF Receiver through RS-232 conductor which

association the interface between data processing and data communications equipment, and is

widely used to connect microcomputers to peripheral devices.

The user of the library has to swipe the RFID in entry to read who are all, came into the

library on taking a book the RFID Card shows the information of the person who takes the

book, as RFID in the book gives information about the book to issued are returned through RF

reader connected to system via RS232 is given the information to the application where it is

analyzed by the library manager.

The in charge person will then store it to database, the information contains the time

the person who took book came in and what books he took ,what is the book name, how many

days for returning the book in case of issue or how many days kept in terms of returning .

We can also make the application to show some other useful information about the

library as an optional one like show book shelf on giving book name and other useful info like

book availability

HARDWARE REQUIREMENTS:

PROCESSOR : Pentium 4 RAM : 512MB HARD DISK : 100MB

RESOLUTION : 1024 X 768

CONNECTIVITY : RF reader

SOFTWARE REQUIREMENTS:

C#.NET(HARD-CODE)

MS SQL OR XML

Page 5: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 5/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Advantage:• Day to day information is been stored in PC to check later.• The outside people cannot enter in to this library with using this technology.• Managing Library will become much easier and efficient way.

Disadvantage:• If RF reader doesn’t work application can’t get input information.

Application:

The Present software is very useful to the Library because it is a data collection

technology that uses RF concept coupled with this application will make library management

much easier in an efficient way.

BLOCK DIAGRAM:

Sender Side:

Page 6: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 6/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

RFID Block Diagram

Receiver Side:

Page 7: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 7/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Cloud OS-Cloud Computing

1. Introduction:

Cloud computing is the provision of dynamically scalable and often virtualized resources as aservice over the Internet on a utility basis. Users need not have knowledge of, expertise in, or

control over the technology infrastructure in the "cloud" that supports them. Cloud computing

services often provide common business applications online that are accessed from a web

browser, while the software and data are stored on the servers.

2. Overview:

In this synopsis, the term cloud is used as a metaphor for the Internet, based on how the

Internet is depicted in computer network diagrams and is an abstraction of the underlyinginfrastructure it conceals.

A technical definition is "a computing capability that provides an abstraction between the

computing resource and its underlying technical architecture (ex: servers, storage, networks),

enabling convenient, on-demand network access to a shared pool of configurable computing

resources that can be rapidly provisioned and released with minimal management effort or

service provider interaction." This definition states that clouds have five essential

characteristics: on-demand self-service, broad network access, resource pooling, rapid

elasticity, and measured service.

Cloud computing customers do not generally own the physical infrastructure serving as host to

the software platform in question. Instead, they avoid capital expenditure by renting usage

from a third-party provider. They consume resources as a service and pay only for resources

that they use. Many cloud-computing offerings employ the utility computing model, which is

analogous to how traditional utility services (such as electricity) are consumed, while others bill

on a subscription basis. Sharing "perishable and intangible" computing power among multiple

tenants can improve utilization rates, as servers are not unnecessarily left idle (which can

reduce costs significantly while increasing the speed of application development).

Page 8: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 8/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

A side effect of this approach is that overall computer usage rises dramatically, as customers do

not have to engineer for peak load limits. Additionally, “increased high-speed bandwidth" makes

it possible to receive the same response times from centralized infrastructure at other sites.

Ex: www.icloud.com

The cloud OS which we are supporting will be having

1. File Explorer

2. Document create, Edit and save capabilities

3. User and log-in management

4. Image and media file management

5. Calculator and games etc

3. Technology:

Technologies used are• Microsoft .Net 2.0• Visual C# language• ASP. Net 2.0• AJAX. Net• SQL Server 2000

4. System Diagram:

A. System diagram

Page 9: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 9/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

B. Cloud computing sample architecture

5. System Components:• ASP. Net AJAX Cloud Platform

This is a virtual OS on cloud, which will allow us to host different services and

applications which will allow user to perform day to day life computing tasks. This

platform is developed in ASP. Net AJAX technology which will allow asynchronous web

requests to the server.

• SQL Server 2000 database

This component allows to store all user related information and supply to the cloudclients as per request.

6. Future enhancements:

In future we can add more operating system capabilities to the cloud platform like a command

prompt, document editing and save in all Microsoft supported document formats etc.

7. Conclusion:

This cloud OS initiative will be a step stone to make more reliable, fast and scalable cloudplatform development in future. Cloud computing will be the next big thing going to be on the

internet world today.

Page 10: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 10/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Digital Image Tracing by Sequential Multiple Watermarking

Abstract:

The possibility of adding several watermarks to the same image would enable many

interesting applications such as multimedia document tracing, data usage monitoring and

multiple property management. In this paper, we present a novel watermarking scheme, which

allows inserting and reliably detecting multiple watermarks sequentially embedded into a digital

image. The proposed method, based on elementary linear algebra, is asymmetric, secure under

projection attack and robust against distortion due to basic operations such as storage,

transmission, and format conversion.

Proposed system:

The proposed method, based on elementary linear algebra, is asymmetric, involving a

private key for embedding and a public key for detection. Its robustness against standard image

degradation operations has been extensively tested and its security under projection attack has

also been proven even though the envisaged applications refer to a collaborative environment,

in which malicious attacks are not a critical aspect.

Existing System:

The existing method, only done by a single water marking. That will not give that much

security to image. Although some researchers focused on the viability of existing watermarking

approaches for the insertion of multiple signatures, the development of specific techniques can

provide much more effective results. The general problem of multiple digital watermarking has

been the object of several investigations since the pioneering contribution. It is suggested that

the insertion of multiple watermarks can be exploited to convey multiple sets of information.

More recently, a multiple watermark-embedding procedure was proposed, which allows

simultaneous insertions without requiring the key sets to be orthogonal to each other. Specific

applications such as the already mentioned medical image management may even require the

insertion of two different types of watermark, namely, a robust one for authentication purposes,

Page 11: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 11/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

and a fragile one for data integrity control. This paradigm is often referred to as multipurpose

watermarking.

Hardware Requirements:• SYSTEM : Pentium IV 2.4 GHz• HARD DISK : 40 GB• FLOPPY DRIVE : 1.44 MB• MONITOR : 15 VGA colour• MOUSE : Logitech.• RAM : 256 MB • KEYBOARD : 110 keys enhanced.

Software Requirements:• Operating system :- Windows XP Professional• Front End :- Microsoft Visual Studio .Net 2003• Coding Language :- Visual C# .Net

Page 12: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 12/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Location Based Reminder on Mobiles1. Introduction:

Reminders or alerts in existing system allows user to do some task at a particular time.

Sometimes it is desirable that we get reminders based on the location. The proposedapplication allows user to set reminders based on location.

2. Overview:

Have you ever gone to the grocery store, only to find you forgot your list?

Have you ever been at work, and thought of something you needed to do when you get

home?

Have you ever wished your to-do list would remind you based on your location?

The application “Location Based Reminder” solves all these problems. It offers below

services:

1. Keep an ongoing list of things to buy next time you're at the grocery store

2. Tell you to take the trash to the street when you get home after work

3. Keep your life more organized with a location-based to-do list

4. Prompt you to purchase a birthday gift the next time you're near the mall

5. Tell you to deposit your paycheck next time you're near the bank

6. Remind you to call a client the next time you arrive at the office

7. Ability to save favorite locations for future use

8. Easy to use interface for quick and efficient navigation

9. Option to re-enable alerts from the past

3. Technology

Technologies used are• J2ME• GPS

4. System ComponentsEntire application is built using J2ME. GPS technology is used for getting location (longitude

and latitude) of the user.

The application has below modules

1. Add Location

Page 13: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 13/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

This module allows user to add the locations for which he wants to set reminders. User

can give name of location, latitude and longitude of location. Google Maps can be used

to obtain the latitude and longitude of location.

2. Add Reminder

This module allows user to add the reminder. User can choose the location which is

already added. User can set the description of reminder. For example, user can choose

location as “Forum Mall” and set the description as “Buy movie ticket for 2012 movie”

Once the reminder is added, when user is near the location, the text description will be

alerted to the user.

3. View Locations

This module allows user to view all locations which user has added.

4. View Reminders

This module allows user to view all reminders which user has added.

5. Settings

This module allows user to set some settings for the applications.

5. Hardware Requirements

Mobile which has below features

a. GPS

b. Java Enabled (MIDP 2.0, CLDC 1.1) with JSR 179

6. Software Requirementsa. SUN WTK 2.5.2 or above.

b. NetBeans IDE

7. Future enhancements

In future location based reminder can also be combined with time.

Page 14: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 14/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Image Recognition with Neural Networks (IEEE)

Title: Domain: Standalone Application

Abstract:

Artificial Neural Networks are a recent development tool that is modeled from biological

neural networks. The powerful side of this new tool is its ability to solve problems that are very

hard to be solved by traditional computing methods (e.g. by algorithms). This work briefly

explains Artificial Neural Networks and their applications, describing how to implement a simple

ANN for image recognition.

Artificial Neural Networks (ANNs) are a new approach that follows a different way from

traditional computing methods to solve problems. Since conventional computers use algorithmic

approach, if the specific steps that the computer needs to follow are not known, the computer

can not solve the problem. That means, traditional computing methods can only solve the

problems that we have already understood and knew how to solve. However, ANNs are, in

some way, much more powerful because they can solve problems that we do not exactly know

how to solve. That's why their usage are recently spreading over a wide range of area

including, virus detection, robot control, intrusion detection systems, pattern (image,

fingerprint, noise...) recognition and so on.

Back Propagation ANNs contain one or more layers each of which are linked to the next

layer. The first layer is called "input layer" which meets the initial input (e.g. pixels from a

letter) and so do the last one "output layer" which usually holds input's identifier (e.g. name of

the input letter). The layers between input and output layers are called "hidden layer(s)" which

only propagates previous layer's outputs to the next layer and [back] propagates the followinglayer's error to the previous layer. Actually, these are the main operations of training a Back

Propagation ANN which follows a few steps.

Page 15: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 15/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

SOFTWARE REQUIREMENTS• Operating System - Windows XP Professional• Frame Work - Visual Studio .Net 2005 Professional• Language - C# .Net

HARDWARE REQUIREMENTS

• Processor - Pentium IV 2GHz and above• RAM - 512 MB RAM• Secondary storage - 40 GB HDD• Keyboard - Standard 102 Keyboard• Mouse - Standard Serial Mouse• Display - 15” VGA Adapter• Network Adapter - Ethernet card 100Kbps

Page 16: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 16/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Steganography for Regions with different data density

(IEEE)

Title: Steganography for Regions with different data density

Abstract:

A well known method of stegano analysis is to search one colored area of the image for

variations. In diffuse areas where every pixel has a different color than its neighbors, variations

by hidden bits are hard to detect, but most pictures also contain areas with smooth colors. The

blue sky in the upper middle should not contain hidden data, because there are nearly no

natural variations in the colors.

The clouds have more shades of blue, but anything that's not blue would be easy to find. If any

data has to be hidden in the clouds, not more than one bit per pixel should be changed.

It is the same with the trees on the right: changing the higher bits would produce light colors,

but only dark pixels are allowed here, so the capacity of each pixel is reduced to one or two

bits.

The boats and the beach on the left side are better. They contain red, yellow, and white, blue,green... We can change up to 7 bits in this region, nobody will notice anything.

To escape from simple variations analysis, we'll hide our secret message only in these regions,

and with adjusted "bit rates":

Edit and Store Regions:

Just as in the preceding examples, we need a carrier bitmap, a secret message, and a key. The

new feature is a Region Editor which lets the user define regions and their capacities.

An easy way to draw a region is to click the points of a polygon. So, we let the user click on the

image, and add every clicked point to a polygon. A polygon can be closed with a double click,

then the next click starts a new polygon. When a polygon is being closed by a double click, we

have to make sure that it does not overlap one of the already existing polygons. If the new

Page 17: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 17/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

polygon intersects another polygon, we merge the two regions. If the polygon stands alone, we

create a new region and add it to the list. CtlRegions is a RegionInfoList; this control displays

statistics and input fields for each region.

SOFTWARE REQUIREMENTS:• Operating System - Windows XP Professional• Frame Work - Visual Studio .Net 2005 Professional• Language - C# .Net

HARDWARE REQUIREMENTS:• Processor - Pentium IV 2GHz and above• RAM - 256 MB RAM• Secondary storage - 40 GB HDD• Keyboard - Standard 102 Keyboard• Mouse - Standard Serial Mouse• Display - 15” VGA Adapter• Network Adapter - Ethernet card 100Kbps

Page 18: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 18/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Page 19: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 19/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Vision Processing for Real-time 3-D Data Acquisition

Based on Coded Structured Light (IEEE-2009)

Abstract

The structured light vision system is a successfully used for the measurement of 3D

surface in vision. There is some limitation in the above scheme that is tens of pictures are

captured to recover a 3D sense. This paper presents an idea for real-time Acquisition of 3-D

surface data by a specially coded vision system. To achieve 3-D measurement for a dynamic

scene, the data acquisition must be performed with only a single image. A principle of uniquely

color-encoded pattern projection is proposed to design a color matrix for improving the

reconstruction efficiency. The matrix is produced by a special code sequence and a number of state transitions. A color projector is controlled by a computer to generate the desired color

patterns in the scene. The unique indexing of the light codes is crucial here for color projection

since it is essential that each light grid be uniquely identified by incorporating local

neighborhoods so that 3-D reconstruction can be performed with only local analysis of a single

image. A scheme is presented to describe such a vision processing method for fast 3-D data

acquisition. Practical experimental performance is provided to analyze the efficiency of the

proposed methods.

Existing System:

In case of the existing system we need to take a lot of image to make a 3D Sean.

And also took a lot of time to create the 3D Sean. And also we cannot estimate the time in

which the Sean can be created. In order to obtain a better resolution, a technique based on

the combination of gray code and phase shifting is often used. The main drawback of this is

that we need a lot of image to achieve that. And so look forward to advanced system.

Through which we can make the process quicker.

Page 20: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 20/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Proposed System:

In case of the proposed system we over come the problem in the existing system. And

also we propose a structured pattern in order to manage the image from a computer.

We are getting the image in a matrix, converting to grayscale. Using encoded pattern project,

we getting the combination of image from the matrix and adding new pixel colors according to

the encoded one, with out using any similar images.

Hardware Requirements:

SYSTEM : Pentium IV 2.4 GHz

HARD DISK : 40 GB

FLOPPY DRIVE : 1.44 MB

MONITOR : 15 VGA colour

MOUSE : Logitech.

RAM : 256 MB

KEYBOARD : 110 keys enhanced.

Software Requirements:

Operating system :- Windows XP Professional

Front End :- Microsoft Visual Studio .Net 2005Coding Language :- C# 2.0

Page 21: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 21/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Online Exam with Graphical Presentation ABSTRACT:

The Online Exam is a practice test, which is commonly available to higher education

students. The extent of student use of such study tools and the relationship of use toachievement. However in all the fields i.e., Colleges, Business etc have encouraged to use

online Exams in academic achievement. In the academic they have been associated with

positive learning outcomes subordinate have increased confidence.

As one of this online exam tools are quite effective in this generation however, we have

developed a web-based online exam system, which can create questions closely, competitively,

and collaboratively by students for purpose of reducing the load required for a teacher and

promoting interactions among students and between the teacher, this should be done in order

to improve students comprehension levels and learning motivation.

This light version of online exam is presented to you in a simple and easy format that

enables you to improve your effectiveness and efficiency to prepare for interviews and

certification exams. Online exam will test your knowledge and intelligence on various technical

and aptitude interview related topics to see how smart you are and assesses your performance

which helps you to analyze your strong and week areas.

This is intuitive application through which we can conduct online exams on various

topics as we desire.

INTRODUCTION:

This project deals with online exam, as one of this online exam tools are successfully

implemented in universities. This project improves student’s comprehension levels and learning

motivation. This Online exam tool had been programmed in xml file on the server from theinformation technology department.

In a first step an invitation email will be sent to all the students for online registration to

manage their account by providing username and password to conduct the online exam, after

logging in you will be having instruction to follow the procedure and later on main exam paper

Page 22: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 22/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

will be displayed and there schedule time will be fixed, we have to finish online exam in

scheduled time.

Questions appear in the website with answers, answer will be subdivided into 4 sections,

you just have to search to find the correct answers, after each question there is a link for the

next web page, if any answers are wrong you will have the opportunity to go back and try

again for the correct answer.

When you have answered the entire question, you have to click on the submit button at

the bottom of the exam page and our computer will calculate your results on the spot. You may

then choose to review your exam for any wrong answer given. Later results can be downloaded

or can be taken the printout.

Each exam is dynamically created and built with the latest server-side technology using

advanced randomization techniques for increasing security, but implements widely compatible

client-side technology so that almost anyone with a web browser can use the system. The data

is then stored in server-side, making it nearly impossible to cheat the system.

COMPONENTS USED :

PROCESSOR : Pentium 4

RAM : 512MB HARD DISK : 100MB

RESOLUTION : 1024 X 768

SOFTWARES USED:

C#.NET(HARD-CODE) MS SQL OR XML

Advantage • You can login and take the exam at any time• In spot the computer will calculate the results• It can be used from any place with Internet connection• Easy Job• Fast and effective service

Page 23: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 23/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Disadvantage• PC Dependable• Answers cant be discussed with any one• Fixed time can’t be extended.• Initially it’s expensive.

Application

This project is very useful for this generation because anyone can successfully begin

online exam, it is presented to you in a simple and easy format that enables you to improve

your effectiveness and efficiency to prepare for interviews confidently and successfully.

Page 24: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 24/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Neural Networks for Unicode Optical Character

Recognition Abstract:

The central objective of this project is demonstrating the capabilities of Artificial Neural Network

implementations in recognizing extended sets of optical language symbols. The applications of

this technique range from document digitizing and preservation to handwritten text recognition

in handheld devices.

The classic difficulty of being able to correctly recognize even typed optical language symbols is

the complex irregularity among pictorial representations of the same character due to variations

in fonts, styles and size. This irregularity undoubtedly widens when one deals with handwrittencharacters.

Hence the conventional programming methods of mapping symbol images into matrices,

analyzing pixel and/or vector data and trying to decide which symbol corresponds to which

character would yield little or no realistic results. Clearly the needed methodology will be one

that can detect ‘proximity’ of graphic representations to known symbols and make decisions

based on this proximity. To implement such proximity algorithms in the conventional

programming one needs to write endless code, one for each type of possible irregularity ordeviation from the assumed output either in terms of pixel or vector parameters, clearly not a

realistic fare.

An emerging technique in this particular application area is the use of Artificial Neural Network

implementations with networks employing specific guides (learning rules) to update the links

(weights) between their nodes. Such networks can be fed the data from the graphic analysis of

the input picture and trained to output characters in one or another form. Specifically some

network models use a set of desired outputs to compare with the output and compute an error

to make use of in adjusting their weights. Such learning rules are termed as Supervised

Learning.

Page 25: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 25/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

One such network with supervised learning rule is the Multi-Layer Perception (MLP) model. It

uses the Generalized Delta Learning Rule for adjusting its weights and can be trained for a set

of input/desired output values in a number of iterations. The very nature of this particular

model is that it will force the output to one of nearby values if a variation of input is fed to the

network that it is not trained for, thus solving the proximity issue. Both concepts will be

discussed in the introduction part of this report.

The project has employed the MLP technique mentioned and excellent results were obtained for

a number of widely used font types. The technical approach followed in processing input

images, detecting graphic symbols, analyzing and mapping the symbols and training the

network for a set of desired Unicode characters corresponding to the input images are

discussed in the subsequent sections. Even though the implementation might have some

limitations in terms of functionality and robustness, the researcher is confident that it fully

serves the purpose of addressing the desired objectives.

SOFTWARE REQUIREMENTS

FRONT END : VS .NET 2005

BACK END : SQL SERVER 2000

OPERATING SYSTEM : Windows XP. LANGUAGE : Visual C#

HARDWARE REQUIREMENTS

HARD DISK : 40 GB

RAM : 512 MB PROCESSOR : Pentium IV

I/O DEVICES : Keyboard, Mouse

Page 26: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 26/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Bug Tracking System Abstract

For many years, bug-tracking mechanism is employed only in some of the large

software development houses. Most of the others never bothered with bug tracking at all, andinstead simply relied on shared lists and email to monitor the status of defects. This procedure

is error-prone and tends to cause those bugs judged least significant by developers to be

dropped or ignored.

Bug Tracking System is an ideal solution to track the bugs of a product, solution or an

application. Bug Tracking System allows individual or groups of developers to keep track of

outstanding bugs in their product effectively. This can also be called as Defect Tracking System.

The Bug Tracking System can dramatically increase the productivity and accountability

of individual employees by providing a documented workflow and positive feedback for good

performance.

Some salient features are …

1. Product and Component based

2. Creating & Changing Bugs at ease

3. Query Bug List to any depth

4. Reporting & Charting in more comprehensive way

5. User Accounts to control the access and maintain security

6. Simple Status & Resolutions

7. Multi-level Priorities & Severities.

8. Targets & Milestones for guiding the programmers

9. Attachments & Additional Comments for more information

10. Robust database back-end

Existing System

In any software development bugs are inevitable. Let it be in any kind of product bugs

arise at any phase of development. One has to take a great care in the proper maintenance andresolution of the bugs. In the Existing system the bugs are not properly maintained and they

are simply relied on shared lists and email to monitor the bugs. In this type of system it

becomes difficult to track a bug if a bug is over looked then it may cause tremendous errors in

the next phase and can improve the cost of project what ever necessary effort spent on the bug

maintenance may not be worthy. So bug history has to be maintained properly. And there is no

Page 27: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 27/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

efficient search technique. One has to search the whole database for the details of particular

bug which might have occurred some time earlier. It is both time consuming and error prone.

And it is very difficult to share the bug among several users as there is no proper maintenance

of the bugs.

In order to have an efficient product bugs must be maintained properly and should be resolved

in time both to reduce time and money spent on the development.

Proposed System

The proposed system has many advantages over the existing system. This system

maintains the products, Bugs and bug tracking. It has advantage of maintaining bug history it

stores all the details from bug origin to bug resolution. So that it would not be difficult for the

user to know how much effort spent on the bug? Each product can have versions for easy

maintenance of the product and all the user of the product is stored in the database. It provides

the advantage of maintaining users to the bugs and resolutions provided by them. This product

provides efficient search technique. As the number of bugs for a product increases

tremendously it would be difficult to search for a single record. Our system provides the

searching based on status, priority, and operating system. It provides with user and bug

hierarchy, which would be helpful in knowing the relation between bugs and users allotted to

the bug. It is provided with a fully authenticated system with password encryption. And has the

facility for storing attachments for a bug. One can keep a track of the bug in a product with

much lower cost and effort. The most advantage of this system is maintaining log records whichare helpful in knowing any errors or misuse of the system by other users.

Technical Specifications:

HARDWARE SOFTWARE

Intel Celeron / P III / P4600Mhz or

greaterOperating System Win 2000 Ser. / Pro.

RAM (SD / DDR)128MB to

512MBWeb Server IIS 5 or 6

Hard Disc 100MB Development Tools VB.NET, ASP.NET

Database MS SQL / Oracle

Page 28: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 28/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

ENTERPRISE RESOURCE INFORMATION SYSTEM (ERIS)

ABSTRACT

Enterprise Resource Information System (ERIS) is a computerized solution for recruiting

agencies and software consultants. This application maintains electronic database comprises of

job applicants, workers and employers. User of this system can create and access details of all

the information using advanced GUI screens comprises of menu, bitmap toolbars, status bar

and many more. This is an Intranet application, which is used by a consultant to maintain his

clients and employees status and schedule interviews for applicants. The Project is divided into

three modules.

Applicant : This module is used to maintain Applicants

Employee : This deals to maintain the status of employee like at which client is theemployee working

Clients : This module deals with various clients.

Reports are generated finally for the convenience of the consultant.

DESCRIPTION

Enterprise Resource Information System (ERIS) is a computerized solution for recruiting

agencies and software consultants. This application maintains electronic database comprises of

job applicants, workers and employers. User of this system can create and access details of all

the information using advanced GUI screens comprises of menu, bitmap toolbars, status bar

and many more. This is an Intranet application, which is used by a consultant to maintain his

clients and employees status and schedule interviews for applicants. The Project is divided intothree modules. The first module is used to maintain Applicants, second deals to maintain the

status of employee like at which client, he is working and third module deals with various

clients. Reports are generated finally for the convenience of the consultant.

Page 29: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 29/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Hardware Requirements:

o Processor : Celeron 1.7 GHz processor or above.

o Hard Disk : 20 GB or above

o RAM : 256 MB or above

Software Requirements:

o Operating System : Windows 2000 Professional

o Languages : ASP.net with VB.net

o Back End : SQL SERVER 7.0

Page 30: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 30/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Push-Pull Email Utility on MobilesCheck Ur Email on the move…

Present Challenges:

With number of people using mobile phones is increasing, it has become a need forusers to provide on their mobiles, all facilities one is been utilizing on the Internet.

One of such facility is handling emails easily on mobiles. People have been accessing

their emails on their mobiles by logging in to the email portals (for example www.yahoo.com)

using GPRS connectivity on their mobile phones. But the fact that such method of directly

accessing the emails has given bad user experience as it consumes lot of time to download an

email and hence consuming more GPRS connection time, there is a need to have easy and

friendly interface to email portals, which will give good experience for mobile users. Such email

web portals need to have interface for the mobile users too in order to have this facility to be

used via a mobile with GPRS connectivity.

Many such web portals are enhancing towards this, mainly, to capture most of mobile

users as their customers. As per current market figures, which shows that around 70% of

mobile market has been captured by Symbian phones.

So if such web portals want to have many mobile customers then there is need to have

support given to smart phones which has Symbain OS embedded in it. To have this web portal

will require the interface to mobile phones and add-on software to be installed on mobile

phones. This software will interact with web portal on behalf of the user.

For example, let us take into consideration of a person who is on the move and want to

check his emails and reply to some mails on his journey. Using the mobile push-pull email

software on his mobile he can immediately check for new mails and send some urgent mails if

required.

Key Features:

Push-Pull Email utility software can do below :•

Download text emails• View emails• Send text emails

Some of the future enhancements are:

Send emails with attachments: Send a file as an attachment along with email via mobile push-

pull email software.

Page 31: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 31/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Receive emails with attachments: Receive a file as an attachment along with email via mobile

push pull email software.

Benefits:

Anytime, anywhere Emails: Earlier people have to check their emails by logging in to the

email portals using GPRS connectivity on their mobile phones. This way of accessing emails

has shown bad user experience as it consumes lot of time to download an email and hence

consuming more GPRS connection time. Hence nowadays, it is very rare that a person

would check his emails on phone. Now life is made easy, with the mobile push-pull email

software on mobile, receiving and sending email is easy and fast via GPRS connectivity used

for lesser time.

Easy maintenance of emails: emails will be maintained in database in web portal. User

can have choice as whether he wants to keep the downloaded emails on the portal or delete

it once downloaded.

Technologies Used : –

Below components are required

1. Email Web service:

The responsibility of this component is to receive the emails from several mobile users,

which are to be sent. This component will also download the emails for the users and

send it to mobiles. The upload or download request can be sent through Mobile pushpull email software on mobiles.

Technologies used : Programming Language C#.Net, XML

2. Mobile push-pull email software widget :

This software widget needs to be installed on mobile. The responsibility of this

component is to interact with user and provide with different features of mobile push-

pull email as mentioned above.

Technologies : Programming Language C++, Symbian OS (Mobile Operating

System), XML

Hardware Requirements : Any Mobile Handset having Symbian OS 7.0, Series 60 with

GPRS enabled in it.

Page 32: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 32/33

IGSLABS Technologies Pvt Ltd. Email:[email protected], Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Neural Networks for Unicode Optical Character Recognition Abstract

The central objective of this project is demonstrating the capabilities of Artificial Neural Network

implementations in recognizing extended sets of optical language symbols. The applications of

this technique range from document digitizing and preservation to handwritten text recognition

in handheld devices.

The classic difficulty of being able to correctly recognize even typed optical language symbols is

the complex irregularity among pictorial representations of the same character due to variations

in fonts, styles and size. This irregularity undoubtedly widens when one deals with handwritten

characters.

Hence the conventional programming methods of mapping symbol images into matrices,

analyzing pixel and/or vector data and trying to decide which symbol corresponds to which

character would yield little or no realistic results. Clearly the needed methodology will be one

that can detect ‘proximity’ of graphic representations to known symbols and make decisions

based on this proximity. To implement such proximity algorithms in the conventional

programming one needs to write endless code, one for each type of possible irregularity or

deviation from the assumed output either in terms of pixel or vector parameters, clearly not a

realistic fare.

An emerging technique in this particular application area is the use of Artificial Neural Network

implementations with networks employing specific guides (learning rules) to update the links

(weights) between their nodes. Such networks can be fed the data from the graphic analysis of

the input picture and trained to output characters in one or another form. Specifically some

network models use a set of desired outputs to compare with the output and compute an error

to make use of in adjusting their weights. Such learning rules are termed as Supervised

Learning.

One such network with supervised learning rule is the Multi-Layer Perception (MLP) model. It

uses the Generalized Delta Learning Rule for adjusting its weights and can be trained for a set

of input/desired output values in a number of iterations. The very nature of this particular

Page 33: Dotnet Projects 2010

8/6/2019 Dotnet Projects 2010

http://slidepdf.com/reader/full/dotnet-projects-2010 33/33

model is that it will force the output to one of nearby values if a variation of input is fed to the

network that it is not trained for, thus solving the proximity issue. Both concepts will be

discussed in the introduction part of this report.

The project has employed the MLP technique mentioned and excellent results were obtained for

a number of widely used font types. The technical approach followed in processing input

images, detecting graphic symbols, analyzing and mapping the symbols and training the

network for a set of desired Unicode characters corresponding to the input images are

discussed in the subsequent sections. Even though the implementation might have some

limitations in terms of functionality and robustness, the researcher is confident that it fully

serves the purpose of addressing the desired objectives.

SOFTWARE REQUIREMENTS

FRONT END : VS .NET 2005 BACK END : SQL SERVER 2000

OPERATING SYSTEM : Windows XP. LANGUAGE : Visual C#

HARDWARE REQUIREMENTS

HARD DISK : 40 GB

RAM : 512 MB

PROCESSOR : Pentium IV

I/O DEVICES : Keyboard, Mouse