Genius Auto Time Tabling for Exam

Auto Timetable Management System will generate optimized timetable automatically for a university or institute using genetic algorithm based on various constraints like course, staff, room and time.

This focuses on storing & processing course data, student data and produce outputs supporting the operational activities. The timetable output contains staff course information, subject descriptions, course timings, and course room information.

Auto Timetable Management System directly integrates with the university’s student information system, Course management system and Assessments management system to fetch the information about student, course, room and staff from the respective modules.

Auto Timetable Management System also will work as standalone system. Using the configuration settings user can plug in or off the integration part. If Auto Timetable Management System is not integrated, the information about course, room and staff can be key-in to the Auto Timetable Management System application.

Auto Timetable Management System generates timetables for a Department with Multiple programs and for all semesters. Here we are using .NET as frontend and SQL SERVER as database.

Web Shop .Net Project

This Web Shop .Net project mainly deals with the operation of shopping the different goods, which are available on the net corresponding to the particular web server so we can call as Web Shop.

Now a days Internet technology is growing to communicate between the people and fulfilling their needs. Application on Internet plays an important role in the application development, which is providing all round solutions right from the mails to e-commerce On such due-course, this Web Shop project is stepping towards the Internet project development used for shopping on net.

This Web Shop .Net project contains mainly transactions between the customers of the e-Shoppe Server so that to access the goods that is available at the corresponding server.

In this Web Shop .Net project the customer after getting into the concern site as to make selection of the products that are given displayed after that for the payment of the money he/she as to go through login process and has to specify the credit card details and get the products ordered.

The old customer’s customer-id and the related password should be valid for shopping on the net. This Web Shop project has been developed using HTML and on the server side using Active Server Pages .NET with the help of VBScript as both on server side and client side validations.

 

Pre-Paid Internet Accessing Project Abstract

Abstract:

Prepaid Internet Access takes a couple of minutes to set up and get started. The service can be purchased and renewed online in minutes. Prepaid Internet Access account with preset blocks of time, valid for 1 year + the added benefit of being able to use the service from any place with the same username and password.

A software-based prepaid micro payment scheme is developed. As with existing prepaid micro payment schemes, the profits of the merchants are protected. Furthermore, in this proposed scheme, fairness for the customers is also assured.

More precisely, in this new scheme, the merchant, after receiving prepaid money, can only claim that a customer has already spent a specific amount of money by showing the required cryptographic witness, which can only be received from that customer when making a payment.

Most importantly, in this new scheme, no public key-signature computation is required. Finally, it is shown that, owing to its simplicity and high performance, the proposed scheme can also be employed by small pieces of electronic equipment for general-purpose resource-access control.

This Pre-Paid Internet Accessing software will be of great use to the administrator who controls the internet access, he can implement a systematic way of accessing the internet. A customized browser is provided to act as communicating tool between the prepaid net access application and user. The browser will intimate the user the amount of time he has left out for browsing.

INTRODUCTION:

This Pre-Paid Internet Accessing project deals in Internet access on prepaid basis. The following conditions apply for prepaid Internet access.

Prepaid Internet is for general Internet access within the Federated countries and all prepaid email accounts end with @mail.com Internet access on a prepaid basis are charged on a usage sensitive basis. Customers have the flexibility to define the duration of the email account (in monthly increment).

At the expiration of the email account, the customer has 90 days to revalidate the account, otherwise, the account is deleted and all messages purged. A user can utilize existing prepaid cards for new prepaid Internet service.

Prepaid Internet access, Customers will use Timecards’ serial and scratch-off number as username and password to gain Internet access. The balance on the prepaid card will be debited according to megabyte usage for both transmit and receive data (rounded to the nearest Mb) per each Internet session.

To set up a new connection on another computer, you need to make sure it is configured to connect to the internet. Follow the instructions below:

  • To access the Internet with your prepaid card, click on the dialer icon or the shortcut that you have created on your desktop.
  • This window will open. Enter the card number as the username and the scratch number as the password. Click “Dial” or “Connect”.
  • Your prepaid will be accessed.

A business method for providing Internet access to users comprises requesting access to the Internet via the public telephone network or other Internet access infrastructure such as DSL, cable, wireless, or dedicated line, presenting a user name and password and then verifying the user name, password, account activation status and account time balance if the account is for a fixed amount of on line time, or date of expiration if the account is for a fixed elapsed time.

The system acknowledges user access by identifying the account time balance or expiration date. This is followed by allowing access to the Internet and using the Internet access for a session time of not more than the account time balance or up to the terminal date. After that the access time is disconnected.
A new account time balance is calculated if appropriate and the time balance, if any, is communicated to the user.

 

SOFTWARE’S USED:

  • C#.NET(HARD-CODE)
  • MS SQL OR XML

Advantage

  • Using is very simple.
  • Easy installation.
  • It can be carried out to any place by using Laptop.
  • It connects to any kind of Browser.
  • No need to wait in the Cyber Café wasting the time.

Disadvantage

  • Sometime server may be down.
  • Some of the cable equipment is expensive.
  • Consumption of power is more because of PC

Application

This Pre-Paid Internet Accessing software is very much user friendly and provide a secure to the internet, in terms of prepaid access concept, the customized browser provided communicates with the prepaid application and work according as a perfect user interface.

Online Exam with Graphical Presentation Project

ABSTRACT:

As one of this online exam tools are quite effective in this generation however, we have developed a web-based online exam system, which can create questions closely, competitively, and collaboratively by students for purpose of reducing the load required for a teacher and promoting interactions among students and between the teacher, this should be done in order to improve students comprehension levels and learning motivation.

This is intuitive Online Exam application through which we can conduct online exams on various topics as we desire.

INTRODUCTION:

This Online Exam with Graphical Presentation Project deals with online exam, as one of this online exam tools are successfully implemented in universities. This project improves student’s comprehension levels and learning motivation. This Online exam tool had been programmed in xml file on the server from the information technology department.

In a first step an invitation email will be sent to all the students for online registration to manage their account by providing username and password to conduct the online exam, after logging in you will be having instruction to follow the procedure and later on main exam paper will be displayed and there schedule time will be fixed, we have to finish online exam in scheduled time.

Questions appear in the website with answers, answer will be subdivided into 4 sections, you just have to search to find the correct answers, after each question there is a link for the next web page, if any answers are wrong you will have the opportunity to go back and try again for the correct answer.

When you have answered the entire question, you have to click on the submit button at the bottom of the exam page and our computer will calculate your results on the spot. You may then choose to review your exam for any wrong answer given. Later results can be downloaded or can be taken the printout.

Each exam is dynamically created and built with the latest server-side technology using advanced randomization techniques for increasing security, but implements widely compatible client-side technology so that almost anyone with a web browser can use the system. The data is then stored in server-side, making it nearly impossible to cheat the system.

SOFTWARES USED:

  • C#.NET(HARD-CODE)
  • MS SQL OR XML

Advantage

• You can login and take the exam at any time
• In spot the computer will calculate the results
• It can be used from any place with Internet connection
• Easy Job
• Fast and effective service

Disadvantage

• PC Dependable
• Answers cant be discussed with any one
• Fixed time can’t be extended.
• Initially it’s expensive.

Application

This Online Exam project is very useful for this generation because anyone can successfully begin online exam, it is presented to you in a simple and easy format that enables you to improve your effectiveness and efficiency to prepare for interviews confidently and successfully.

Cipher Data Transfer and De-Cipher System

Abstract:

The task of securing highly confidential data is of great need in data communication, and data transfer these days, data hacking and phishing are of great vulnerable to confidential data in today’s internet world . Securing of data through password, and multilevel-password is not far enough safer for data it contains. The data these days needs a better level of security procedure which can ensure data integrity and security faster with fewer levels of process, better user interactivity and user friendly.

The security measure taken must be far enough to withstand the possible intrusions in may come across while data is transferred over a network and thereby ensuring the integrity of data to be delivered to its corresponding recipient/recipients as it is look and feel while sending, making data communication between sender and receiver safer and easier.

Sensing the above said problem on data security, the precise methodologies to safeguard data in a sound way is to make use of Algorithm encryption standards and digital signature methodology, which ensure data integrity and protection to data the optimal way.

Through rigorous analysis on level of security the data communication needs, a set of requirement for the proposed system was identified and functional specification document was prepared.

“Cipher Data Transfer and De-cipher System” is a windows application which is capable of providing better security to data, through intuitive user interface and accepted world class algorithms and methodology that provide high-end security to data, transfer of cipher data is also possible via this application.

Microsoft visual studio mend with .Net Framework, with world class reputed algorithm concepts and methodology and SMTP is used to develop this application confirming all norms, standards, and thereby fulfilling needs and requirements. Microsoft visual studio IDE is used to design the front-end application and C# concepts are used as hard-code. SMTP is implemented for data communication of cipher data between the sender and its corresponding recipients

INTRODUCTION

CDT-DS (CIPHER DATA TRANSFER AND DE-CIPHER SYSTEM)

The CDT-DS is developed to provide high-end security to data and data communication in cohesion with the world-wide reputed algorithm’s Advanced Encryption Standards (AES), Data Encryption Standards (DES), and Digital Signature methodology

The CDT-DS is designed to ease the burden of data security to any authenticated user through all levels of it processing data. CDT-DS is a single roof multi-process application, where u can secure data using algorithm encryption, apply digital signature to data, and send cipher data through mail transfer application.

In early days data encryption needs symbolic codes table and other technical notation for encrypting every given data it take huge amount of time and human source and needs only technical persons, who did encryption or need person who knows about that encryption , making data security and data communication those days was indeed a frantic task to perform.

But these days data encryption is eased a lot through modern and advanced technologies, of one is facilitating the Cipher data transfer and de-cipher tools is much efficient to make all sort of data security is performed and gathered by application and forwarded to administrator mobile without time, money, and energy waste thereby saving a lot of resources.

This Cipher Data Transfer and De-Cipher System application aims at assisting the administrator who wants to gather information of clients system in a subtle way, with the help of Operating System protocol in client’s pc, this omnibus process is done in milieu when the OS is in idle state interacting with the system files to generate reports.

This collection process needs authenticated access from administrator side, upon valid authentication the information is generated and sent to mobile. This application also supports all Operating System, making the functionality of this tool much more efficient, across different platform.

SOFTWARE ENVIRONMENT:

Operating System : Windows, Linux (.Net Framework needed)
Basic needs : IIS, .Net Framework, Browser,
Internet Tools : Anti-Virus (Optional)

Advantages:

  • The Cipher Data Transfer and De-Cipher System application is highly control based, easy to use.
  • The application has a user friendly GUI interface.
  • The application is robust in terms of data size.
  • Mailing confidential data is possible using the mailer tool.
  • It has encryption and digital signature for data security.

Disadvantages:

  • If data is big and vast, it takes time to encrypt.

Application:

This Cipher Data Transfer and De-Cipher System Application is useful for organization who wants to preserve their data confidentially, Where data is treated more as an investment, where data securing is all the business, this application has all features of preserving the data as it is before securing. It has digital signature for data integrity, it has algorithm for encryption, it has mail sending tool to forward data.

Block diagram


Client side:

Client-System Monitoring via Mobile Based Message Integration

ABSTRACT:

The existing Monitoring application has integration via internet based email service and supports wired network connectivity only, making the system monitoring monotonous, lengthy and time taking, the connectivity methods used in it are not easy to implement and cost effective, the cross platform functionality is limited. To overcome all the above said creep-crawls a new Application is developed with all bugs fixed.

This Client-System Monitoring via Mobile Based Message Integration Project deals with, Client-System Monitoring and data transferring to mobile Connectivity, the monitoring tool collects and generates a report summary on the client pc as a ad-hoc task and forwards the information to desired mobile number as text message, this monitor tool works in the background without disturbing the Client proceedings, helping in making a silent but sorted out meta-data gathering to the respective Mobile through which the Client pc is monitored upon the information received

The user has to initially make a one time installation in his system and configuration is simple needs no guidance, once set to work the application starts gathering information interacting with the system files of operating system installed in the PC, and generate a summary of process running, bugs in hardware & software, webpage history and useful data needed for better monitoring.

All above process is done in background without disturbing the user working and also saving the CPU and Physical memory usage, as most of the information is collected when the system is in idle state.

The Client-System Monitoring via Mobile Based Message Integration Application works in all OS Platform, the technology used .NET windows application .NET mobile concepts and n/w concepts making the front-end thoroughly an intrinsic interface in network monitoring.

INTRODUCTION:

In early days system monitoring needs in person visit upon reported problems making system monitoring a tiresome task as many process were made time taking making client service delayed, Many a times client’s direct assistance needed resulting wastage of time and resources on mutual side, facing all these problems made monitor job those days was indeed a frantic task to perform.

But these days monitoring is eased a lot through modern and advanced technologies, of one is facilitating the monitoring in a wireless mode much efficient to make all task is performed and gathered by application and forwarded to administrator mobile without time, money, and energy waste thereby saving a lot of resources.

This application aims at assisting the administrator who wants to gather information of clients system in a subtle way, with the help of Operating System protocol in client’s pc, this omnibus process is done in milieu when the OS is in idle state interacting with the system files to generate reports.

This Client-System Monitoring via Mobile Based Message Integration collection process needs authenticated access from administrator side, upon valid authentication the information is generated and sent to mobile. This Client-System Monitoring application also supports all Operating System, making the functionality of this tool much more efficient, across different platform.

Combining all the concepts and technology above makes this application a ergonomic, safe, secure, and fast performing application, aiming at comforting and satisfying the user needs in a supple way that ease the job of the user and work burden is much reduced.

SOFTWARE REQUIREMENTS:

  • .NET windows Application
  • .NET Mobile Application Concepts
  • C#.NET

Advantages:

  • This Client-System Monitoring via Mobile Based Message Integration application monitoring process works in milieu of system making it computer friendly.
  • It is safe and secure tool for omnibus and message passing to mobile.
  • It is message integrated, so the admin can get information from anywhere to his mobile every user-defined duration.
  • This application is simple to use without any prior study of the application.
  • It is fast and works in most of the OS platforms.

Disadvantages:

• This Client-System Monitoring application is depended on OS based, on a system crash this Application is not accessible.
• Message integration basically needs a mobile to receive And pass Information.

Application:

This Client-System Monitoring application suits all, where the computer needs monitoring without user interaction and system resource spoilage, as the main task of the application is to appease the admin , it suits all OS platform, its basic need is OS interaction making this application common to many computer that needs better monitoring .

BLOCK DIAGRAM:


Client Side:

Anti-Theft Library Organizer Project

ABSTRACT:

Library management has been a big task these days in Software Company, where huge amount of book are managed for staff reference. There should be Software to track these book issue and return transactions, the application will also control book theft.

The data read from the RFID is received and forwarded to application by RF reader via RS232, the application will sort the information read and make it easy to analyze for the library manager, and he will work over the data for book issue or return and then save it to database.

This Anti-Theft Library Organizer application contains maximum software based and less hardware based, where hardware’s like RFID, RS 232 and RF reader are meant for data communication and identification, the software part plays and pivotal role in this in managing the data communication.

Retrieving data , analyze and then added to database during the time of issuing new books, on return of book database is accessed and made changes, the Anti-Theft Library Organizer application is robust and user friendly where less control based operation is done.

Where most of the data is automatically generated from RFID of employees and from RFID in book.

INTRODUCTION:

In early days the library management was carried by manual ledger writing of issue and return, which has the drawback of wrong entry, book theft and many others to the management, later library management was computerized, though it has its own bugs like time taking in issue and return of book as everything need data input.

To overcome all above said problem this project is developed, the project deals library application communicating and managing with a RF Receiver through RS-232 conductor which association the interface between data processing and data communications equipment, and is widely used to connect microcomputers to peripheral devices.

The user of the library has to swipe the RFID in entry to read who are all, came into the library on taking a book the RFID Card shows the information of the person who takes the book, as RFID in the book gives information about the book to issued are returned through RF reader connected to system via RS232 is given the information to the application where it is analyzed by the library manager.

The in charge person will then store it to database, the information contains the time the person who took book came in and what books he took ,what is the book name, how many days for returning the book in case of issue or how many days kept in terms of returning .

We can also make the application to show some other useful information about the library as an optional one like show book shelf on giving book name and other useful info like book availability

SOFTWARE REQUIREMENTS:

  • C#.NET(HARD-CODE)
  • MS SQL OR XML

Advantage

• Day to day information is been stored in PC to check later.
• The outside people cannot enter in to this library with using this technology.
• Managing Library will become much easier and efficient way.

Disadvantage

• If RF reader doesn’t work application can’t get input information.

Application

The Present software is very useful to the Library because it is a data collection technology that uses RF concept coupled with this application will make library management much easier in an efficient way.

BLOCK DIAGRAM:

Sender Side:


RFID Block Diagram


Receiver Side:

Wi-Fi Connectivity Meta-data Omnibus Messaging and GPRS Integrated Monitoring tool

ABSTRACT:

This Wi-Fi Connectivity Meta-data Omnibus Messaging and GPRS Integrated Monitoring tool Project deals with, Wi-Fi Connectivity Meta-data Omnibus Messaging and GPRS Integrated monitoring tool, this monitor tool is a GPRS Based Suite, helping users in making Mobile based Wi-Fi connectivity data gathering and monitoring, the user has to initially login in order to view the information from Wi-Fi network, the information is retrieved from DHCP of TCP/IP application layer. DHCP has the information of how many nodes are connected to the Wi-Fi.

Once Logged in the user has to select the mode of information (1.Novice, 2.Expert) after selecting, the user is fed with the Wi-Fi network information he desires and if the information needed can be forwarded to another user as a test message by the logged in user.

The GUI developed is a very simple, user friendly, robust, memory and space efficient that suits all mobile phone and systems, the technology used .NET windows application .NET mobile concepts and n/w concepts making the front-end thoroughly an intrinsic interface in network monitoring.

The concepts, technologies and security features used in this Wi-Fi Connectivity Meta-data Omnibus Messaging and GPRS Integrated Monitoring tool application are highly futuristic and reliable with message integration tool.

INTRODUCTION:

In early days network monitoring is a tedious task as many process were made manually and scalability of monitoring is limited and not cost efficient, administrator use to control and monitor network single handedly, where he will come across topology configuring, traffic management, routing and many more tiresome tasks, facing all these problems made monitor job those days was indeed a hectic task to perform.

But these days monitoring is eased a lot through modern and advanced technologies, of one is Wi-Fi facilitating the monitoring in a wireless mode much efficient to make all task right from via personal computer with no troublesome wires in between, and without time, money, and energy waste thereby saving a lot of resources.

This application aims at assisting the administrator who wants to gather information of nodes in Wi-Fi network, with the help of DHCP protocol, this omnibus process is done in a mobile using GPRS enabled menu that interacts with the server protocols on which the Wi-Fi works and serves its nodes.

This omnibus process needs authenticated access, and mode of data needed on nodes in network. Upon the selection type the information is generated and received in mobile. This application also supports information forwarding, where you can forward the information to any desired user mobile number as test message upon request or for the purpose of monitoring.

Combining all the concepts and technology above makes this application a ergonomic, safe, secure, and fast performing application, aiming at comforting and satisfying the user needs in a supple way that ease the job of the user and work burden is much reduced.

SOFTWARE REQUIREMENTS:

  • .NET windows Application
  • .NET Mobile Application Concepts
  • C#.NET

Advantages:

  • This GPRS Integrated Monitoring tool application is Wireless based monitor system making the usage very easy.
  • It is GPRS based, easing omnibus and message passing using mobile.
  • It is message integrated, so the admin can get information from anywhere through his mobile.
  • This application is simple to use without any prior study of the application.
  • It is fast and contains all information needed.

Disadvantages:

• This GPRS Integrated Monitoring tool application is Wi-Fi based, on a Hardware failure this Application is not accessible.
• Message integration basically needs a mobile to receive And pass Information.

Application:

This GPRS Integrated Monitoring tool application suits all networks monitoring users who adopted Wi-Fi way of network connectivity, as the main task of the application is to appease the network admin, it suits all network topology, its basic need is DHCP interaction making this application common to many network that uses TCP/IP making this application compatible scalability across networks

BLOCK DIAGRAM:

Admin side:

Client Side:

Mobile Sync .Net Project Abstract

1) Introduction

Mobiles are becoming an inevitable part of modern society. People using mobiles to make calls, to send and read sms, to store contact information, to store person files, photos, videos and music etc. Mobiles so became an important storage device with lot of personal and business related information and messages.

The necessity of the information security is increased in this context. So a mobile backup mechanism is important for the people who think their mobile contents should be secured.

2) Challenge

Challenge is to create a mechanism to synchronize the mobile contents with the backup server online. The items need to be synchronized are incoming sms, contacts, videos, photos and music. This process should be made as simple as a click of a button.

3) Proposed Solution

Proposed solution is a Windows mobile client application which will allow users to simply click and upload the mobile contents to a personalized backup server online. Users will have an option to select the items which they don’t want to take a backup. Application will show the last synchronized time and the necessity to do sync.

Proposed solution also contains a web site to see the uploaded contents online and a web service to interact the web site and the windows mobile client application.

4) Technology

Technologies used are

• Microsoft .Net
• Visual C# language
• ASP.Net
• ASP.Net web service
• SQL Server

5) System Diagram

6) Future enhancements

Mobile Sync can be developed further to restore the back up data to a new mobile in case if the user’s mobile lost or damaged.

7) Conclusion

Mobile backup mechanism may become an inbuilt feature for all mobiles in future. But unfortunately this option is not present now. The importance of Mobile Sync is increasing in this context.

Network Monitor .Net Project Abstract

Network Monitor is a powerful and featureful monitoring tool for Windows. It works as a Windows Service and check system status and provides information regarding available services, running services, stopped services, available drivers, stopped drivers, running drivers utilizes and other administrator tasks.

Network Monitor .Net Project is developed with Visual Basic .NET and use WMI (Windows Management Instrumentation). It crawls over the network for, but can be made to start manually with some configuration settings. Network Crawler not only provides a feature to monitor the system but also provides the administrators to configure different areas of the system

Network Monitor uses the inbuilt feature of Windows Management Instrumentation to interact with the lower levels of system configuration. A system, which is configured as per the configuration, will give a better performance.

The notification feature enables the administrator to avail information regarding the system even when he/she is not at the same location as that of the system.

PURPOSE OF THE PROJECT

• Provide a Single environment from where an administrator can interact with the system resources with in the network.
• Provides Info regarding the no of services running on the system.
• To provide an upgrade support for the system resources.
• Provides interface to interact with the system parameters like network settings, OS Settings, Services, Process et.
• Provides means of reporting the system setting to a person through email. There by an administrator can know the status of a systems throughout the network

HARDWARE & SOFTWARE SPECIFICATIONS

SOFTWARE REQUIREMENTS:

WINDOWS OS
Visual Studio .Net Enterprise Edition
Visual Studio .Net Framework (Minimal for Deployment)