ATM Simulation System .Net Mini Project

DESCRIPTION:

           ATM simulation system is windows based application was developed in Visual Studio ASP.Net & SQL Server. In this our transaction will be stored in database and retrieve by their identify number or name. The objective of this final year mini ATM project is to prepare a software or application, which could maintain data & provide a user friendly interface for retrieving customer related details just in   few seconds, with 100% accuracy. So it is not time consuming   process.

Title of the project: ATM Simulation System .Net Mini Project

 Front End Tools Used: Visual Studio .Net 2008

Programming Language:ASP.Net & C#.Net

 Operating System used: Windows XP

Database: SQL SERVER

Municipal Administration System

  • Title Of The Project: Municipal Administration System
  • Technologies Used:  ASP.NET, C#.NET, VB.NET and MS-SQL SERVER 2005

Description:

      Municipality Administrative System automates the entire process keeping in the view of database integration apporach.The application has rich User Interface and provides access to the internet and provides good security for the user information as data is not available in the client machine.

This project is categorized into 7 modules:

  • Municipality Administrator module.
  • Municipality officer’s module.
  • Citizen module.
  • Web Registration module.
  • Assets and Inventory module.
  • Advertisement Tax module.
  • Authentication module.

       The working employee on municipality is called as municipality officer. They can perform different functionalities on municipality. The employee need to calculate the tax percentage of an advertisement tax belongs to that municipality. Calculating depreciation, sales of assets, purchase of products, purchase returns and wastage of products.

Responsibilities in project:

Information gathering, designing, unit testing and implementation.

Remote DBA Alert Java Project

  • Name of the ProjectRemote DBA Alert Java Project.
  • Language/Tools Used: J2EE, J2ME.               
  • Platform: Windows NT/2000.

Remote DBA Alert Java Project Description        :

A Remote Database support service provides all the functions of a full-time Database Administrator (DBA) including monitoring, maintenance. The Remote Database consists of a central operations center and a Database Administrator (DBA) team, both of which are shared in order to support multiple clients on a 24×7 basis. It is used to provide cost effective, security, reliability and expert remote Database Administrator (DBA) services. It is hard to find a single Database Administrator (DBA) who has the breadth of expertise in all areas of oracle that needed. A lot of time and money is spend on hiring process. Remote Database Administrator (DBA) will manage the DB at a fraction of cost, of doing it in-house.               

DBA can access the database using carriers like TATA, Airtel, Hutch etc. Remote DBA alert systems will be most useful to the DBAs who do not want to be in contract with any one organization and wants to render their services to different organizations.

Voice Over Internet Protocol Final Year Project

The digital revolution forced the people to find means for digital communication this led to the emergence of Internet Protocol (IP) based data networks which differ in many ways. The introduction of voice over internet protocol (VOIP) has made it possible to use the IP networks for all the telephonic calls.

Evolution

In the late 2003 or the early 2004 the VOIP services over broadband services was introduced. However the technology found its place only in the year 2009, when many corporate services started using VOIP for long distance communication and as we are human and it is in our nature that we don’t get satisfied with anything so we can expect more development in the technology and hence the future for VOIP is very bright. The need for the growth of the technology could also be due to the increase in the number of users subscribing. As the eMarketer’s estimate shows, the number of residential VoIP subscribers is expected to grow rapidly from 37.8 million paid subscribers in 2006 to 152.6 million in 2011. This also buids pressure on the providers for providing quality service to the user so services are finding different ways not only to attract new users but also to satisfy existing users.

 Aim of the project:

This Voice Over Internet Protocol Final Year Project is to investigate security involvement in VOIP. The procedures are for a secure, safe and reliable. VoIP is to propose the security methods. Based on the safety measure requirements 13 securities have been shortlisted and the thesis has furthered alongside to account any key data that required development. Routinely showing up measure is the security parameter, quality of service values, like latency, voice echoes and packet loss. To arrive at the accurate choice measures over the above parameters the thesis has been elaborated in aspects of Project Design and simulation. Researcher has put into use proprietary software which includes Visual Route, Minitab and VoIP Calculator.

Research Objectives:

As noted in the disadvantages, it is important to focus more on security and quality issues with reference to the VOIP technology to streamline to data pertinence for using a deployment project. The project aims at fulfilling the objective on a step by step approach of each objective:

          a) Over viewing/examining of VoIP technology.

          b) Recognizing common security threats, previously failed procedures.

          c) Review based on existing VoIP encryption methods and their efficiency.

          d) Recognizing problems with VoIP protocols.

          e) Designing a method.

          f) Lastly to simulating the design into a project.

Constructing IDPFs using BGP

In this thesis, we have suggested and studied IDPF architecture as an efficient countermeasure for the IP spoofing based DDoS attacks. IDPFs depend on BGP update messages interchanged on the Internet to conclude the validity of source address of a packet send by a neighbor.

We have demonstrated that IDPFs can easily be deployed on the present BGP based Internet routing architecture. We learned the conditions under which the IDPF framework can properly work without discarding any legitimate packets. IDPFs in an important manner limit the spoofing capability of attackers. In addition, they also assist to pinpoint the true origin of an attack packet to be within a small number of candidate networks, thus simplifying the reactive IP traceback process.

Constructing IDPFs using BGPThe attached Constructing IDPFs using BGP Project Contains the below:

TABLE OF CONTENT

ABSTRACT

ACKNOWLEDGMENT

TABLE OF CONTENT

LIST OF FIGURES

LIST OF TABLES

LIST OF ACRONYMS

Chapter 1: Introduction to the Project

1.1 History of the Project

1.2 Proposed System

1.3 Aims and Objectives of the Project

1.4 TCP and IP Protocol

1.5 How Spoofing works

      1.5.1 Uses of Spoofing

      1.5.2   Spoofing purpose

              1.6 Conclusion

Chapter 2: Types of Spoofing

                2.1 DDOS Attacks

                2.2 Non-Blind Spoofing

                2.3 Blind Spoofing

                2.4 Man in the middle attack

               2.5 Conclusion
Constructing IDPFs using BGP1

Chapter 3: Security Requirements

                 3.1 Network security requirements

                 3.2 System security requirements

                  3.3 Information Security requirements

                 3.4 Conclusion

Chapter 4: Threats on data

                 4.1 Hackers

                4.2 Vulnerability

                4.3 Viruses

                4.4 Trojan horse programs

                 4.5 Attacks

                  4.6 Conclusion

Chapter 5: Security Policies

                 5.1 What are policies?

                 5.2 Firewalls

                 5.3 Encryption

                 5.4 Intrusion Detection

                 5.5 Conclusion

Chapter 6: Review on BGP Protocol

                  6.1 Background

                  6.2 BGP Operations

                       6.2.1 Interautonomous system routing

                       6.2.2 Intra-autonomous system routing

                       6.2.3 Pass-through autonomous system

                  6.3 BGP Routing

                  6.4 BGP Message Types

                       6.4.1 Open message

                       6.4.2 Update message

                       6.4.3 Notification message

                       6.4.4 Keep-alive message

                   6.5 Conclusion

Chapter 7: BGP and AS interconnections

                  7.1 Policies and Route Selection

                   7.2 AS Relationships and Routing Policies

                   7.3 Conclusion

Chapter 8: IDPF Architecture

                   8.1 IDPF Overview

                   8.2 Constructing IDPFs

                        8.2.1 Correctness of IDPF

                         8.2.2 Routing policy complications

                   8.3 Practical Deployment of IDPF

                   8.4 Conclusion

 Chapter 9: Design and Implementation

                  9.1 Technologies Used

                      9.1.1 Javax.swing

                      9.1.2 Java.io package

                       9.1.3 Java.net package

                      9.1.4 Java.sql package

                        9.1.5 Java.awt package

                  9.2 Tools Used

                    9.2.1 Jframe Builder Tool

                9.3 Code Snippet

                9.4 Screen shots

Chapter 10: Conclusion and Future work of the Project

References to  the Project

Download CONSTRUCTING INTER-DOMAIN PACKET FILTERS BASED ON BGP UPDATES TO CONTROL IP SPOOFING Java Final Year Project with source code.

Location-Based Spatial Query Processing in Wireless Broadcast Environments

The Location-Based Spatial Query Processing in Wireless Broadcast Environments project executes in jdk 1.6
Steps to Execute:

  • double click on c_server bat file in source code folder
  • double click on mh1 bat file in source code folder
  • double click on mh2 bat file in source code folder
  • double click on mh3 bat file in source code folder
  • follow the rules present in the attached vedio

Hardware Requirements:

PROCESSOR        :    PENTIUM IV 2.6 GHz
RAM         :  1 GB DD RAM
HARD DISK         :  80 GB

Software Requirements:

JDK 1.5
Java Swing
SQL Server
HTML
Java Script
SQL Server

Brief Info:

          Location-Based Spatial Query Processing in Wireless Broadcast Environments           The web pages are just the test-encoding of what the application intends to present to the users. Every web site has get a unique address called Uniform Resource Location (URL) or the Internet Protocol (IP) address. The URL is an address that the web uses to find the specific information on the Internet. The URL can locate something which is local to the system or anywhere remote on the Internet. An example of web site address could be https://1000projects.org where http:// represents the protocol path and www.1000PROJECTS.ORG represents the domain organization. Similarly we do have .GOV for government, .EDU for educational institutions etc.

HTTP is a protocol that moves the html documents over the Internet.

                     HTML is a format for storing the documents and the web site. Every web site has got a bunch of html documents. This html is not a programming language. All the documents that you view on the www are created using the html. The www uses a set of protocols like http that gives the Internet users to access to a vast amount of information on the Internet .

Download Location-Based Spatial Query Processing in Wireless Broadcast Environments Final Year Java Project

Download Location based spatial query processing in wireless broadcast environments project 2008 base paper, project report and source code in java.

Monitoring Online Tests through Data Visualization Project

In the Monitoring Online Tests through Data Visualization Project, We would like to devise new visual representations and perform further experiments, possibly in combination with classical data mining algorithms. Moreover, since the approach leads itself to the application to other application fields such as e-commerce, in the future, I would like to evaluate its use in these contexts. Finally, I wish to explore more deeply the problem of cheating detection, which we just treat in broad terms here, since we believe that an approach based on logging and visualization can be promising and effective to this aim.

Monitoring Online Tests through Data Visualization IEEE ProjectSteps to run the Project:

1)Import  project.

2)Run database Script.

3)Run application in myeclipse server.

4)It will automatically shows login page.

5)You have to choose examination.

6)Answering the questions by using options.

7)Click on logout.

Download Monitoring Online Tests through Data Visualization Java Final Year Project Documentation with Source Code

Route Stability in MANETs under the Random Direction Mobility Model

The attached Route Stability in MANETs under the Random Direction Mobility Model Final Year ASP.Net Project Contains the below table of contents:

  • Scope of the project:
  • Literature review:
  • Modules:
  • Module Description:
  • System Architecture:
  • Dataflow diagram:
  • UML Diagrams:
  • Use case diagram:

Random Direction Router

Brief Info:

                      A WWW is global hypertext system that uses the Internet system as its transmission medium. It contains all the hypertext media, which are connected by links all these are wrapped up in a web. A collection of documents inter linked by hyperlinks is called a web.Client

An Internet is a network of closely connected computers all over the world where each computer acts a web site.

An Intranet is a network of connected computers with in a domain.

A Web site is a computer system that runs a web server and has been for publishing documents. Some of the computers which act as the store house of information is called a web site. It is a collection of web pages connected together with hyperlinks so that each is associated with the others. Some web site may have a single document while consist of hundred of pages.

Server

                      A home page is a document that serves as an initial point of entry to web site of related documents. It contains introductory information, hyperlinks to resources and navigation buttons to help users find their way among the various documents.

Hardware Requirements:

  • Processor                : P IV 2.4 GHz.
  • Hard Disk           : 80 GB.
  • RAM Speed                     : 2 GB.

Software Requirements:

  • OS         : – XP
  • Front End                     : – ASP.Net 2.0, HTML, Java Script
  • Programming Language         :- Visual C# .Net

Download Route Stability in MANETs under the Random Direction Mobility Model

Trustworthy Computing under Resource Constraints with the DOWN Policy

The Web Approach: A web like organization of information works the best for most people. With this structure, web pages are linked to each other when relate contextual. There could be several links to a single page, or every document usually has at least two ways to get it. Links could lead the users in a circular path. From  the navigation point of view, this kind of site  is very appealing. It allows the users to get around this site quickly and enjoy a more free form experience of the site. Hence most of the designers use the spider web like approach to organize their content and the web sites.

Dynamic  Web Server Architecture:

                     Web sites require a specialized database they must perform well in a distributed architecture, support object oriented applications and store extended data types like images, spatial and multimedia. Web sites use an object-oriented data base management system (ODBMS) because they are optimized for distributed, object-oriented that store new data types.

                    Trustworthy Computing under Resource Constraints with the DOWN Policy The flow of messages and data in this web server architecture takes place in the following manner. The web browser sends a request for an html template to the web server via the http protocol. The web server receives the request and passes it to one of a pool of ODBMS web service processes on the same machine or LAN as the web server. The web server and the web service communicate via a protocol, which could be either a CGI, FCGI , ISAPI or NSAPI. The web service combines the html in the template file with variables return from the methods to form html dynamically. The browsers thus receive the relation systems by a synchronization gateway. Tools like agents that track the user profile preference, and the database online utilities also interact  with  the database.

                      There are a different variety of web search engines on the internet like Altavista, Lycos, Yahoo, AOL (American Online) and so on which provide us with a list of dynamically a web sites. The Internet users can therefore access any of these web search engines and look for the web site they need.

Download Trustworthy Computing under Resource Constraints with the DOWN Policy Final Year Project

Online Exam Project in Java

The Online Exam Project is developed in Java, it is divided into two main parts.They are

  • Users
  • Administration

Users:

This module is mainly concentrated on handling the examination activities. The module begins by offering entry to already registered users or even fresh users can also register the moment they desire to attempt the Examination. This is achieved by the Login form and Sign Up.These are designed in a very interactive form.

After registering, a candidate will be supervised by the rules and regulations of the examination. i.e. the instructions to be followed for facing the examination be given, namely duration of exam, Number of questions, marks for each Question, Maximum marks,etc.,

The next moment, the candidate be allowed to select the choice of subject of examination. The candidate is given the question paper of the selected Subject. The paper should be answered by checking the check boxes or Radio Buttons depending upon the question.

The evaluation of the paper will be carried for the question that is answered in the meantime. The total marks obtained will be displayed and the percentage will be calculated for the total number of questions.

Administration:

The administration module consists of maintaining components of the examination. The components namely

  • Subject of Examination
  • Questions of Subject.

The Subject of examination can be accessed for alteration. i.e. Addition of a Subject, Updation of a subject, Deletion of a Subject and Listing of the Subject of Examination.

The Questions of examination can also be accessed and altered by performing the following operations.i.e

  • Addition of Questions
  • Updation of Questions
  • Deletion of Questions

In the Administration, the system is efficiently maintained by deleting the users who already completed the examination. This is carried out for a period to period.

The system is mainly coded by viewing the user from all angles so that no problems are arisen  in using the system