Polytechninic Seminar Topic on Designing Network Monitoring System Communication with Report

Introduction to Polytechninic Seminar Topic on Designing Network Monitoring System Communication:

The communication between computers for file sharing and accessing data on other computers is called network. Network is defined as communication between collections of computers for sharing resources for example Printer.

The network is classified into three types based data speed and band width and transfer and receive capabilities.

They are:

  • Local Area Network (LAN)
  • Metropolitan Area Network (MAN)
  • Wide Area Network (WAN) 

Local Area Network (LAN):

          LAN is a network between only a number of computers that they are existed with in the building. The speed is up to 512KBPS speed. The band width is small compared to MAN. 

Metropolitan Area Network (MAN):

     MAN   network that connects over the city or town and its coverage distance 10-100KMS. The Band Width is high compared to LAN as well as Speed also. Its speed is around 100MBPS.

Wide Area Network (WAN):

 WAN covers the countries its range of coverage is 10,000 kilometers. Its band width is very high and speed is also in GBS Up to 10GBPS.

These networks are allowed to interconnect with different media like twisted pair copper wire, optical capable, coaxial cable, Bluetooth (it covers a meter of distance).In September 1940 George stibitz used to transfer the results from his college to New York and the calculator received the results.

The Network monitoring Includes:

• Automatic Discovery

• Smart Classification & Mapping

• Indepth Performance Monitoring

• Security Management

• Intelligent Alerting

• Solution’s Scalability 

Conclusion:

By this network monitoring system one can easily accessed from home and can be monitored. Security is also provided for this system without accessing of intruders and hackers. The system alerts the user whenever another user tries to open the system on network. All resources are shared based on priority.

Download  Polytechninic Seminar Topic on Designing Network Monitoring System Communication with Report.

Student Course Registration Visual Basic Project Report

The aim is to build software for student course registration by automated system. This project is developed using Microsoft visual basic v6.0 and MS-access as back end data-base.

He She  who wants to join an intuition or college comes with necessary details about the course he wants to join and further information is stored in the database by registering and it can be retrieved easily with one click and it can be maintained  up to a long time for future purpose.

System Requirement Specification:

This process of registration is an automated process.

The student should give all details regarding certificates.

Hardware configuration:

 The hard disk RPM should be very high.

 The hard disk should be single not multiple attachment for fast accessing and delivery of data.

 The system must contain at least Windows XP OS with 1GB RAM.

 .Net Framework must be installed on system as minimum requirement.

Data-Flow Edge Image:

The image below shows the flow of how data is processed.  First student comes and selects course it may be a PD/UG.

And he selects the desired course based on his qualification after his registration the data is entered in data-base and for any enquires he contact them.

Conclusion:

By The use of this system the data be easily entered.

There is no chance of losing data because in olden days the data is entered manually in records and after some years the data is lost but by the implementation of this system helped in protecting data even up to 100 years also.

This reduces lot of work task and work Load.

Download  Student Course Registration Visual Basic Project Report.

ECE Technical Seminar Report for Schonhage Stassen Algorithm Seminar Topic

Introduction to Schonhage Stassen Algorithm Seminar Topic:

This algorithm is used multiply the large integers quickly. The developers are Arnold Schönhage and Volker Stassen in 1971.This algorithm uses recursive Fast Fourier transforms in rings with 22n + 1 element. There are several notations in this Big O notation. This algorithm was in use up to furers algorithm. But this algorithm achieves only astronomical large values. The method of schonhage-stassen is based on Crandall and Pomerance in their Prime Numbers.

Convolutions:

For example take numbers 123 and 456 and multiply with the base digit B without carry. The output is.

    1 2 3
  × 4 5 6

    6 12 18
  5 10 15  
4 8 12    

4 13 28 27 18
         
 

 

 

       

The sequence 4, 13, 28, 27, 18 is called linear convolution. They are original sequences of 1, 2, 3 and 4, 5, 6.

Convolution theorem:

The Stassen-schonhage algorithm depends on the convolution theorem. By the use of this algorithm two sequences can be easily calculated. Cyclic convolutions of two vectors are calculated by DFT discrete Fourier transform. Elements are multiplied vector by vector.

CyclicConvolution(X, Y) = IDFT (DFT(X) · DFT(Y)).

For the multiplication of algorithm and to invoke recursively if we use DFT and IDFT for the vectors DFT(x) and IDFT(y) this results in a best algorithm for cyclic convolutions.

Nega cyclic convolution is very useful if use in this algorithm it’s a update of convolution theorem. It can be stated as

A = (aj), 0 ≤ j<n

A−1 = (a−j), 0 ≤ j < n

Now, we can state:

NegacyclicConvolution(X, Y) = A−1 · IDFT (DFT (A · X) · DFT (A · Y)). 

The multiplications of recursive vectors element-by-element can easily calculated by nega cyclic convolution. It also faster than cyclic convolution theorem because it has slight modification mod 2n + 1.

Download  ECE Technical Seminar Report for Schonhage Stassen Algorithm Seminar Topic.

Attacking LSB Based Image Steganographic Technique Seminar Report

Introduction to Attacking LSB Based Image Steganographic Technique Seminar Topic:

The word stegano was derived from a Greek word called steganos which means covering or hiding. Steganography means hiding important messages in any form image, audio, video, paper etc. The process allows covering important messages in uncommon way. From the ancient days steganography was used by covering the wood texts with waxes. During the World War 2 also it is used by some spies. Invisible inks are mostly used as a process of steganography they are seen only heated under fire. Steganography is used ide copy-right information in images or audio or video. By this third party sharing.

Steganography-Today:

Us government concerned the needs of the steganography. Terrorists are using steganography to communicate between each other. For example Al-Qaeda posting images over air and they are downloaded by other and they revealed by their techniques. It is also considered as anti-forensic mechanism which includes child pornography.

Steganography-Tools:

The tools which are used:

  • StegoDons
  • MandelSteg
  • Hide and Seek
  • Jpeg-Jsteg
  • Stools
  • Ezstego
  • Hide4pGp
  • Stegaons
  • StegHide
  • Invisible
  • JpHide
  • Hiderman
  • camouflage

Types of Analysis:

  • Specific image steganalysis :
  • Palette Image Steganalysis
  • Raw Image Steganalysis
  • JPEG Image Steganalysis
  • Generic Image Steganalysis Algorithms 

Steganalysis meets Cryptanalysis: 

  • size difference
  • date/time difference
  • contents – modifications
  • checksum
    • Categories
    • Histogram analysis
    • Change in file properties
    • Statistical Attack
    • Visually
    • Audible

Common encryption algorithms used:

–        XOR

–        DES

–        3DES

–        IDEA

–        AES 

Password Guessing/Dictionary Attacks:

There are some password guessing techniques like brute-force, Rainbow.

Passwords can be determined by Camouflage.

Multi hex program can also be used.

Conclusion:

By using these techniques piracy can be controlled easily. There is no chance of sharing copy righted images audio vedio. Steganography has been implemented in various techniques in this trend.

Download  Attacking LSB Based Image Steganographic Technique Seminar Report.

Computer Seminar Topic on Static Router with Seminar Report

Introduction to Seminar Topic on Static Router:

Router is a device which routers the inter network from the source to destination. They transfer the packets from one network to another network. Routers use static and dynamic routing protocols in certain situations. Static routings are very common in routing.

Role of Router:

Routers are plays a key role in internet working. They determine the best path to transfer the packets from the source to the destination. It includes forwarding the packets or sending. They perform routing by remote networks and maintaining information about packets. The routers first forwarding decision is based on three layer information that is internet proxy address. The routing table is best way to find the match between the destination internet proxy of a packet and network addressing routing table. The router encapsulates the packet and sent them to appropriate IP address.

Router connections:

The router is to be connected with network with router interface. There are different types of connectors.

Serial connectors:

In serial connectors support EIA/TIA-232, EIA/TIA-449, V.35, X.21, and EIA/TIA-530 standards of connectors.DB-60 port supports five different cables and other ends are connected supported cables. Routers support smart serial interfaces which are 26-pin connectors it is whether DCE or DTE configuration type. It is smaller compared to DB-60. The cable which that we are using that is automatically determined by WAN-service that we are using.

Ethernet Connectors:

In Ethernet connectors a twisted pair RJ-45 connector is used for LAN-connections. It has eight-colored pins or strips. Ethernet cable uses 1, 2, 3 and 6 for sending and receiving data. A patch cable and cross over cables are used to connect.

Straight-through cables are used for:

  • Switch-to-router
  • Switch-to-PC
  • Hub-to-PC
  • Hub-to-server 

Crossover cables are used for:

  • Switch-to-switch
  • PC-to-PC
  • Switch-to-hub
  • Hub-to-hub
  • Router-to-router
  • Router-to-server

 Download  Computer Seminar Topic on Static Router with Seminar Report.

Rajastan Tourism Website PHP Project Report

Introduction to Rajastan Tourism Website PHP Project:

The aim of this project is develop a website which is used Rajasthan tourism. It is developed using Xaamp/php5 and MySQL. By this website the customer can view the information of Rajasthan and it history along with that the number hotels available, Different places and visited locations are previewed on the website. Not only this packages and offers available are also shown. Some of the salient features provided to the customer are as follows

  Customer can get information about particular place

  Information regarding hotels can also be obtained

  The information can also get through e-mail

 Customer can maintain/manage his profile at any time anywhere.

Scope:

The system present is time consuming and it includes lot of work task. Because the current system is manual entry. The errors are also increased along with turnaround time. The reports cannot be generated in in time.

Pages:

There are two pages

  • Admin page
  • User page

Admin page:

The admin page contains Login id and password for admin login. It has also INSERTION, UPDATION, DELETION of hotels information and details. Admin can also make another user also admin.

User Page:

The user page contains details of hotels and places. User can also create an account by registering new account and he can login into his account and he can book rooms directly via internet. The payment is done through online transfer.

Conclusion:

By this website the tourism of Rajasthan is developed all over the world. Not only that this place history and historic monuments and some interesting facts can also know by the people  which creates interest among the people to visit the place which helps to increase number of visitors.

Library Management System Computer Project in java with SRS

Introduction to Library Management System Computer Project in java:

The main aim of this project to illustrate the requirements needed for the library management system. The project gives a view about both functional and non-functional requirements chosen by the client. The project is developed using Edraw Tool, JAVA, MS-ACCESS database, SQL. This application has a search facility the admin can search by book or name. The admin can add or remove users or book from database.

Scope:

 The library transactions like issue, return and renewal of members. It can be used in various fields like :

  In an educational institute, college giving description about content and the author.

 It can used in libraries for easily maintain the books and their details.

Conventions used:

  • Admin: a person who has admin access privileges can login with his id and password.
  • User: The user can login into his account by the assigned login id and with his password.
  • Clients: They are nothing but intended users.
  • SQL: It is used to retrieve the data from data base.
  • SQL server: It used to store data in an order.
  • Unique key: It is used for the differentiation of table entries.

Product features:

  • Admin is the librarian.
  • Student can access his account through online
  •  To the Librarian can issue a book to the student.
  • Admin/user can view different books available in library.
  • Admin can the books information or edit them.
  • Admin check issued books and can view the details of student accounts.
  • Student can request a new book from library
  • Student can view the previous books that he was taken.
  • Student can search all the books available in library.

Data-Base Tables:

  • Books database
  • Borrowers database
  • Users database
  • Category database

E-Bazar Computer Project in Asp.Net with Project Report

Introduction to E-Bazar Computer Project in Asp.Net:

The project is developed using ASP.NET, AJAX, HTML, CSS and SQL.E-bazar main aim it to build a bridge between seller retailer and customer. E-bazar software is user-friendly quick learnable and with menu driven user interface. By this web-based software vendors and customers can connect with each other via internet as medium.

The customer need not go to the shop and buy the products he can simply purchase all the products from home or anywhere. The admin module in this application has facility to request or reject shops. E-bazar is standalone software.

Scope:

E-bazar features the e-shopping-bazar focuses on e-shopping where the customer and vendor can meet for online shopping and selling purpose. It runs on both windows as well as LINUX. By using this application so much work task is reduced and it is going to bring a revolution in e-marketing.

Product Functions:

E-BAZAAR Administrator:

The admin is the super user and he has facility to control all the activities. The admin is notified by new shop requests he has an option to reject or accept it. The admin manages the all the product category lists.

Shop Owner:

The shop owner can request admin for the shop creation. Then admin notified the request based on his decision the shop owner can put their shop. The owner has to maintain and setup like creating sub product list. He can add or remove the products.

 E-BAZAAR Customer/Guests:

The customer can browse through the products and he can buy the products whatever likes and these products are placed in virtual cart list from this user can add or remove the products. For purchasing products customer has register and have to fill up all the details in the form after he can change any profile information after that he can buy products.

Employees:

A purchasing manager monitors the activities of purchasing. Sales manager monitors sale of products. Account manager checks all accounts.

Hotel Management System Documentation

The title of my project is Hotel Management Systems. I have attempted to un-complicate the onerous process of the Hotel Management System by using a prepared & Modular technique as well as create a Menu leaning boundary.

I have attempted to make the project as user friendly and extensible as possible, so its use and extension can be done without much endeavor. Even though this project is not exhaustive, the principle purpose of this exercise is to automate and digitize an Employee’s activity which saves a lot of time in comparison to manual methods. 

This software parcel does not require users to be proficient in programming techniques; it is very user friendly and enables people to operate it without error. This scheme is meant for two kinds of users, namely:

 I. Online customers.

ii. Administrator 

Online customers can view relevant articles and news, and Administrators can maintain the package with daily updates to the hotel account. The Administrator has to be an allowed user with a password. Password recovery and password change functions are also built in to the package. 

The principle goal of this package is to ensure that the entire Hotel management scheme, like Room actions, Assigning rooms according to client’s demand, Admission of a new customer, etc, is automated and digitized. 

Due to time constrains and limited resources, we have restricted our scope to the main functions of a Hotel Management System. Due worry has been full to build the scheme user friendly and efficient. 

The Hotel Management scheme has been considered to automate and digitize the subsequent functions performed by hotels. 

  • Room feature Functions
  • Opening a latest Room
  • Modification to area assigned
  • Admission of original customer
  • Check-out of client
  • Room transmission related to client’s need.
  • Statement of client Details
  • Check-in client
  • Check-out client
  • Room particulars
  • Total figure of clients in the lodge
  • Individual client Report

Hostel Management System Visual Basic Project Report for MCA Students

Introduction to Hostel Management System Visual Basic Project:

Hostel management using a manual system is an onerous and time consuming process involving heavy workload. In the proposed system, one can easily manage the various functions of a hotel in an efficient manner.

Things like, hostel details, student records, mess expenditure can be calculated and allocated in an optimized manner. The key feature of this project is to easily allocate rooms and expenditures of a student. The front end of the project has been created using Visual Basic and the back end using Oracle. 

Hostel management deals with the many functions of a hostel, namely: student details, room allocation, mess expenditure, etc. the system also includes a few special features such as creating unique identities for each members so student details can be accessed easily. This system can also be used for stock management.

The modules of this project include: student details, attendance details, room details, mess modules. Things like, hostel details, student records, mess expenditure may be calculated associated allotted in an optimized manner. The key feature of this project is to simply portion rooms and expenditures of a student. 

The front end tool used for this system is visual Basic 6.0, and the back end tool being used is Oracle. Visual Basic is a very useful and powerful program, application wizards, menu editors and data reports give it an edge when creating high quality professional software.

Things like, hostel details, student records, mess expenditure will be calculated associate degrees allotted in an optimized manner. The key feature of this project is to simply apportion rooms and expenditures of a student.

This system may be used for stock management. The system additionally includes a number of special options like making distinctive identities for every member thus student details will be accessed simply. The input quality of this mission is to simply assign quarters and expenditures of learner. 

Download  Hostel Management System Visual Basic Project Report for MCA Students.