Virus Scanner C++ Mini Project Report

Introduction to Virus Scanner C++ Mini Project:                 

Main plan of this project is to notice the virus in systems and avoid the systems from singular troubles that are occurring by virus. The members who developed anti-virus soft wares are McAfee and kaspersky. Now a day we have antivirus software’s to avoid the system troubles. Computer viruses raise the chance to the computer information stability.

Which reason the information loss and also costly and fixed cost? In this method we have to learn the finding of virus in the systems. One of finding method is Emulation in this scheme program below test is emulate by anti-virus program.

This works at run time of the scheme. An additional method for finding is standing examination or plan performance. The major discovery methods are signature base finding and Heuristic based and File emulation. The signature based method is classically, antivirus software actually relied top signature to mark malware. This protect be very resourceful, but cannot protect next to malware but for samples have already be obtained and signatures created. Due to this signature base approach is not efficient then to new and blurred virus.

Heuristic method is to know a correct virus; it is able to be faster to observe virus relationships through a general signature or through a wrong equivalent to an obtainable signature. Virus scholars put usual area so as to all bug in a family opportunity fully and protect thus shape a single general spot. 

 Along through every one the virus decision method mentions above the simplest and added cheap one for notice greatest division of at hand viruses is signature examine method. This is easy and dishonorable. Like this so a lot of numeral of uncovering methods is there in actual time. For this virus detection software tools used is C and C++. C++ is object oriented.

This permits information Encapsulation and construct. The class used in the virus scanner is “CvirusCleaner::run ()”. Based on bring away of outcome and stop mode we assume that virus scanner an efficient and blame efficient method of bug appreciation.

By exact explanation of the I/O schedule, we are capable to confirm file system chunk and arrangement that ability not be available to a preparation. Our go forward of use object oriented plan have to verified to be easy to develop and distinguish.

Virtual Network CSE Mini Project Report

Introduction to Virtual Network CSE Mini Project:    

The main aim of this project is connecting of dissimilar unrestricted Internet Protocols (IP) from the systems following the Network Address Translation (NAT) from outer surface. The systems which below the unalike NATs may be contain same personal Internet Protocols.

A server program role under one Network Address conversion should smart to poll client program consecutively under unalike Network Address conversion so that the client program container include the similar personal Internet Protocols. Microsoft includes big maintain for the practical private networking technology, which connect the Internet protocol connection of the Internet to join remote customers and for the distant office.

This technology uses mostly two protocols which are point to point tunneling protocol (PPTP) and Layer two tunneling protocol (L2TP). The virtual private network (VPN) is the count of a personal network that encompasses relationships diagonally public or civic networks like the Internet. The running worried VPN link diagonally the Internet rationally operates as a enthusiastic Wide area network relation.

The major essentials of the Virtual protocol system are VPN client VPN server Tunnel, VPN link, Tunneling protocols, tunneling information and transfer Internetwork. The workplace accept VPN relationships from the VPN customers. And the computer initiates the VPN link to the VPN server.  Tunnel is use to summarize the information. VPN connection’s is used to encrypt the information. Tunneling protocols used to continue the tunnels and the relations.

Tunneling information nobody but transmit the information during point to point link. Remote access of VPN is a remote access VPN link is ended by a remote admission client, or a single customer workstation, to facilitate join to individual network. The router to router VPN links done by a router and join two portions of personal networks. Properties of the VPN network are Encapsulation, Encryption Address, name head member of staff serving at table project and verification. By following all these property and conduct we include to join other dissimilar civic Internet Protocols (IP) starting the systems last the Network Address Translation (NAT) from outer surface.

Vehicle Management System Project

Introduction to Vehicle Management System Project:

Vehicle Management System is software and it is implemented by using windows appliance which is printed for 32-bit Windows operating systems which is helpful in the area of count, cutting and deleting the passengers, staff and the bus routes with the help of following modules present in this system are Bus Management, Route Management, Employee Management and traveler Management. 

EXISTING SYSTEM

In the presented system all the jobs of the bus route management is prepared by hand, it is very complicated to the operators  needs to keep the objects records of the bus route in his office and a separate record for the passengers’ and for the booked seats. In current system there is no way to stock up the details of the employees’ working in the bus. So many complaints against staff can happen from the passengers’ side. So in the proposed system it should be analyzed thoroughly in agreement with the needs of the system. 

PROPOSED SYSTEM

It is very useful for the operators and passengers they can decrease the working strain and can keep essential documents associated to the bus and the passengers. The advantage of the proposed system is the decrease in the cost of the office equipments , the business is done speedily and any operator can analyze easily  if any seats for a particular route in a particular day are available or not. 

All the resources essential for the growth of the software as well as the preservation of the software is existing in the organization here we are utilizing the resources which are previously available in the system by using this we can get the maximum usability of the same resources .Even after the development, the organization will not be in a condition to provide more in the organization.

In any it will be designed elements with input and output and must focus on database devise or how data should be organized around user requirements The general purpose of database using is to make information access, easy quick, inexpensive and flexible for other users. The main objective of software arrangement is to provide a frame work that enables the manger to make practical estimates made within a incomplete time frame at the beginning of the software project and should be simplified regularly as the project progresses.

Linux Project CSE Final Year Project Report

Introduction to Linux Project:

The aim of the project is to field creation Linux clusters on condition that LIVEMORE Computing (LC) users by means of the Liver more Model programming surroundings at LLNL. The details about all this described in the past, this was trained by means of variants of the UNIX operating system on proprietary hardware, i.e. with the usage of Linux on near-commodity hardware. we thought that we possibly will acquire further gainful clusters, present improved support to our users, and generate a stand from which open source system software possibly will be developed together with strategic partners and leveraged by the high-performance computing (HPC) the world at huge.

The focal point of the Linux work is to double. First, we deal with the technical space between Linux software and the Livermore Model all the way through a mixture of local software development hard work and group effort. Second, we take part in the design, getting hold of, and carry of these clusters.

The Livermore Model:

The strategy of the LC scalable system is, branded as the Livermore Model (Seager, 2002) and depicted in is to make available a regular application atmosphere on all LC construction clusters. This permits very much difficult scientific simulation applications to be portable across generations of Hardware architectures and stuck between currently available operating systems. The strategy need to make available a unwavering applications development environment in view of the fact that about 1992, when the Meiko CS-2 MPP was introduced at LLN.

The Linux Project even though successful, effort still now has considerable areas for development. The Luster Lite parallel file system and the SLURM resource manager will mutually be deployed in fall 2002. These are significant hard work that requires minor change under construction stresses. The CHAOS attempt will continue to create releases driven by design growth.

Verification of Cryptographic Protocols Using Logic Programming Mini Project Report

Introduction to Verification of Cryptographic Protocols Using Logic Programming Mini Project:

Security of the data plays a main role in real time environment to keep the data from illegal users. For giving security here we mainly use encryption algorithms. But still when tough encryption algorithms are used, data is not safe so we select protocols for giving security. It is compulsory to check the protocol there are several functions and tools are present for testing the protocols, which includes the using automata theory, logic programming etc. cryptography methods are mainly used by network security protocols for getting privacy, verification, integrity and non-repudiation.

Logics used in cryptographic protocols have proved to be very useful assist in validating and correcting these protocols they assist to formalize the analysis about useful theoretical belongings of these protocols. The logic require to write down the early security assumptions of these protocols the logics necessitate to write down the original security assumptions of the protocol that might or else be hidden in the implementation particulars.

It has a number of benefits like, useless message exchanges can be spotted easily. Appropriate changes among related protocols get nearer to the outside. Mainly logics are based on assumptions that are not written clearly. For example many assume that the adding of expressions in commutative and that the sender recognizes its own messages.

In this project they think logic is first order logic, or can simply particular as prolog. Two methods used for first order logic verification are, first is using the concept of strand spaces. This advance is based on the DOLEV-YAO intruder model. It is Graphical user Interface based method that is used to show the properties of arbitrary combinations of the protocols organization at the same time. Concept of strand spaces was established conceivably hard.

Download  Verification of Cryptographic Protocols Using Logic Programming Mini Project Report.

E Monitoring For Women Asp.Net Project Abstract

Introduction to e monitoring systems:

Due to rapid advancement in e technology various monitoring systems are developed for performing various activities. The monitoring systems are mainly used in industries for controlling of equipment and also used in house hold purposes and in offices for controlling the appliances. In this paper a e monitoring system is developed for women which can be as a guide for their personal growth. In this paper we will see how e monitoring system is designed and what are the functional requirements for designing this and the functions monitored by this system.

Brief on working and design:

To make the design we need certain functional requirements like collecting the successful stories of the women across the world which and project them so that they can motivate other girls. Here the e monitoring system id fed with the information of the women belonging to a region and when they login into the system it give them required information and suggestions. It monitors the progress of each girl or women and based on that it suggests them for higher studies by showing the required universities.

Here the application is developed C# .net and it also acts as an interface for internet and the databases are monitored by SQL server. Here the application is designed which can make the analysis and based on that it provides the information. The designed application can run on normal Intel pentium processor and requires 20GB of hard disk and 512mb and RAM. The designed application can run on any platform like windows XP, vista etc.

Advantages of e monitoring system for women:

By using this e monitoring system the women may not rely on any one for any information. It helps in their career growth by giving required suggestions and it shows the required universities for studying and explains the process of applying. Thus we can conclude that this kind of e monitoring systems help the girls or women a lot.

Electronic Voting Machine CSE Full Project Report

Introduction to Electronic Voting Machine Project Report:

Through ballet voting the people elect their representatives in the past days but it was a time consuming process for the counting the votes. Due to the development of electronic technology there is a need of an electronic voting to meet the growing requirements. In this paper we will see about the working of the electronic voting machine and the software modules present in it.

Brief on the working of electronic voting:

The main menu screen of the system consists of four details regarding the voters list and the information regarding the candidates and option for starting the voting process and ending the voting process. The software program for the electronic voting machine is made using c language. The device is loaded with windows operating system and it has 20gb of hard disk and 128mb of ram. Depending upon the requirement we can use a processor with a minimum processing speed of 166 Hz to 2.5 GHz.

The input will be given through keys present on the device. The option will be provide in the software so that we can add or delete the data of the voters and by giving the users name we can check his details. When we use the voting option it stores the count of the votes and at the end of the day we can check total votes polled for each candidate.

Advantages of using an electronic voting machine:

It is very difficult to announce the details when there are more number of voters, but by using a electronic voting machine we can announce the results within a few minutes. In ballet voting we find many cast votes gets rejected as the voter may not stamp the mark properly on his desired party, but by using electronic voting there will not be any wastage of votes. In ballet voting there a chance of casting more number of votes on the name of a single person but in electronic voting it is not possible. 

Download  Electronic Voting Machine CSE Full Project Report.

A Fully Distributed Proactively Secure Threshold Multi signature Scheme CSE Project Abstract

Introduction to A Fully Distributed Proactively Secure Threshold Multi signature Scheme Project:

The main aim of this abstract is presenting secure and efficient way of Threshold multi signature scheme. The fundamental properties are defined in this scheme consist the all properties of the multi signature and thresh hold group signatures.

Existing System:

For the generation of digital signature more shareholders are required.  The shareholders must contribute equally to produce valid digital signatures.The scheme consist the all properties of the multi signature and thresh hold group signatures. Existing multi signature schemes are single-signed.

Proposed System:

The system proposes new threshold multi signal scheme without Trusted Third party. It is based on the based on a round optimal, publicly verifiable DKG protocol. The protocol can be easily incorporated and maintained.  It is very secure.

Modules:

The modules that are included in this project are

  •  Signature

 Signature Generation

 Signature Verification

  • Cryptography

 Encryption

 Decryption

  • Message Transmission

Unicasting

 Multicasting

Signature Generation: The signature is generated by long-term private key. It is generated for the group of members. The encryption for the protocol participant is performed using an appropriate publicly verifiable encryption scheme. The generated signature is broadcasted to all the members. 

Signature Verification: The member’s group signature is collected for generation of signatures. The individual signatures are authenticated by the clerk. Invalidation can be occurred due to participant’s signatures. The protocol can be aborted due to less number of participants. 

Cryptography

 Encryption: The encryption process is used to encrypt the secret messages and they are converted to cipher form.

Decryption: The original message is decrypted by the key by this the original message can be retrieved.

Message Transmission:

The encrypted message is transferred to the group members. This message will be decrypted at other end by the key.This module having two sub modules they are

i) Unicasting

ii) Multicasting.

Download  A Fully Distributed Proactively Secure Threshold Multi signature Scheme CSE Project Abstract.

Practical Training Report on Online Recruitment System

Introduction to Online Recruitment System :

ORS is a part of human resource management system of RSMML Rajasthan State Mines and Minerals Limited. It is government undertaken institution. It markets and produces non-metallic minerals. The minerals produced by RSMML are Rock Phosphate, Lignite, SMS grade Limestone and Gypsum. RSMML is not only the leader in Mining &selling of Rock Phosphate, Gypsum across the country. This system provided the facility to recruit the new members who wants to join. It also contains documents as per candidate requirement. The project is developed with HTML & SERVLETS and JSDK.

Existing System:

  • The existing system does not provide any online recruitment facility. 
  • There is no flexibility to the database. 
  • There is no GUI interaction for more convenience. 
  • Most of the work is done manually. 
  • More man power is required, so it is costly. 
  • The redundancy and inconsistency of data is major drawback. 

The tasks performed during the feasibility study: 

  • The user demonstrable needs are fulfilled. 
  • The availability of resources was being checked. 
  • The estimation required for the resources were achieved. 
  • By placing the model in system we can heck impact on it. 

Objects to be fulfilled: 

Developing the software in time. The application that is created should be efficient. 

User Requirements:

  The application should consist user-friendly environment.

  It should full fill all facilities.

  The application built should be software independent.

Requirement Determination Techniques & System Analysis Method:                

 User communication 

  Team discussion 

  Analysis of existing system 

  Studying of old projects and records.

Hostel Management System Asp.Net Project Report for Final Year Students

Introduction to Hostel Management System Asp.Net Project Report:

The aim of Hostel Management System project is to maintain the maintain the all activities in managing a hostel. The project is developed by Microsoft visual studio and c#.net, SQL as back end server data-base. The number of hostels is increased rapidly due to this maintaining the hostel became very difficult. So to avoid all the troubles in maintaining the hostel this management system was developed. The software is completely GUI interface with simple instructions. The software includes Student module, Admin module, Student details module.

The drawbacks that are overcome by the existing system are:

  • The human errors can be avoided
  • · The work task and work load of man can be reduced
  • · Security of this system is high
  • · In this redundancy of data can be avoided
  • · Consistent in the data
  • · Very easy to maintain
  • · The data can be updated very easily
  • · The records can be stored easily
  • · The data can be restored from the back up

Requirements Engineering:

Requirements engineering includes the below stated operations

  FEASIBILITY STUDY

Technical feasibility
Operational feasibility
Economical feasibility

 REQUIREMENT ANALYSIS

EXISTING SYSTEM:

               The analysis is made when the manager begins studying the program flow. The data about various views are collected. To draw the data-flow system, modeling Experience is required for developing desired model. This project includes checking out of rooms, allocating rooms, calculating hostel bill, vacating rooms, management of notice board details. The modules in this system are User module and Admin module.

Admin module:

  • Admin login
  • Registration
  • Allocation
  • Vocate
  • Hostelbill 

Student Module :

  • User login
  • View notice board

User Login: 

This module allows different users to access the registration forms.

            User can view the details about notice board.

The Administrator can:                                           

1. He can allot students to the hostel.

2. He can vacate the students form the hostel.

3. Control the status of the fee payment.

4. Edit the details of the students & modify the student records.

Download  Hostel Management System Asp.Net Project Report for Final Year Students.