Computer Science Project Topic on Consumer Gift card Program

Introduction to Consumer Gift card Program:

Consumer gift card program is a new initiative launched by a store to attract customers for the purchase of wide variety of goods that are sold at their store or through commercial online websites thereby maximizing their sales. Gift cards come in customable denominations i.e the customer can decide the denomination of gift card and they may be valid for 1year or more after which their validity can be extended for another term by paying a nominal renewal fee.

The system maintains all the details of gift card issued only the administrator can access this module to perform transactions like purchase, redemption, renewal and query of cards. Administrator even maintains the global parameters like minimum purchase amount, validity period, validity renewal period, renewal fee. He can also do following queries for MIS information the queries like cars sales, average duration between purchase and redemption of card, expired balance, aging of undue balance.

The development team should ensure that there is reusability of code between two modules. For a given functionality the same code should be invoked whether it is requested administrator either from online system or by merchandise application through web services

Gift card administration system

This maintains all the details of gift cards issued

  •  Only administrators will have access to administration module. Admin can perform all the transactions purchase, redemption, renewal of cards etc 
  • Administrator can maintain global parameters like
  • Minimum purchase amount
  • Validity period
  • Validity renewal
  • Renewal fee 

All transactions either originating from administrator or merchandising applications are logged for audit and verification.

Download Computer Science Project Topic on Consumer Gift card Program.

Constructing And Testing Of Polynomials Predicting Software Maintainability Abstract

Introduction to Constructing And Testing Of Polynomials Predicting Software Maintainability:

In non object oriented software system module modularization quality is calculated based on modules without using classes. Theoretical validation implies conformance to a set of agreed principles. Re-organization of millions of  lines of code residing in thousands of files in hundred of directories into modules , where each module is formed by grouping a set of entities such as files , data structures, functions and variables.

In this project we set design principles for code modularization and produce set of metrics that characterize software in relation to those principles. Some metrics are structural, architectural and notions. The structural metrics refer to inter module coupling based notions. The architectural metrics refer to horizontal layering of modules in large software systems.

This project makes use of three types of contributions cohesion, coupling and complexity of metrics to modularize the software. Modularization algorithm is based on the combination of coupling and cohesion metrics .Finally two types of experiments are made to validate the metrics using open source software system they are                                                                       

 1. Apply metrics to two different versions of the same software system

 2. Experimental validation consists of randomizing a well-modularized body of software and seeing how the value of the metrics changed. Our project thus provides metrics that seek to characterize a body of software according to the enunciated principles. 

Download Constructing And Testing Of Polynomials Predicting Software Maintainability Abstract.

Compressed Telephone Directory CTD C++ Project Abstract

Introduction to Compressed Telephone Directory CTD Project:

The telephone system is a database system in which all the details of telephone administration are provided to the user .The Compressed Telephone Directory (CTD) is a live project and provide flexibility and  a  good service. It’s designed using C++ as front end  and  RDBMS (relational database management system) as back end.

The compressed telephone directory contains two modules they are

1. Registration

2. Evaluation

Registration module: Administration module is a sub module of it. This contains complete information about the telephone exchange like customer details, std codes, telephone number etc. The user can easily enter the data into the fields of form like name, address, age etc.

Evaluation module: Evaluation module contains all the details of the users. Every telephone directory needs to do this process. The  evaluation  of users  used to be a complex and time consuming process  in the past days .But  now with the help of our project the entire time  consumed for evaluation  is remarkably  less .When the admin enters the telephone number of a user the CDC automatically checks for the details stored on that number in its database .These details are provided by the user itself at the time of registration .If the details are not found the system once again asks to enter the number correctly  or displays a message that the details are not found.

The main purpose of designing the project is to make the telephone administration easy, efficient, user friendly, scalable and to provide brief description about the telephone exchange to the users.

 Download Compressed Telephone Directory CTD C++ Project Abstract.

Complaint Management System DFD Diagram

The Complaint Management system has following modules they are as follows

1. Login and session management.

2. Registration module.

3. Operation module.

4. User activity module.

5. Search module.

6. Report generation module.

7. Database administration module.

8. Feedback module.

9. Discussion forum module.

10. Help module. 

When a user Logon to CRMS website he can see a home page. The homepage collects information about name and details of user from him .User writes complaint about the difficulties faced by him. On entering the complaint a complaint ID is generated by which he can access the status of complaint made by him. User can also go through a list of pages to get the required information that he needed to register the complaint successfully.

dfd diagram for complaint management system:

customer management system dfd diagram

 Download Complaint Management System DFD Diagram and project report.

Complaint Management System Asp.Net Project Report

Introduction to Complaint Management System:

The Indian railways are the fourth largest rail network in the world and the largest civilian organization under a single management. It is crossing the vast geographical area of our country .It’s covering almost one lakh kilometers with a work force of 1.65 million across the country.

In most of the cases the railways are the cheapest means of transportation in the developing country like India approximately 12000 trains run all over the India daily. 

The complaint registration management is web enabled, centralized information and management application to build good relations among the railway department and   its customer community by providing faster mechanism to track the deficiencies and customer grievances .

The CRM is an implementation towards easy registration of complaints for railways. It is designed using ASP.NET as front end and MYSQL as backend.

Any user can access the CRM website by logging into it. The user can simply enter the station name or code and click on submit for logging on .It also invites topics for discussion through web forum irrespective of the language as it has a multi language support .So people from any part of India can participate in the discussion forums, they also have a freedom of making suggestions to the management .CRM is mainly designed for the railway customer satisfaction. 

 Download Complaint Management System Asp.Net Project Report.

Credit Card Fraud Detection Using Hidden Markov Model Project Report

Introduction to Credit Card Fraud Detection Using Hidden Markov Model Project:

Credit card based purchases are of two types they are

  1. Physical card
  2. Virtual card

Physical card based purchase: The card holder contains a card and in order to purchase a good or make any transaction the card holder should carry the card. 

Virtual card based purchase: Here the card holder need not carry the card, just a few details about the card are enough to carry out the transactions. It is generally done in online shopping.

In physical card based purchase the fraudulent transactions can be done only if the attacker was able to steal the card from cardholder and if the cardholder doesn’t notice the loss of credit card it may lead to financial loss.

At present the fraud is detected after the fraud is done that when the card holder complaints. The online purchases are more so we don’t know how the person is using the card online we just capture IP address for verification. So there an urgent need to investigate about the fraud. Fraud detection based on analysis of existing purchase data of cardholder is a promising way to reduce the rate of successful credit card frauds. As humans tend to exhibit various behavioral profiles, each cardholder can be represented by a set of patterns containing information about typical purchase category, the time since last purchase, amount paid etc. This process is known as HMM Hidden Markov Model. The details of items purchased are not known at FDS running at the bank that issues credit cards to cardholders.

The modules present in this project are as follows

  1. New card: The customer provides their contact and personal information to obtain a credit card. They can create their own login and password.
  2. Login:  With the valid usernames and passwords the users can visit the website
  3. Security information: When the user looses the card security information module arises. In order to move to the transaction section he has to answer a set of questions.
  4. Transaction: The credit card owner or authorized person can only make the transactions
  5. Verification: In this process the card number is verified to ensure that the  transaction is made by card holder itself.

 Download Credit Card Fraud Detection Using Hidden Markov Model Project Report.

Computerized Paper Evolution Using Neural Network Seminar Report

Introduction to   Computerized Paper Evolution Using Neural Network Seminar Topic:

The traditional evaluation system involves students writing the answers for the questions given in the question paper. These questions are usually given by concerned lectures belonging to their  group  or  to that subject .The evaluator uses key paper to correct the answer sheets written by the students. But this traditional evaluation gets affected certain factors like presentation of the answers, partiality towards pet students etc.

Even the evaluator may not allocate right amount of time as the number of papers to correct are more in number. And a very little freedom is given to the students to express their ideas  .However this  type of evaluation consumes much time to evaluate the answers .The risk in the  traditionally evaluation system are overcome  in the computerized paper evolution system project.

The project is completely based on the adaptive real time learning through computers .The students answers  the questions  asked by the computer in a restricted manner and the answers are evaluated instantaneously. The computer  is  connected to a server called knowledge server which is in turn connected to other authenticated servers that contain valid information of various subjects required for the evaluating the  answers.

The computer paper evaluation system provides a strong platform for the effective distant education programs, competitive exams, the student also gets a chance to express his views without any restrictions etc. There is no doubt that the computer based evaluation is going make a remarkably change in the current educational system. 

 Download Computerized Paper Evolution Using Neural Network Seminar Report .

Comprehensive Training and Placement Operations Java Project

Comprehensive training and placement operations is an online application for training and placement cell of a college that can be accessed throughout the college and outside the college with a login provided. It is designed using java scripts for client side scripting, java as programming language, oracle as backend. The hardware requirements include a processor Pentium IV with a hard disk of 40GB and RAM of 256MB.

The existing system is a time delaying process. Entire data is maintained in the databases in form of excel sheets. When a person needs a record he has to search all the sheets, it doesn’t provide multi user accessibility and doesn’t have all the user privileges. So the system is not accessible by all the employees of organization.

The proposed system is an online system and it over comes all the difficulties faced in traditional old systems. In this the system allows multidivisional handling that includes various activities, allows administrator to control all the activities hence identifying the roles and accessibility of other users, accurate information can generated in a very little time. It has modules like  

  • Admin users
  • Reports
  • Normal users
  • Members

Admin users: responsible for creating, modifying and deleting a member, training and placement operations, admin can view the training and placement operations list and generate the reports. 

 Reports: all reports can be viewed, printed, exported, faxed or emailed.

Normal users: these have restricted access. They can view placements, search for different trainings, post queries etc.

Members: members can view details about training and placements, can send mails to admin etc.

 Download Comprehensive Training and Placement Operations Java Project .

Dynamic Routing with Stegnography MS Project Introduction

Secure routing protocol is to improve the data security by specifying various routes dynamically i.e., specifying multiple paths. These paths are then identified by an online manner and also the extra controlled messaging is required.

Many a developers tried to a maximum extent of developing the routing security mechanisms like randomized routing means ,online manner on message flooding, traffic spreading  scheme to reduce the likelihood of  eavesdropping etc..

In this present Dynamic Routing with Stegnography project presentation are going to introduce dynamic routing algorithm for enhancing the security of the data with no use of any extra messages for controlling.

Here we also point out how various paths are specified for random transmission of the data which is in the form of small packets, also   we propose a distance based algorithm for dynamic routing algorithm for achieving efficient results.

The main aim of this MS Project Introduction is to provide stochastic paths for the transmission of the data; the routing algorithm used is the distance vector based algorithm.

    Every node in the network has a routing table and a link table. In this project we use different topologies which are the backbone of the networks used like AT&T US topology, DANTE Europe topology. The back bone networks are applied to the commercial/enterprise networks.

Even though it yields many better results it has some draw backs like limitation of the number of the nodes, intra domain system and mainly the topology is inflexible and fully linked.

Here in this we present Distributed dynamic routing algorithm which has two parts: the delivery paths and maintenance of the extended routing table randomly and dynamically.

          In randomization process, firstly we will use hash in the next hop for the preceding packet delivery of the source node and then the process randomly picks up the neighboring node for the transmission of the packet .

Proposing Task:

          In this present dissertation project we briefly present the different routing algorithms used and provides a literature review on the data communication and also to provide a comparative study of them.

          Literature review provides us with the information on different routing methods, various routing paths and the data disintegration. Here in this MS Project am going to present a high end security on data by the in different paths by the use of stegnography methods.

Implementation tasks:

          In this Dynamic Routing project we implement dynamic routing algorithm for the data transmission in multiple routes by the disintegration of the data.

Proposing Research work:

My main concentration is on the security aspects while de fragmenting the data over the networks

My contribution: 

  Here am just concentrated on providing the better security, so I am making use of the stegnography methods applied on data disintegration.

This Project Report is written & submitted by Chandu.

Mobile Payment Service Java Project Source Code

This Project provides full documentation and source code for all Java students. To execute this project follow the below steps:

Soft wares Needed:

1. J2ME 2.5

2. JDK1.5.0

3. Tomcat 5.0

4. Eclipse 3.2

Running Process:

  • Copy the CartB2B folder (which is in the folder Code->J2ME)and paste it on the workspace.
  • Create a J2ME project using Eclipse named CartB2B
  • Copy the CartB2B  folder (which is in the folder Code->JSP)and paste it on the Tomcat->webapps->ROOT
  • Start the Tomcat.
  • Right click the CartB2B file and click Run as Emulated J2ME
SQL Database tables created to store the information.