Retail Business Analytical Process Osmania University CSE Final Year Project Report

This Project gives an idea of analyzing the business requirements to make a decision. The data warehousing demonstrates the principle idea to store and evaluate the data.

The Project entitled Retail business analytical processing gives the idea to demonstrate all evaluated and strategic necessities of the business requirements related to sales, stock evaluation and the systematic approach for the decision making and support.

The Project usually deals with the supermarkets, departmental store processing and the customer requirements to evaluate to develop the business by constant providing the customer requirements.

The Existing System

The current system is the database system. The usual concept of the database is to manage information in the integrated form. The data base is the record of the related information maintained in the single record or system without any error and effort for the easy accessibility of the user. The principle is to provide information in an easy, fast and less cost and effective way to the user. The database designing needs the various criteria’s.

The Proposed System

The database warehousing is simple and general in use but the application software provides the various applications.

Recording and Storing Data

The recorded data is reliable and protected  as the other user cannot retrieve the data.

Reading data online and reports

The data can be observed online

Analyzing data for identifying the business trends

The application module summarizes the data and presenting various summaries for each other databases. The process is called data warehousing.

The data warehousing is important tool in the information technology. The data warehousing gives the business to make strategic decisions. The data ware housing brings out the stored data to be evaluated.

The Oracle has already implemented the data ware housing application added in the Oracle 7 version in the early 1990. The Oracle 8, Oracle 8i, Oracle 9i has the additional features of the data ware housing to enhance the performance and management of the huge data warehouses. 

Planning Of Wireless Sensor Networks Energy Efficient Clustering Under the Joint Router Abstract

The Wireless mesh networks posses the mesh routers and mesh clients. The mesh routers are having the low mobility and are the important part of the Wireless mesh network. The WMN is developed for the network accessing of the mesh and the clients. The WMN are combined with the networks like internet, cellular, sensor, networks is done by the gateway and the combining activities of the mesh routers.

The network client may be the stationery and the mobile, the client are able to make the client mesh network itself and also with the mesh routers. The Wireless mesh networks are able to overcome the demerits and efficiently upgrade the performance of the temporary networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks.

The system has vast progression and encouraging in terms of the applicability. The wireless mesh networks is able to provide the various services like different applications personal, local, campus and metropolitan cities. Although the system wireless meshes network has developed but it seeks more advancement in the protocol layers. The article is about the latest developments and researches in the wireless mesh networks.

The article deals with the system structure and the various applications of the wireless mesh networks and also the important criteria’s enhance protocol development. The various theoretical aspects and the standard protocols of the wireless mesh networks are implemented to focus on the various research areas. At last the tests, industrial works and the latest standard criteria related to the wireless mesh networks are explained.

Project Evaluator Asp.Net Project for CSE Final Year Students with Report

The Project Evaluator is developed to reduce the manual processes which are occurring in the software company. The Project is the web based application which eases the work of the administrator, project leader, project manager, developer and the tester. The receiving of the project from the client and giving the work to the developers in the way that they would not be over worked and the separation and allocation of the work to different developers with the daily basis evaluation and weekly basis report, testing of the application are simple with this application. 

There is the automatic creation of the reports to provide the information regarding the process made for the user on request by single click of mouse. The project leader and the developers and other users can get and send the information with single mouse click. The official works will get fast with this project. The project is structured in the manner of the input operations are performed with the structured and schematic forms. 

The Existing System 

The existing system is not automatic and the administrator and the project leader and the developer work manually. The work gets delay due to manual work. The information to be kept is difficult. The validation of the data is not possible and the error correction is not possible. The mishandling of the information is possible. The existing system is not user friendly. 

The Proposed System 

The Proposed System called the Project Evaluator is the automated version of the existing system. The system is a web application and the administrator, project leader and the developer easily do the work schematically and the soon. 

The various characteristics of the Proposed System are the automatic process of evaluation, fast operations, structured forms for the correction and validation of the input information, the automatic generation of reports. 

SQL Editor CSE Minor Project Report

Introduction to SQL Editor CSE Minor Project:

The Project is for the maintaining and the managing of the database records by the SQL Editor. The Editor requires the queries to generate the record tables, and the tables filled with the values, can search for the specific record or the editing of records. The Project considers the MS Access for managing of the databases. The Project develops the SQL Editor that run the SQL and the MS Access simultaneously.

The two programs SQL & MS Access are assembled in on program. The Project is dependent on the user and program interaction. The application is user friendly.  The Project is easily understandable with some knowledge of the SQL.

To maintain the big records of the organization is difficult and the complicated. The database management system is to handle the record keeping. The SQL Editor is combination of the SQL and the MS ACCESS is single Database management System is used for the record maintenance easily and queries are developed to search record. The program is connected to the VB 6.0.

The Project is developed by evaluating and schematic designing. The System focuses on the requirements of the users and the system interactive.

The Software used are the SQL Server, MS Access, Visual Basics 6.0, Windows XP/98 operating system.

The hardware used are the 256 RAM, 40 GB hard disk.

The Project have some limitations which has to be developed.  The databases are used SQL and MS Access make the program more difficult. To access the record queries has to be entered which is tough for the person with no knowledge of the Structured Query Language. The software design is difficult to understand. The objects are numerous which makes the program complicated. 

CSE Project Idea on E-Mail System Using PHP

Introduction to E-Mail System Project Using PHP:

The email system has focus on the development of the new emails, delivering email, receiving email, saving email as drafts, managing the contact list, to list of the IP addresses of received emails.

The technology if used properly may bring the simplicity by combining the technological advances. The latest technology advancement since last 10 years leaded to the financial enhancement globally. The more innovative advancement was brought by the internet and help the communities with the new websites. The email system is the internet application that is developed to communicate to any person in the form of email. The user has to register in the website for the email and create an account, the user has to login every time to compose email, send and receive email.

The Project has been developed with motivation of yahoo and gmail. The Project is sincerely working on the development on the innovative website.

The application is developed on the programming languages HTML for the front end, Ajax or Asynchronous Javascript and XML for designing web pages, MySQL for the back end program, PHP software.

Latest CSE Project Topics List for Final Year Students

DATA MINING

The Data Mining consists of the application and the monitoring optimal and heuristic algorithms for the following functions.

  1. The Computing Association Rules
  2. To generate and develop the optimal and near optimal classification trees
  3. To generate clusters 
  4. The Project develops the new algorithm. 

INTELLIGENT INTERFACE FOR DATABASE SYSTEMS 

The Project consists of the procedures to develop the designing of the intelligent interfaces for the database systems that gives the patterns to program the database if one does not have the skills of the SQL and the Tables. The Project develops the intelligent interface with the help of the system. 

FAULT TOLERANT ROUTING IN INTERCONNECTION NETWORKS WITH MULTIPLE PASSES AND FIXED CONTROL VARIABLES 

The Project launches the advanced system of the operation of multistage interconnection networks termed as the Dynamic Access with permanent control values. The system gives the speed and easy fault tolerant routing in the networks. 

FAULT TOLERANCE ANALYSIS OF SORTING NETWORKS 

       The model is developed for the analysis of the fault tolerance features of the sorting  

        networks by simulation and the theoretical analysis. 

HARDWARE AND HIGH SPEED COMPUTER ARITHMETIC USING THE RESIDUE NUMBER SYSTEM

 The Project needs the skilled mathematical ability and the knowledge of the hardware. The Project explains the designing of the new converters with new module and high dynamic ability. The explanation of integer and  exponentiation of integer presented by the Residue Number System. 

IMPLEMENTATION AND EVALUATION OF FAST ALGORITHMS FOR ONE WAY HASHING FUNCTIONS 

      The Project will develop the new algorithms for the one way hashing function. The project also look the application and the monitoring of the developed algorithms. 

TESTING EMBEDDED SOFTWARE SYSTEMS 

The Project consists of the monitoring and the evaluating various techniques for testing of the embedded systems. 

FAULT DIAGNOSIS AND IDENTIFICATION IN BOOLEAN FUNCTIONS REPRESENTED BY ORDERED DECISION DIAGRAM 

The project consists of the Ordered binary decision diagram (OBD) that identifies the fault diagnosis in the Boolean functions. 

OPTIMAL SELECTION AS AN OPTIMIZATION PROBLEM OVER RULE BASED CONSTRAINTS 

      The Project solves the problem of optimization subjected to rule based constrains. The Project evaluates and solves this problem. 

PERIOD, COMPLEXITY, RANDOMNESS PROPERTIES OF DECIMAL AND BINARY SEQUENCES 

The Project aims to develop the computing the period, complexity and autocorrelation function of some composite sequences. 

Port Knocking C++ Computer Science Project with Report

Introduction to Port Knocking C++ Project:

The Port Knocking is the communication system in the host to host where the data transfers from one closed port to another closed port. The port knocking process posses the different variants, the information can be encoded as the Port sequence or the Packet payload. Normally, the data transfers to the closed ports which is arrived to the testing host or monitoring daemon that cross checks the information by not sending the acknowledgement to the sender. 

The Port Knocking is the process of communication with in two or more computers or the client and the server where the information is encoded and encrypted in the chain of the port numbers. The chain or the sequence encoded and encrypted is called the Knock. t The work of the server is to monitor the client’s requests for the connections. The server will not provide the ports initially. The client requests connection trials to the server and send the SYN packets for the mentioned port present in the knock. So it is named as the Port Knocking. The server initially will not answer to the client knocking stage or requests. The server actually processes the port sequence or the monitoring of the SYN packets. The server first decodes the requests of knock and the then allows the client. 

However the authorized users are allowed on the firewall, the closed ports are available for the other users. Our Project is to find the ways of authentication service and found the Port Knocking. The Project considers the existing system and implemented the modification of the existing system by using of the novel port knocking architecture and introduces the high authentication service and highlighted the demerits of existing system. 

The Proposed System 

  1. The Port Knocking gives the highly secured authentication and the information transmission to the host without considering of the ports.
  2. The client is not aware of the server is performing the knocking sequence decoding.
  3. The server monitors the client request.
  4. The port is available to the requests for the specific time. 

Latest CSE Project Idea on A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme

The textual password vulnerabilities have become quite popular and thus users choose small and easy passwords thus making it easy for the hackers to break through. Textual password is moreover vulnerable to hidden camera, shoulder surfing and spyware attack. As an alternative option graphical password scheme is proposed and it is based on images instead of textual passwords. This kid of passwords is only vulnerable to shoulder surfing. Here, we propose a scalable shoulder surfing resistant textual-graphical password authentication scheme or S3PAS in short.

This scheme includes both text and graphical password system and it is a perfect way of providing protection to shoulder surfing., spyware attack and hidden camera. It can be easily replaced with the the system of textual password without making any kind of changes in the user existing password profile. Through the volatile and dynamic session password it is easily immune to brute force attack. S3PAS shows a bridging gap between the graphical password and textual password.

We proposed a password authentication system that enables security of the user’s password profile. It is immune to spyware attack, hidden camera and shoulder surfing. This scheme seamlessly matches the test based passwords and can also facilitate various lengths of the passwords that requires zero percent effort on the part of the users to transmigrate to S3PAS, their existing passwords.

There are certain drawbacks in this particular scheme and it include a longer process for login, making it time consuming and complicated for the users. Therefore we are planning to develop a new version of this scheme that will include a lower level of security thus making it is for the adoption of the users. This version will be more simple and will be easy from the view point of logging in in comparison to the older version.

Time Synchronization in LANs Based on Network Time Protocol NIT CSE Project Report

NTP or the network time protocol enable to synchronize the time taken from a server or a computer client to connect to another server. Eg : modem, radio and satellite receiver. Within a millisecond it provides accuracy on the LAN and on WAN it can continue up to few tens of milliseconds. Via global positioning service the WAN is related to the coordinated universal time or UTC. This project is a version of network time protocol. It has some of the following features like:

It can handle issues regarding the new nodes that join the network

In LAN it synchronizes the clock system.

On the basis of the connectionless user datagram protocol messages and packets are exchanged.

It also handles messages and packet related problems.

Overall, between the clients and the server, timestamp messages are exchanged. These messages have sequence numbers that are already incorporated in them which enables to take care of the integrity of the message. If the sequence number matches the client will respond to the message. This time stamped message can only be broadcasted only by the server and that too at definite time intervals. The client therefore receiving the message can update the time. New clients can send the message “WHO IS THE HOST” if they wish to join the network. Message broadcasting can be done by both the clients and the server.

The issues related to networking and distributed computing environment are dealt with the help of this project. Time synchronizing has gained a lot of importance today and it is one of the most common issues. It has helped in enhancing the security level in the network. Synchronizing the clocks in the network to the world time servers through the internet or with a coordinated universal time can help in improving this project. 

Improving Software Security With Precise Static and Runtime Analysis CSE Project Report

Over the past few years the landscape of security vulnerabilities has dramatically changed. For all the issues in 1990’s the buffer overruns and string format violation was highly responsible but from the first decade of the new millennium the entire picture began to change. It gave rise to the web-based applications and also became familiar with buffer overruns. Web application vulnerabilities now outnumbered these greatly and cross-site scripting attacks, SQL injections are some of the examples. Since the attacks against financial sites and e-commerce sites these vulnerabilities are highly responsible. It also leads to a loss of million dollars.

The griffin project in this thesis provides a static solution that ranges wide array of web application vulnerabilities. Our target applications that are based on real life web Java. A code is generated on the basis of the description of the vulnerability.  This will be followed by strict analysis of the code and thus producing warnings against the vulnerabilities.

The alternative to this method an instrument is specially designed which is a safe and secured version of the original bytecode. It can make use of the standard application along with the other applications. In order to make the vulnerability detection approach more user friendly and extensions the specifications are expressed in the form of a program query language known as PQL.

To all the issues related to web application security this thesis gives a perfect solution. Cross site scripting and SQL injection attacks are common for most of the issues related to to the security application. Client side santization, application are some of the common solutions but they are not adequate to solve these vulnerable issues. The griffin project provides a runtime and static analysis solution for the wide applications of web vulnerabilities. The project enables the user to specify the type of vulnerability they are searching for and these are expressed in PQL language.