Student Feedback System .Net Project

This project is a .net based website which is getting all the feedback from the student through online.

Modules included in the project are below:

  • Admin
  • Coordinator
  • Faculty
  • Student

Output Snapshots and description for the admin, Student and Faculty Modules:

Admin page:

Admin Login Page:

ADMIN HOME PAGE:

ADMIN -> STUDENT REGISTRATION FORM

ADMIN FACULTY REGISTRATION FORM:

ADMIN NO. OF USER LIST:

ADMIN FEEDBACK REPORT AT EVERY MONTH

The percentage is calculated by taking the reference from the no. of students.

ADMIN CHANGE PASSWORD :

Coordinator

  • Homepage:
  • Coordinator Adding subject :
  • Coordinator adding feedback questions:
  • Coordinator View added the subject :
  • Coordinator assign subject to the lecturer

Faculty

Homepage:

Faculty add the student

• Student list who all registered for there course and a particular subject. That should automatically come to the student name in their form.

• And they should select the student who opted for the subject and gives them rights to them to give the feedback.

• The student who are regularly attending the classes they should only give it.

Added student list will be displayed on another page.

  • Student home page
  • Student change password
  • Student feedback form

This questions should automatically come from the coordinator added question list.

If this student doesn’t have permission to give feedback on this subject that should disable those rows automatically.

This complete Student Feedback System project front-end developed using visual studio 2010 backend SQL server database.

Download this Student Staff Feedback System .Net Project Code, Database Files, Attached the latest updated code with all feedback functionalities.

Mechanical Questionnaire System Java Project

Statement of the project

To maintain the questions in the database and develop an Auto Questionnaire to conduct promotional exams for the employees.

Existing System:

  • It is time-consuming and difficult to conduct for every section.
  • At present to conduct any exam question paper is being set manually.

Proposed System:

Questions are generated randomly with the proposed system if we mention the details.

Software Requirements:

Windows OS, JDK, Net Beans with Apache Tomcat web server,  Oracle, Internet Explorer with the latest available Adobe flash plug-in, Rational rose for modeling.

Project Modules:

  • Question Bank maintenance
  • Default Templates
  • Creating a new Template
  • Generating Reports

UML Diagrams:

Class diagram for the System:

Use Case Diagram showing the actions of the administrator:

Sequence diagram for login to the system:

Sequence Diagram for Question bank:

Sequence Diagram for Question Paper:

State Chart Diagram for admin object:

Activity diagram of the system:

Other Output Screenshots:

  • When user login to QB
  • Displaying QB
  • Viewing Questions from QB
  • Selecting to add Questions.
  • Adding Questions.
  • Deleting Questions.
  • Default Templates
  • Open/Save Q.paper in MS-Word
  • Question Paper Generator
  • Open/Save Question paper in MS-Word
  • Question Paper in MS-Word
  • Reports

Download Mechanical Questionnaire System Java Project Source Code

Electrical and Mechanical Shed Planning and Work Distribution System

This Shed Planning and Work Distribution System project have got the scope to develop in other departments of Electrical and Mechanical Shed, like Spares department where information regarding the available spares can be stored in a computer database for faster information retrieval.

Also, there is scope to automate the process of issuing tenders to the unavailable parts of the Electrical and Mechanical Shed through online which is currently being done manually.

We can further enhance the work notification system that has been implemented in the current project through color coding by generating alert boxes in addition to the color coding.

UML DIAGRAMS

CLASS DIAGRAM

Figure 1: Relationships among the classes of Electrical and Mechanical Shed

 Description

The class diagram of the electric loco shed shows the major classes, their attributes and the operations of each class. The operation of each class has the effective utilization of the attributes.

USE CASE DIAGRAM

Figure 2: Behavior of PPO User

Description 

Actors: PPO User

Relationships: Simple Association

USE CASE DIAGRAM

Figure 3: Behavior of Other Users 

DESCRIPTION 

Actors: Other Users 

Relationships: Simple Association

The above diagram shows the behavior of other users. These other users include ADEE, Senior DEE i.e., the administrative people. Other users can Log in, Log out, can view staff attendance, view loco position which includes viewing forenoon position and the afternoon positions, view schedule.

USE CASE DIAGRAM

Figure 4: Behavior of Department Users 

DESCRIPTION 

Actors: Department Users

Relationships: Simple Association

The above diagram shows the behavior of the department users. They can Log in, Log out, can view staff attendance, view loco position, view staff attendance which includes viewing yearly/monthly/daily attendance of a particular individual, creating staff members of the particular department, deleting staff, view loco schedule, change status of the work to completed if the work is completed and to In progress when work is going on, check if there are any works given by the PPO.

SEQUENCE DIAGRAM

Figure 5: PPO Users and Other Users Login

DESCRIPTION

In the above diagram the user’s needs to log in. Users first enter the details and then the corresponding information is retrieved from the database. And when the database sends the corresponding information validation is performed and if the information is available then the user’s logins successfully.

SEQUENCE DIAGRAM

Figure 6: Scheduling Locos 

Description

In the above diagram the PPO user’s needs to schedule the locos. So the PPO users first schedule the locos and the information is stored in the database after which the database is updated. The PPO users then send the schedule to the department. Then the database is updated and scheduling the locos is successfully done. 

SEQUENCE DIAGRAM

Figure 7: Viewing Loco Position 

Description

In the above diagram, the PPO user’s needs to view the loco position. So the PPO users first enter the loco position and the information is stored in the database after which the database is updated. The PPO users then send then can view the loco information.

SEQUENCE DIAGRAM

Figure 8: Viewing Staff Attendance 

Description

In the above diagram, the department user’s needs to view the attendance of the staff. So for this, he first needs to update that information. The Department users first enter the staff attendance details which is stored in the database and then updated. He can then view the attendance successfully when requested.

SEQUENCE DIAGRAM

Figure 9: Departments Reporting the Completion of Work to PPO 

Description

In the above diagram, the department users need to report to the PPO department after completing the work assigned by PPO about the loco. The department user first completes the work given by the PPO and stores it in the database. This is then sent to the PPO department and then the database is updated.

Database Tables 

S.No Field Name Constraint Type
1 Token Not Null Varchar2(20)
2 Name Varchar2(30)
3 Jdate Varchar2(40)
4 Desig Varchar2(11)
5 Dept Varchar2(5)

 Table 1: Staff Table 

S.No Field Name Constraint Type
1 Cdate Not Null Varchar2(11)
2 Token Not Null Varchar2(20)
3 Attendance Varchar2(10)

 Table 2: Attendance Table 

S.No Field Name Constraint Type
1 Cdate Varchar2(11)
2 Locono Varchar2(7)
3 Type Varchar2(1)
4 Pg Varchar2(1)
5 Base Varchar2(50)
6 Comdate Varchar2(11)
7 Age Number(3)
8 Rcdate Varchar2(11)
9 Schedule Varchar2(20)
10 Lsdate Varchar2(11)
11 Place Varchar2(25)
12 Remarks Varchar2(1024)

 Table 3: Locosch Table 

S.No Field Name Constraint Type
1 Id Not Null Varchar2(11)
2 Password Varchar2(15)
3 Dept Varchar2(11)

 Table 4: Login Table 

Source code pages description:

Validate.java
For Validating user authentication based on his user id and password

DailyPos.java
For updating forenoon schedule details

Afternoon.java
For updating the afternoon schedule

Schedule.java
For updating loco schedule information

PLocoInfo.java
For Updating Loco Information and its Important Parts

WorkAllotment.java
PPO Department Allots works with various departments

UpdateWork.java
Departments Updating the work status and reporting to PPO

CreateStaff.java
For Departments Creating their Staff members

DeleteStaff.java
For deleting corresponding staff members by each department

DeleteWork.java
PPO Department deleting allotted works

SecDailyAtt.java
Updating Staff members daily attendance of each department

Search.jsp
Searching for the information of a Loco

Schedule.jsp
Forenoon and Afternoon Schedule Display

GenViewInfo.jsp
Viewing the work being carried out in all the departments

Sections.java
Department wise work display
SecViewWork.jsp
To view the particular work of a particular department
SecShowAttI.java
Department wise generating Reports for Individual Staff members

Download Electrical and Mechanical Shed Planning and Work Distribution System Java Project Source Code and Database.

Supporting Chat Protocols in PickPacket IIT Project for Computer Science Students

Online world media is actually ubiquitous for the electronic transfer of both business and private qualified data. In any case, the same media could be and has been utilized for unlawful exercises. This mandates the requirement for quite customizable grid observing instruments to catch suspected conveyances over the system and to break down them. On the other hand, electronic observation may violate the privileges of security, unhindered discourse and acquaintanceship, Pick Packet-a system following apparatus, can handle the clashing issues of grid screening and protection through its reasonable utilization.

Prior variant of Pick Packet had underpin for four requisition orders-SMTP, HTTP, FTP and Telnet, Chat orders, by which a bunch of users shape a grid to impart informative content around them, have progressed ubiquity in the final few years. Dynamic utilize of the proposed orders on the Internet moved the requirement for backing of visiting orders in Pick Packet, This thesis examines augmentation of Pick Packet for a few visiting orders (IEC and Yahoo Messenger), all parts of the Pick Packet have been redesigned for the backing of newfangled methodologies, and Pick Packet has been tested for accuracy and exhibition estimation.

Mode of Internet for electronic transfer of both business and private qualified information is truly well known. Accordingly, Internet has come to be a nexus asset of qualified data. However the same Internet could be and has been utilized by terrorists, crooks and others to impart qualified data about unlawful exercises.

Groups excessively need to secure their intelligent property from falling into the hands of their contenders. Hence, they turn to knowledge get-together over the system to check if any agent is sending such informative data unlawfully. Consequently, there is a pressing require for infrastructure of instruments that can screen and catch undesirable correspondences over the system.

Checking apparatuses perform their work by sniffing parcels from the system and sifting them on the groundwork of user specified manages. The devices that furnish the facility of defining basic administers for sifting bundles are called Packet sifts. They utilize settled balance parcel informative content like IP addresses and port numbers for sifting. Instruments that sift parcels dependent upon the intricate controls and perform post-catch analysis of gathered activity are termed as Network observing instruments.

Student Staff Feedback System Project Report

This framework is for the most part utilized by four sorts of users:

  •         Student
  •          Staff
  •          Head of sections
  •          Principal

The provision may as well have a database of survey which can be given to the understudies following a secured login. A mechanism may as well be there to include, alter or erase an issue to/from the database. The requisition might as well assess the responses given by the people dependent upon the reaction (which could be given by a no. 1 – 5) and a percentile / review needs to be created to every last trace of the staff parts of a specific office.

This criticism report was checked by the HOD. He can see generally speaking evaluations and see the evaluations acquired to the speakers and give this article to the central and he can give advising to the school staff. We have improved Student Staff Feedback System to give input in a basic and fast way to the university foremost and HOD. So we call it as Student Staff Feedback System which conveys by means of the person staff interfaces as connected framework which functioning as a Service Provider. By utilizing this connected framework we improve it and brisk way.

  • Cut your time – by giving input on connected framework when contrasted with the manual procedure this recoveries time of user.
  • Manage the whole method – the whole procedure of giving input and survey that report in the wake of giving input can maintain effectively
  • Enhance the staff – spot the parts concerning the teacher’s investment in instructing to the learners
  • Meet network models – a simple to utilize framework that efficaciously consolidates shape with role

Utilizing the most recent Microsoft engineering, the .Net structure and ASP.Net, our framework is a complete criticism administration and staff communication framework with constructed-in headliners proofing that effectively backs Integration with the last scholar staff sentiment framework providers.          

This framework is composed to be basic to utilize, straightforward to comprehend and simple to enable and arrange to fit. It’s given as an Application Service Provision hence offering easy setup prices.

Practical Training Report on Basic Networking and Microsoft Windows Server

Introduction to Basic Networking and Microsoft Windows Server Project:

Basic networking is a concept which is based on the internet and also in the use of computer technology too. It is also based on the local development which is one of the main parts of the networking concept. In this basic networking user accomplish many authoritative terms by which they can work in a proper way. Here each and every single provides us the information about the authoritative power and the authentication modes.

Basically networks are the accumulation of each single personal computer by a part of networking devices. These accumulations later then work as the abundant networks. These networks are then connected to the computers by a device called as HUB which normally hosts the servers. Internet work has a concept called as Router which is used to join the server networks together to share the data from one computer to another. Packet switching, packet filtering, communication and path choice are the functions that a router can perform.

Another topic is the Topology which is the updates which are made to the material layout of the systems. There are various types of topology and some of them are Single node topology which is always joined with the servers, Bu8s topology which is joined to a common tabled which is named as trunk. Ring topology is which where all networks and devices are associated in a closed loop. Star topology is which every single device is associated with the HUB. Mesh topology is which every device is associated to the other devices.

Networks play an important role in this concepts and LAN, VAN, VPN San are the various types of networks. Layered approach is the part of OSI model which contains application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer are the sub types of reference layers. There are various other topics that are related to the basic networking which is written in detail in various reference books.

Download  Practical Training Report on Basic Networking and Microsoft Windows Server .

Final Year CSE Computer Network Project Report

Introduction to Computer Network Project Topic:

It is a bunch of computers that are adjoined by photo-electric boundary or other act of transporting of many sketches and machinery with the by interchanging data or information for users.

Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also shows the basic components of a network.

Networks are built with adjoin of computer hardware and software.

Types of Computer Network:-

  1. LAN (LOCAL AREA NETWORK)
  2. WAN (WIDE AREA NETWORK)
  3. MAN (METROPOLITAN AREA NETWORK)
  4. PAN (PERSONAL AREA NETWORK)
  5. VPN (VIRTUAL PRIVATE NETWORK)
  6. CAN (CAMPUS AREA NETWORK)
  7. GAN(GLOBAL AREA NETWORK)
  8. SAN (STORAGE AREA NETWORK) 

Some Basic Components are:-

  1. These networks are formulated on basic hardware building blocks by linking nodes of network, such as (NICs), Routers etc…
  2. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable.
  3.  Less random are microwave links or optical cable (“optical fiber”). 

Some of the basic components required for adjoining the network nodes: –

  1.    NETWORK INTERFACE CARD.
  2.    REPEATERS.
  3.    NETWORK HUB.
  4.    NETWORK BRIDGE.
  5.    NETWORK SWITCH.
  6.    ROUTER.

Bridges are sub divided in three types:-

  1. Local bridges: It connects to LAN.
  2. Remote bridges: WAN can be developed by this bridge. Link between LANs. Remote bridges, where the adjoining link is less than the end networks, largely have been displaced.
  3. Wireless bridges: It can be used to join LAN or connect to LAN.

Download  Final Year CSE Computer Network Project Report .

Test Cases for Chess Game

Test Case 1:

Input given: To compile the program without the errors.

Status: changed

Output: The program is compiled properly without any errors if any errors are occurred it will be displayed below the compilation input, so in this test case there are no errors so the compilation was successful and was preceded to the next step.

Test Case 2:

Input given: To execute the applet by giving the command.

Status: applet displayed

Output: After entering the code for execution of the program the command prompt will automatically pop up an applet which as shown below, if there are any internal errors in the program the applet will not appear.

After entering the command in the command prompt as shown above and executed it will be redirected to the applet which is shown below

Test Case 3:

Input given: Check whether all the pieces of the both sides are available or not and also check whether they are properly organised or not.

Status:  Performed

Output: All the pieces are available and fairly organised for both sides which are satisfying the basic rules of the game is shown below.

Before going to play the chess a proper check for the moves of each and every piece is tested and the test cases of them and their results are shown below

Test Case 4:

Input: checking the move of the pawn.

Status: Performed

Output: It is satisfying the rules of the game if any other move that is not a valid move of pawn is performed an dialog box will be displayed, the dialog boxes for the test cases are shown below the screen shots for the test cases.

The above screen shots shows the valid moves of the pawn, and if any other moves for the pawn are the dialog box appears as shown below.

Test Case 5:

Input: checking the move of the knight.

Status: Performed

Output: It is satisfying the rules of the game if any other move that is not a valid move of Knight is performed an dialog box will be displayed, the dialog boxes for the test cases are shown below the screen shots for the test cases.

The above screen shots shows the valid moves of the Knight, and if any other moves for the Knight are the dialog box appears as shown below

Test Case 6:

Input: checking the move of the Rook.

Status: Performed

Output: It is satisfying the rules of the game if any other move that is not a valid move of Rook is performed an dialog box will be displayed, the dialog boxes for the test cases are shown below the screen shots for the test cases.

The above screen shots shows the valid moves of the Rook, and if any other moves for the Rook are the dialog box appears as shown below

Chess Game Design Java

Design of this chess game is divided in to following modules: 

  1. Board representation
  2. Move representation
  3. Piece representation
  4. Analyzer

Move representation: 

Representing the possible moves is really an important aspect in designing the chess game and this section explains the actual procedure followed to handle all the possible moves in this application. A separate module known as chess engine is designed in this program to handle all the possible moves and a separate module of code is required as the possible moves are really high in a chess game. Move against the human move from the computer side need lot of estimations and eliminations and in there, typical tree search algorithm can be used to search for the best move possible. These moves are mainly decided by the position of the piece on the chess board and few predefined moves are assigned to the piece based on the nature of the piece on the board. A typical switch and case condition loop is used to check the type of piece initially and then based on the case identified the moves are defined. The moves are assigned to these pieces based on the square positions, the corresponding characters assigned to the squares and position of the square on the total board. All the possible conditions are checked for all the pieces with respect to the position of the board initially and later the actual moves against the human moves are done in a separate way. The famous tree search algorithm known as alpha beta pruning algorithm is used to decide the best move for the computers from all the possible moves in front of the computer. To proceed with this algorithm, initially alpha and beta variables are considered and an initial depth is assigned as an integer and then these values are incremented or decremented and compared to follow the tree search process. Moves are represented based on the depth value of the alpha and beta and the kind of piece with respect to this depth position on the chess board. Alpha and beta are used to represent the current square position of the piece that need to be moved and the beta represents the target move and thus from the value of the depth calculated as discussed above, the actual move of the desired piece is decided. Once the best move is decided from all the possible moves, the actual move is shown to the users using the same graphic class of the Java Applet package. All the required action listeners are added to the piece movements and the most common among them are the mouse listeners and the computer always recognizes the moves made by the human player using the mouse action listeners and the moves are compared to the predefined moves saved at the memory with the moves made by the human player and as discussed these moves are identified using the mouse action listeners and even the validity of the moves made by the human player is also checked against many conditions. 

Piece representation: 

The very next once the move representation is done is to represent the graphical user interface of the pieces and the corresponding moves of them on the chess board considered. All the images of the required pieces are taken in the same folder where the coding files are maintained and the reference to them are made using the file path in the design process. All these pieces are placed on the squares of the chess board based on the characters assigned to the squares using the character array as discussed in the board representation section of this document. A separate method is used to represent the pieces on the board and is named as drawFigure and the parameters given to this method are like character for the square assigned, x-axis position and y-axis position. Board design takes care of the square positions and the corresponding square positions are designed with respect to the pieces and their respective placement on the squares. Properties for the pieces are assigned at the chess engine level and the corresponding hash codes are assigned as the constant values with respect to these pieces at the backend of the chess engine design. Few methods are defined these pieces in the form of a separate interface and these methods holds the required properties for the corresponding pieces used across the board. Moment of these pieces is defined with respect to the changing positions of the board and the required attributes are set accordingly in these methods. 

Analyzer: 

Design of the analyzer include the time controls used across the chess game and a detailed coding aspects to the alpha beta pruning algorithm based on the time limits imposed across the chess game. Five different time intervals are considered in this design like 50, 100, 300, 600 and 1800 and the corresponding limitations with respect to the time are given based on the human moves. As discussed in the previous section, the human player moves are captured by the mouse action listeners and the corresponding moves are compared against the time limits set across this design.  Time frame allocated in this design is incremented using exponential functions and if the time limit is reached the corresponding action to be taken by the computer program are also defined in this analyzer module. A minimum time limit is given to the human player during the initial moves and gradually the game process, more time limits is allocated to the player in the middle of the game, as the player need more time to analyze the moves and make the right move. A multi threading program is designed in this case to handle the time limits assigned to the human players. 

Online Chess Game Source Code

Introduction to Online Chess Game Project:

 Among all the games and their types chess is really a interesting game with great scope to play with a higher levels of interest and chess has a great capability to improve the logical and reasoning skills among the users and even it provides a great interest with the number of moves between the users and each and every user uses their intellectual skills to block the other user.

Even chess game is played under different modes like single user and two users and among these types, a single user chess game is really interesting as the player need to play with the computer as his opponent.

In general, when compared to a human move, computer moves are really logical and critical to crack the reason behind the move and thus in most of the cases, gamming players show their ample interest to play the chess against a computer rather than a human and thus single user chess is famous among the gaming world.

 Download Online Chess Game Source Code.