Tic Tac Toe Android Source Code

Tic tac toe game is developed for android operating system. In present trend most of the games are mostly used in mobile devices which had increased scope of developing gaming applications for android platform, iphone.. etc. Android operating system is one of the widely used mobile operating system all over the world.

Here we provide tic tac toe android project source code for free download which can be used a sample project to lean android programming.

Computer science and information technology students can fine more java project reports and source code for free download.

E-R Diagrams & Database of Mobile Shop MCA Project

Oracle Database Table Description for Mobile Store Java Project Report

Tables: Login

Description: Stores the information of User Id and password

  Field    Type    Size    Key Description
Username Varchar 30 Not null Admin Identification
Password Varchar 20   Password

Tables: newcustomer_details

Description: Stores the information of Customer.

  Field    Type    Size    Key Description
Cid  Int 4 Not null Customer Identification
Cname Varchar  20     Customer Name
Pdate Date     Purchase Date
Paidamt Int 7   Paid Amount
Balamt Int 7   Balance Amount
Refid Int 3   Reference Id
Date Of Birth Date     Date of Birth
Age Int 3   Age
Gender Varchar 7   Gender
Dno Varchar 10   Door No
Street Varchar 15   Street
City Varchar 20   City
State Varchar 20   State
Phno Bigint 15   Phone Number
Mob_Purchase Varchar 2000   Mobiles Purchased

Tables: newmobile_details

Description: Stores the information of Mobile Phones.

  Field    Type    Size    Key Description
Phone_Id  Varchar 20 Not null Mobile Phone Id
Mobile_model Varchar 15   Mobile Phone Model
Mobile_name Varchar 20   Mobile Phone Name
Pcolor Varchar 10   Mobile Phone color
Imeino Varchar 20   IMEI No.
Mdate Date     Manufacture Date
Accessories Varchar 55   Accessories

 Tables: newbill

Description: Stores the information of Mobile Related Bill Details.

  Field    Type    Size    Key Description
Bid Int 4 Not null Bill Id
Bill Date Date     Bill Date
Cname Varchar 20   Customer Name
Price Int 7   Total Price
Amtpaid Int 7   Amount Paid
Mob_purchased Varchar 2000   Mobiles Purchased
Mob_Name Varchar 20   Mobile Name
Mob_Price Int 8   Mobile Price
Mob_color Varchar 10   Mobile Color
Mob_imei Varchar 20   Mobile Imei

Entity Relationship diagrams of Mobile Shop MCA Project

E-R Diagrams & Database of Mobile Shop MCA Project

Related Academic Project: Shop Management System

  • In this application, a user (Admin), can log in as an Admin or Staff to perform different activities.
  • By using this application the admin user can maintain the Staff and Customer Bill records and also manipulate it.

Methods of Software Development:

  • Rapid application development for making the user interface screens.
  • Prototyping Model used for development

Operating System and Languages:

  • Shop Management System is designed in .net.
  • Admin Or staff can Manage Products and Bill. The application is connected with Database using JDBC architecture.

Scrabble Java Game Source Code Free Download

Scrabble game project is implemented in java platform. Scrabble game is one of the oldest games which have lot of popularity all over the world. Because of its fame this game was developed for different operating systems and mobile devices. In present trend users are playing games on mobile devices which are of different platforms. In mobile market android, iphone, bada os , symbian are few mobile operating systems which are mostly  used by users all over the world. Companies are providing free game apps for  users for increasing there market. 

Source Code Sudoku Game Android

Sudoku game is one the popular game played by most number of users all over the world. Because of it puzzle words it has created interested in users. Initially this game use to be available only for systems. But in present trend mobile market had rapidly increased in developing mobile games.

There are many mobiles operating system providers like android, windows, bada. In present trend android is the leading operating system for mobiles. This is because of free apps and games provided in app store for free download. 

B Tech Mini Project on Mobile Bill Management System

INTRODUCTION 

STATEMENT OF THE PROBLEM

The objective of the Computerized Mobile Store Management System Final Year Java Windows Application is to develop software for monitoring and controlling the transactions of mobile phones in a Mobile Store. The project “Computerized Mobile Store Management System” is developed in java, and it is window based application.

SCOPE OF THE PROJECT

The Computerized Mobile Store Management System B Tech Mini Project is developed for Suresh Mobile Shoppe, Nalgonda.

In scope:

  • Analyzing the system environment in Mobile Store.
  • Testing the system whether the new mobile details are stored in the database correctly or not.
  • Testing the system whether the searching a Mobile Phone and updating a Mobile is working correctly or not.
  • Testing the system whether the bills are generating properly or not.
  • Testing the system whether the credit customer details are stored properly or not.

Out Scope:

  •  The Administrator can navigate through the software without any training.
  • The Administrator can provide better services to the customer by providing better search results of mobile phones and appropriate bill services.

LIMITATIONS

It is a windows based web application.

ANALYSIS

System analysis is an important activity that takes place when we are building a new system or changing existing one. Analysis helps to understand the existing system and the requirements necessary for building the new system. If there is no existing system then analysis defines only the requirements.

One of the most important factors in system analysis is to understand the system and its problems. A good understanding of the system enables designer to identify and correct problems. Based on the drawbacks of the existing system the system is being planned. So the defining of the given problem has to be analyzed.

 Analysis Objectives:

1        Identification of customer needs

2        Create system definitions

3        Perform technical analysis

REQUIREMENTS SPECIFICATION

Software Requirement Analysis Phases:

 Problem Recognition:

            The problem is recognized by discussing with the employees in the organization and identifying the problems faced by the current system and how the future system should be and its specifications.

 Evaluation and Synthesis:

            After getting the clear problem definition we focused on what to do but not how to do. Ways to solve the problem and the different ways we found and we select the best way to solve the problem.

Modeling:

            We made a rough diagram of the proposed system and showed it to the clients to verify whether their specifications are completely mentioned in that or not.

EXISTING AND PROPOSED SYSTEM

Existing System: 

The Existing system is manual. The Mobile details and bill details will be maintain in the books.

The following are the drawbacks with the manual system.     

  • Delay in Searching a Mobile Phones in Mobile Store.
  • Unable to maintain huge Mobile Phone details in the books.
  • Unable to maintain the perfect Billing Details.
  • Less security for Mobile phone details. 

Proposed System:-

            Proposed system is a computerized Mobile Store. Through our software user can add Mobile Phone details, search for Mobile Phone, Update Mobile Phone details, and Generate credit and normal bills.

Sample Visual Basic Project Free Download

Computer science , MCA, BCA students can use this sample visual basic project as major or mini project for there college course. Students can gain knowledge on visual basic platform and coding used in this project. 

Here we provide large collection of visual basic, java, C++ , asp.net projects reports with source code for free download.

Secured MAODV Project Abstract

The Secured MAODV Ad hoc network communications devices can be Laptops, PDAs, Pocket PCs etc. Ad hoc networks are used for data transfer, sharing of information between students in a classroom, during disaster relief for disasters like earthquake, floods, soldiers in a battlefield and so on. 

                        The passing of information in these networks happens through network packets being routed in the network. This routing in ad hoc networks is trivial, and happens in two ways – proactive, which is a table driven routing and reactive, where routing takes place on-demand. Ad hoc On Demand Distance Vector(AODV)  Routing protocol, one of the reactive routing protocols,and hard state protocol has become popular in the past few years. The multicast version of the AODV or MAODV which is used for routing to a selected group of nodes within the AODV network group is being enhanced in this project to provide more secure routing in this project.

                       There is a lack of centralized network management functionally in ad hoc networks.  These networks tend to be vulnerable to a number of security attacks in the form of data loss, privacy issues, interference eavesdropping, session hijacking and so on. Also countermeasures are not embedded, so external mechanisms are used. Authentication access control, encryption& digital signatures, biometrics verification are some preventive measures. Countermeasures beyond the prevention line are intrusion detection system, cooperation enforcement mechanisms etc. in one network. Here misuse and anomalies are detected and selfish node behavior is reduced.

                        This work improvises the security of MAODV. An authentication frame work for MAODV and countermeasures that prevent the impact of the attacks are dealt with. There are four main attacks that are being considered, they are rushing attack, jellyfish attack, neighbour attack and blackhole attack. The nodes that are malicious and found to be involved in these attacks are marked as misbehaving nodes and their role in the network is minimised or removed depending on the location. The implementation is in the form of simulation using NS2. The original MAODV Project Source code and the improvised version are compared based on latency, number of attackers and packet delivery ratio with an emphasis on how security has improved. 

Secured MAODV Project Abstract

CONTENTS

  • List of Figures 
  • INTRODUCTION 
  • MANETs
  • MAODV
  • MOTIVATION
  • LITERATURE SURVEY
  • METHODOLOGY OF SOLUTION
  • Why Simulation
  • Why NS-2
  •  Software and hardware requirements
  • Simulation Environment
  • Simulation Results
  • Statistical Results
  • Graphical Representation of results
  • THE PSEUDO CODE
  • CONCLUSION AND FUTURE WORK
  • REFERENCES

Software Requirements of Secured MAODV

  • GNU/Linux based OS (Debian)
  • Bash shell
  • Ns-allinone-2.34(includes ns, nam and xgraph)
  • Gnome C, C++ compiler and other C++ utilities
  • Various Tcl/Tk libraries
  • Perl and Python builds

Hardware Requirements of Secured MAODV

  • Intel Pentium based Microprocessor with min. speed of 800 MHz
  • RAM – 256 MB or higher
  • 20 GB hard disk space
  • 32 bit graphics supported VGA
Download Secured MAODV CSE Project Abstract with Full Documentation.

Asp.Net Projects For MCA on Text File Hiding In Audio Files Using Low Bit Encoding Steganography

Main aim of this project is to provide security for data using steganography technology where data is encrypted and transmitted in audio file. In this method it is hard to decrypt data without using decryption algorithm. Algorithms used in this application are secure and provide high security. 

Here we provide class diagram which will be useful for implementing this application. Students can download project report and source code on same topic from this site.

class diagram text file hiding

 

 

Text File Hiding In Audio a Asp.net projects in c# DFD Diagram

Text file hiding in audio is a new technique which is alternative to existing cryptography technique which is useful in cases where there is need for high security while transmitting data. 

Here we provide Data flow diagram which explains about flow of data in the system. Students can find project report and source code on same topic from this site.

dfd text file hiding

 

Asp.Net Projects Report on Text File Hiding In Audio (Wav) Files Using Low Bit Encoding Steganography

In order to develop this system we design a architecture which will explain behavior of the system and provide a better experience for client. In order to improve quality of service computerized applications are required in place of manual process.

Modules and their Description

Data hiding and extracting from an audio file is done in two main modules.

• Embed module.

• Extract module.

Embed Module (To embed the text file into the audio file)

In this module, the first step is selecting an input audio file .User is provided with a dialog box where path selection can be made using textbox.The second step is selecting an output audio file in which text data or a text file is embedded.The third step use should follow is to select a file from the list or enter new text for embedding.

In the fifth step what ever the files that we have selected are viewed and verification of the path is done. In the sixth process data is embedded in to the audio file using low bit encoding technique.

After embedding the content both the audio files are played and a listener cannot find any difference between the audios.

Extract Module (To extract the text file from the audio file)

In this module, the first step is the process of selecting the encrypted audio file. This is the file that a user has to extract information from the output audio. 

Download Asp.Net Projects Report on Text File Hiding In Audio (Wav) Files Using Low Bit Encoding Steganography.