Hotel Management System C#.Net & SQL CSE Final Year Project

Hotel Management System

 The ‘Hotel Management System‘ is developed to maintain the details of Customer booking information, trace the details of customer also maintain the information about the hotel room availability.

Using this project users may know all the details which is provided by the ‘Hotel Management System’. Users can view the availability of rooms and dates for booking in advance.

In the same way in this project one more user is involved he is most important person who is  able to controlling all the information and also make the  necessary changes when they raised is called ‘Administrator’ . He can do the updates and set the prices regarding the rooms and change the users name and password such type of all these things are made by the Administrator level 

The Hotel Management System provides following features.  

1.Check In Details of Customer

2.Customer Booking Details  

3.Rooms Availability Information

4.Check Out details        

5.Searching the details of Customer.

This application is developed by using windows application in C#.Net .

Software and Hardware Requirements

Software Requirements:

Operating System : Windows 2000/xp/Vista

Front End Software       :  Microsoft Visual studio 2005, C#.Net

Database              : Microsoft SQL Server 2005

Hardware Requirements:

Processor             : Pentium 4.0(1.6 GHz) and Higher

Memory               :  256 MB

Hard Disk            : 40 GB

Download Hotel Management System C#.Net & SQL CSE Final Year Project.

Efficient Packet Filtering Using Hash Tables

Wireless Mesh Networks are one of the fast growing technologies which had created scope for developing software applications for mobiles which work mainly on wireless network.

Mobiles are playing major role in communication in ad hoc networks and locations like hill stations, and remote hard to reach places.

Efficient-Packet-Filtering-Using-Hash-Tables.

Wireless mash technology is mostly used in mobiles for internet connectivity which will increase existing network capability. Many organizations are moving towards wireless mesh technology. 

This technology will provide security in data transition which is one of the best features in wireless mesh technology. In order to deal with security issues in network protocol design should be accurate. Issue detections should be done at application level with track back mechanism in order to provide secure communication.

Sybil attack is one of the dangerous attacks we see in wireless mesh network. There are two methods to deal with Sybil attack first is to install bulletproof hardware and second one is through packet trackback.

download Project code,project report of IEE CSE Wireless Mesh Networks packet filtering project.

Graphical Share Market Data Rep .Net-Project

                     
Graphical share market data rep .Net-Project
is a speculator on a Stock Market, aside from having money to spare, needs at least one other thing — a means of producing accurate and understandable predictions ahead of others in the Market, so that a tactical and price advantage can be gained.

Graphical-share-market-data-rep-Net-Project

This work demonstrates that it is possible to predict one such Market to a high degree of accuracy. Neural network predictions were obtained for the daily Market close 5 days ahead, and 25 days ahead, as measured in mean square error and in root mean square error.

To measure percentage accuracy, each individual test case prediction was compared with the actual market outcome, and total percentage accuracy for the whole test set was similarly calculated. Comparisons were also drawn with predictions for the same test cases using four types of Multiple Linear Regression.

The neural network results indicated that predictions based upon the lowest mean square error bear little relationship to the same test cases, when measured in terms of overall percentage accuracy.  

 

Existing System:     

       Maintaining the data of Stock Market manually is very difficult where we deal with huge amount of data and the data will be changing frequently depending upon the share market.

Viewing of the required data is also a big problem and end-user will not get the clear idea about the flow of the system.

Proposed System:

                    For the lay person, or a Stock-Market speculator, it was also shown that predictions can be produced to a high level of accuracy, in a readily understandable format. This application is totally integrated system with different sub systems like multi user Security, financial module integration. For now the software has the Organizer and Trader module. The organizer will hold all the master data that are required as part of the application. The Trader will involve uploading the daily Trade files received from NSE.

All this trade information’s are captured in the tables. The data from the master tables are displayed in different formats using reports as part of daily information to the clients who trade with the Stock brokers. Design and Development of Client, Organizer, Reports modules.

Bestows Tree Online Loan Agency System A Java Project With Code

Bestows-Tree-Online-Loan-Agency-SystemBestows Tree project is a banking related project which can create transparency on loan system between customer, loan agency and banks. In present banking system banks are interlinked with a agencies which will look after basic work on loan system. Customers should submit application to agencies to approve any loan from a respective bank. These agencies will verify customer details and if it is fills the needs of a bank they will approve and send it to bank for loan approval..

This application Lending Tree is an online based application through which customers can submit information to agencies for verification. Agencies can update status of the applications through online using features like approved, rejected, and pending. Using this application can reduce time and work for customers as well as agencies. Agencies can check pending files through online and move files to respective branches. By developing this application transparency of system can be improved. 


Through this online application customer can submit loan application to interested banks from the available list. At the same time application is submitted to loan agency who will have three departments-Pick-Up, Verification and Legal. Administrator module will maintain entire application. Initially application is moved to pickup department, agents will be sent to customer for verification on documents. Agent will submit collected documents to verification department by attaching them using online application and here entire customer details are verified and then forward this application with verified status. Legal module will verify submitted details with builders and if the information is genuine application is forwarded to administrator.

The administrator or final approving authority views both types of reports, Viz, the reports from verification department and the report legal department. This will help him to take a decision regarding whether to forward it to the bank or not. The same is communicated to the customer.

Final decision will be taken by administrator who will cross check all the submitted reports of the application and if he is satisfied he will submit application to bank with crosschecked documents. Then application status will be informed to customer.

This entire process is done through this application .User can contact or verify his loan application status on his account.

download paper presentation,Project Report  of  CSE Bestows Tree Online Loan Agency System a Java Project.

Multiple Input and Output Ad-hoc Networks Power Allocation

Multiple-Input-and-Output-Ad-hoc-Networks-Power-Allocation.In AD-HOC Networks finding out missing power nodes while transferring files is complicated. Users need to indentify missing node to transfer file without any interruption. Packet transfer in a network is done through multiple inputs and multiple output communication; in that case it can provide high spectral efficiency.

There is need to analyze each and every node in MIMO in the time of File Transfer. Which is important for reliable file transfer in Ad-Hoc Network?

Bandwidth efficiency or spectral and spectrum efficiency is defined as the rate of information transfer in a communication system.

It is a measure of how efficiently a limited frequency spectrum is utilized by the physical layer protocol, and sometimes by the media access control (the channel access protocol).

Bandwidth efficiency is calculated based on the frequency used in allocated spectrum and the amount that is used by physical layer protocol, and sometimes by the media access control.

Existing System.

  • Existing system is implemented using MUWF and GGP method for increasing performance of the network. These two methods are inefficient to perform this task.

Proposed System.

  • By implementing new Game Theory method can increase power control and performance of the system. Which cannot be possible by MUWF and GGP methods. 

In this Project, experimental and simulated results for different power allocation  methods in an indoor MIMO local area network have been shown. The performance of the GT method was compared to MUWF and GGP methods in terms of capacity and energy efficiency.

Additionally, the probabilistic results show that the GT method outperforms the MUWF approach and approaches the performance of the GGP method (without as much network overhead). These results quantify the benefits, in terms of capacity and energy efficiency, of using greater levels of network knowledge in MIMO ad-hoc network power allocation.

download Project Report,project code and paper presentation of  CSE Multiple Input and Output Ad-hoc Networks Power Allocation.

Effective Key Generation for Multimedia Java Project with Code

Effective Key Generation For Multimedia Java Project entitled Effective key Generation for Multimedia Application is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. 

Stenography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy.

This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Stenography.
The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.

Effective-Key-Generation-For-Multimedia-Java-Project

System Description:

The Effective key Generation for Multimedia Application system is designed basically in four different modules they are GUI module, Security System module, Stegnography Module, Connection Manager Module.

GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer.

It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which include the services of sending and receiving of the files with encryption and decryption standards.

Existing System.

  • In the traditional the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system
  • The data has to be transported over the network to the client, which requires a secured format of the transfer method.
Proposed System.
  • In the proposed system we use both cryptography and stenography
  • First the information is encrypted and then it is embedded in to a video file.
  • In this way two levels of security is provided and it is difficult for the hacker to read the information

Software Requirements For Multimedia Java Project 

Operating System:

Windows NT/2000 (Client/Server).

Software requirements:

Front-end: Java J2SDK 1.5, Swings.

Hardware Requirements:

System Configuration:

Pentium III Processor with 700 MHz Clock Speed

256 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card.

download Project Report and source code and paper presentation  of  CSE Effective Key Generation For Multimedia Java Project . 

Download Efficient Algorithm for Mining Frequent Patterns Java Project

Mining Frequent Patterns Java project is the most efficient one. Its function is to mine the transactional data which describes the behavior of the transaction. In an online business or in an online shopping the customers can purchase items together. Efficient-Algorithm-for-Mining-Frequent-Patterns-Java-Project

Frequent patterns are patterns such as item sets, sub sequences or substructures that appear in a data set frequently. Many efficient algorithms were developed based on the data structure and the processing scheme. The mining of most efficient algorithms such as Apriori and FP Growth was implemented here. 

Project Details: 

In this paper, we propose the efficient algorithms (Apriori and FP Growth) used to mine the frequent patterns. Frequent patterns are patterns such as item sets, subsequences or substructures that appear in a data set frequently. From the transactional database, we can examine the behavior of the products purchased by the customers. 

For example, a set of items Mobile and SIM card that appear frequently as well as together in a transaction set is a frequent item set. Subsequences mean if a customer buys a Mobile he must also buy a SIM card and then head phone etc. 

From the history of the database, these transactions are happening sequentially is called sequential patterns. The Substructure refers to different structural forms such as sub graphs, sub trees which may be used along with item sets or sequences. 

Many of the algorithms were developed for mining the frequent items. In this paper, we propose the efficient algorithms (Apriori and FP Growth) used to mine the frequent patterns. The Apriori algorithm generates a candidate set during each pass. It reduces the data set by discarding the infrequent item sets that do not meet the minimum threshold from the candidate sets. 

To avoid the generation of candidate set which is expensive the FP Growth algorithm is used to mine the database. The FP Growth does not generate the candidate set instead it generates an optimized data set that is FP tree from the dataset.

 The FP tree is mined to construct a conditional database. FP mining processes use the divide and conquer strategy, so the data set shrinks and gives us quite small conditional frequent pattern base. From this database, the frequent patterns are generated. 

Conclusion: 

A traditional system based on the manual calculation and dynamic counting method. We propose the efficient algorithms used to mine the frequent patterns. We have proposed the implementation of efficient algorithms to find frequent patterns. 

The Apriori algorithm scans the dataset repeatedly whereas the FP growth avoids the costly candidate set procedure and generates the highly condensed database called as FP tree. Implementation of this project shows that the FP Growth method is efficient for mining frequent patterns and it is an order of magnitude faster than Apriori algorithm.

Student Information System a Java Project

In the project “Web portal system for student information system a Java project”, the design of different modules and components of a student information system are aptly described. This is basically a web-based application for students, faculty and academic faculty in order to obtain student information quickly. This system is like a replacement for the traditional file system and avoids traditional paperwork.Student-Information-System-a-Java-Project

In this web-based application project, a student’s complete academic records can be tracked thereby providing easy access to office staff and committee members. It avoids the need of tedious paperwork on the part of the students and students can then file their information through a computer and makes an easy process for submission as well as evaluation.

Description:

In this project Web portal system for student information system the student information is classified into three modules viz login module, administrator module and student module. The login module is used for entry to the website with provision of various functions and facilities. In the administrator module there are two parts: one is for entry, update or deletion of student. The second part is for issuing notices, internal results etc.   

In the student module, once the student enters his id and password, he can access other pages. If profile view is clicked, he can update his personal detail. In the notice view he can check out all notices. The link to the attendance view student can access his attendance details. There are links to internal exam results and also the time table.

Conclusion:

The software used to design this project is the Java-2 Enterprise edition (J2EE). In this every component can be selectively designed and a multilayered distributed application model. It’s a secured software and flexible in nature too. By making use of this software and its several components this project can be successfully designed.