IT Industrial Based Project Report on Student Information System

Introduction to Student Information System Industrial Project:

It was made as the next lesser Technical school in Sri Lanka. At the initiation present were six lessons for example business endorsement in accountants, testament in Shorthand plus sorting, testament in speed Mechanism, testament in Metal job and Electrical cabling. All the aforementioned courses were led in the Sinhala standard outside of the norm. By 1971, Technical College was subsidiary to the lesser university which was arranged contiguous the Technical College manufacturing and remained as poly specialized organization.

In the same year it was updated as an evaluation one Technical College for the region of Galle. In 1996, Sri Lanka Advanced Technical Institute was built at the same premises. Higher National Diploma courses were doled out to that establishment. Consequently, the Technical College has been directing just National Certificate Courses because 1996. In the year 2007, the Galle Technical College was updated to the status of a „College of Technology‟ (COT) with several recently improved courses with six totally ventilated labs.

To come to be a rumored conglomeration, running programmers which upgrade the needed innovative learning and aptitudes vital to carry on and flourish in the up to date business and mechanical nature and teach the qualities and demeanor which will empower the beginners to look any destiny confronts of a globalized financial system. The scope of the activity is to blanket the actions with its functionalities in Student Registration.

“University of Technology” Galle is to be a core adapted to grant information observing the progression occurring in the universe of science and innovation to the young in the southern region and furnish them teaching on the method of utilizing such learning for the socio-budgetary advancement of the homeland. The Student Registration exercises are running under the Academic division of DTET and controls under control of Registrar of the COTs. Every twelve-month, around 1000 records are dropped in the database for investigating reason. However it’s truly demanding to examine manually. Current framework does underpin initiating prompt movement to investigate the information. 

Download IT Industrial Based Project Report on Student Information System.

Student Management System Project for Postgraduate Diploma in Information Technology

Introduction to Student Management System Project:

Dr. Wijayananda Dahanayaka opened The technological university Galle, an earlier part of assembly on 29th July 1957. At the initiation at hand were six tracks for example business authentication in clerks, declaration in Shorthand with sorting, declaration in Motor device, declaration in Metal job and Electrical cabling.

All these lessons were directed in Sinhala Medium outside of the norm. By 1971, Technical College was associated to the lesser university which was arranged adjoining the Technical College raising and remained as poly specialized organization. In the same year it was redesigned as an evaluation one Technical College for the region of Galle. In 1996, Sri Lanka Advanced Technical Institute was secured at the same premises. Higher National Diploma courses were allocated to that foundation.

Thusly, the Technical College has been leading just National Certificate Courses in light of the fact that 1996. In the year 2007, the Galle Technical College was updated to the status of a „College of Technology‟ (COT) with several recently improved courses with six thoroughly cooled research centers. University of Technology is a legislature organization for the research project of testament level courses. It has got above 1000 scholars to concentrating on distinctive courses. Inasmuch as the number of people is developing, and the administration needs to handle record of part of learners, it’s confronting severe situations in looking after the record of scholars. However it has utilized an informative data framework, but it’s absolutely manual one.

What more henceforth there is ought to update the framework to that of the machine based informative content framework. The university has PCs in each section, but they are utilized unequivocally for the paper works and for effortless occupations as making the provisions, sorting the notices, making participation sheets, and so on. The scope of the activity is to blanket the actions with its functionalities in Student Registration.

Download Student Management System Project for Postgraduate Diploma in Information Technology.

Attendance Management System VB.Net Project with DFD and ER Diagrams

Participation Management System is programming improved for day by day person participation in schools, universities and organizations. Assuming that expedites to enter the participation informative content of a specific understudy in a specific class. The qualified data is sorted by the specialists, which can be given by the instructor for a specific class. This framework will likewise assist in assessing participation qualification criteria of a person. The motivation behind improving participation administration framework is to mechanize the convention way of taking participation.

An additional reason for advancing this programming is to produce the article programmed at the close of the session or in the between of the session. The scope of the undertaking is the framework on which the programming is fixed, i.e. the undertaking is advanced as a desktop requisition, and it will work for a specific foundation. In any case later on the task could be changed to manage it connected. The framework being advanced is monetary regarding School or Collage’s perspective. It’s financially savvy in the sense that has disposed of the paper work totally.

The framework is in addition time viable on account of the figuring’s robotized which are made at the finish of the month or according to the user necessity. The effect acquired holds least blunders and are profoundly correct as the information is needed. The specialized prerequisite for the framework is financial and it makes a point not to utilize any viable supplemental Hardware and programming. The Attendance Management System is improved utilizing Visual Basic.NET completely meets the goals of the framework which all things considered, the situation has been improved.

The framework has gotten to an immovable state where all bugs have been killed. The framework is worked at a towering level of effectiveness and every last trace of the educators and user connected with the framework perceives its focal point. The framework tackles the situation. It was proposed to explain as necessity particular. In the present framework all work is finished on paper. The entire session participation is saved in register and at the finish of the session the articles are produced. We are not fascinated by creating report in the midst of the session or according to the prerequisite since it takes a step back in estimation.

Download Attendance Management System VB.Net Project with DFD and ER Diagrams.

NIT CSE Project on Process Checkpointing and Restarting with Full Report

Introduction to Process Checkpointing and Restarting Project:

In this Project we are approaching a new method of controlling the movement of the mouse using the base of a real-time camera. The existing methods involve changing parts of the mouse like changing the position of the tracking ball or adding of buttons. Here instead of changing mouse parts we proposed to change the hardware design. Our method is to make use of image comparison technology, camera and a motion detection technology to control the movement of the mouse.

We have a latest way to control the function of a mouse using the real time camera method. We lamented the selection of icons as well as the movement of the mouse. Actually this system is based on the mouse detection technology and image compression method. The function of the motion detection system is to do make the movement of the mouse pointer possible along with election of icons. Due to the various detection and lightning it becomes difficult to get stable results.

Usually the algorithms used have issues of illumination. From these algorithms we can assume  that as they work in all environments therefore the system will also give efficient functions. If you have a work space problem and you want to reduce the usage of space then this system is just ideal for it and apart from this it is also useful in presentations. We are also planning to add more and more features to our proposed system in the future like shrinking windows, enlarging windows and closing windows with the use of multiple fingers and palm.

Our current system requires a good technology of illumination for the function of the mouse. Scale changes, hand gestures are also required simultaneously. Many improvements can be made to this system like double clicking, clicking, scrolling and others. This will increase the work efficiency of the of the users.

Download NIT CSE Project on Process Checkpointing and Restarting with Full Report.

Intrusion Detection and Secure Routing CSE M.tech Project Report

Introduction to Intrusion Detection and Secure Routing Project:

This paper discussed about a secured routing protocol based on AODV over IPV6, which used for intrusion detection and response system for ad-hoc networks. This paper also discussed on how the new mechanisms help to detect and thwart malicious attacks. 

Overview:

 A secure routing protocol helps to prevent or minimize attacks against nodes in a MANET.  The possible attacks in MANET are routing disruption attacks, resource consumption attacks and attacks on data tariff. The SecAODV implements the common concept of both BASAR and SBRP.  The implementation of SecAODV follows Tuominen’s design and also uses two kernel modules like ip6 queue and ip6 NF AODV for its implementation.

  Route discovery and maintenance of local connectivity mechanisms are the two mechanisms implemented by an AODV protocol. An IDS strengthens the defense of a MANET.  Scalability, designing a platform for collaborative IDS and enabling protocol specific IDS are the basic design goals involved in designing an IDS. In IDS intrusions can be detected based on anomalous behavior of neighboring nodes.  Every node monitors a specific tariff activity within its radio-range. 

Conclusions:

There are significant inherent vulnerabilities of mobiles devices in MANET’s and there is more possibility of attacks on such devices.  This paper discussed about a secure routing protocol SecAODV and an IDS design and implementation.  Creating and maintaining routes is the major role of a routing protocol. 

Even though the network is getting protected from routing disruption attacks there is a possibility of occurring packet mangling attacks, denial of service attacks by using MAC vulnerabilities and grey holes. An IDS is needed to protect the network from such attacks. An IDS which deployed on a mobile device is always constrained to its radio range.  An IDS can monitor selected nodes and in turn increase the scalability and detection accuracy. 

Download  Intrusion Detection and Secure Routing CSE M.tech Project Report .

Robust And Secure Authentication Protocol In Group Oriented Distributed Applications Report

Introduction to Robust And Secure Authentication Protocol In Group Oriented Distributed Applications Project:

In group oriented distributed applications, there is a need for providing security services in order to provide group oriented communication privacy and data integrity.  Group communication data can be encrypted by a common secret key which is known to all group members.  In peer-to-peer network, the communication between group members is susceptible regarding common secret key as there is no previous agreement on the common secret key. So in order to maintain a secure and private communication among group members there is a need to establish distributed group key agreement and authentication protocol.

The protocol used for this dynamic communication group as per this paper is Tree-based Group Diffie-Hellman protocol.  Among rebuild, batch and Queue-batch algorithms, the best interval-based algorithm is Queue-batch algorithm. This algorithm has been proposed to perform rekeying operations and this algorithm has a capability to reduce the communication workload in a huge dynamic environment. Instance messaging technique is proposed to demonstrate the system’s strength. 

Overview: 

To provide the security to the group communications in distributed applications the things need to consider are protocol efficiency and group dynamics. Two-party communications has both starting and ending points but group communication has its own complexity as there is no one end point because members in the group joins and leaves at any time. Dynamic group tends to be small size when compared to that of multicast group so the focus is highly there on dynamic group. 

This group assumes many-to-many communication pattern. Dynamic communication group members are always located in a distributed fashion. The critical things need to be considered for secure group communication are secure, robust and efficient key management which helps to demonstrate the system’s strength.   

Conclusions: 

This paper discussed about TGDH protocols and tree management. Analysis of queue-batch algorithm based on its performance is also discussed in this paper.  The protocol proposed in this paper is Tree-based Group Diffie-Hellman protocol, which helps to achieve distributive and collaborative key management.  Interval-based rekey operations help to reduce the rekey complexity.

Download  Robust And Secure Authentication Protocol In Group Oriented Distributed Applications Report .

Privacy Preserving Data Mining CSE Project Report

There is happening a great increment in the data that are storing in the databases or various other applications which are bounded by the various technologies that are used in this generation on a large scale. Data processing and the data binding are the some of the types of the simple approach of the privacy sector and its department. In the previous years the mining of the data’s are also compressed to the sectors related to the privacy sectors. PPDM called as the privacy preserving and the data binding are the standard features that are used in the execution of the programs.

The work the responsibility that is related to the existing system is techniques that are targeted to the data and its new update and the construction to the current systems. The comparison of the fuzzy approach, the experimental results and the features of the fuzzy approach are some of the related attributes of the system here.

The total sharing of data from one system to another has become very useful and demand-able in today’s generation and also in the minds of the users and other people’s. This system is not only expressed in the sensitive case but also by the other user and the people related with the privacy and the protection. This system is tested and configured by the Apache server which successfully generates the proper expected results.

In the current work and the study of the existence of the new and the updated version of the system the developers use the FCM algorithm which is used as the parameters to the source codes at the code generation time duration. In the upcoming future this system can be even more extended by the data that are complexly related to the category.

 Download  Privacy Preserving Data Mining CSE Project Report .

IIT CSE Project Report on TCP Stream Reassembly and Web Based GUI for Sachet IDS

Introduction to TCP Stream Reassembly and Web Based GUI for Sachet IDS:

Now a days instead of getting into direct interaction online communication has become a demanded in today’s generations. In this days the security and the prevention of data is also that much important too. In the year each and every day the new version of the techniques and the technologies. So this happens to sometimes the corruption of the data and the files and documents too. The security of the data is due to the secured IP address and also the firewall that is placed in the system. The IDS and the IPS system are also used here to protect the system from the viral attacks.

This TCP stream technology is generated for the better use of the Sachet Intrusion system for their preventions which is completely based on the upcoming network of the Intel IXP2400.  This is seriously done by the IP and the IDS which Cleary protects the system. The data that are used to execute the programs regarding the random access memory re about approximate 24mbps. This memory is then added to the network cards with more memory issues. To protect the new brand layer must be added to the construction of the TCP. This TCP carries out the basic steps of the address of the internet protocols and the TCP ports.

Now a great Web design of the system has been developed by the developers. This newly web designer of the system has great new advantages and also new features too. This permits the network by administrating it to the multiple systems instead of the client servers.

The testing the operation and the functions of the system it is used to test it on the apache server which is situation on the same system machine and computer. Currently it has only one single individual category of user which has the different type of the stages of the access and its utility and the functions and the resources and services.

 Download  IIT CSE Project Report on TCP Stream Reassembly and Web Based GUI for Sachet IDS  .

Cache Compression in the Linux Memory Module NIT Computer Science Project Report

Introduction to Cache Compression in the Linux Memory Module Project:

This cache compression is used by configuration the RAM to catch the pages and the files which surely adds the great brand new version of the existing system. Here each every level of the cache compression attains the huge performance of the random disk memory and the Disk too. Here the current version is verified via the virtual part of the memory. This song has become the great attraction to the human’s eye. The working of the system is completely depended on the speed of the system computer that is based on the total memory of the RAM.

There are various documents and the files which are continuously present in the modules of the memory and its databases and disks. This files and the document where are present in the modeled memory is then compressed and then are permitted for the user to use in the required. 

Here there are some of the nodes which support the operating system like Linux. Linux is capable of generating the high memory for the hardware systems and configurations. Watermarks are the special standard images that are used to display the icon of the existing system here. The detailed information of the system is given in the reference books in detail.

The system is developed on the operating system which is the Linux because it works properly and gives more successful results when it works with the Linux operating system. There are various other zone in which are related to the existing system. The Zone that is related to the DMA is the zone which is the type of memory which has low physical ranges of the memory where compulsorily ISA application or device is required. Zone which is related the normal is the area where the files are internally mapped by the hardware like the kernel and many other substances.

 Download  Cache Compression in the Linux Memory Module NIT Computer Science Project Report .

NIT CSE Project Report for Packet Sniffer Project

Introduction to Packet Sniffer Project:

The current software permits the end user to skip or remove the data or related information from the interfaces of the networks. Here the user has the facility that they can even write the IP address so the data or the packets that they can easily capture the system machine that shares the data or packages. This data will be captured or caught in the device and the user then can easily view the file here. There is also some of the configuration that needs to be done and settings are applied to it. Changing the mode of the Ethernet card, Access to Ethernet card is the few configurations that are done here.

Now starting the Sniff Packets by capturing the images the packets are sub divided into three more types called the Network Numbers and Mask this network number and network mask are stored in the network card. Second is to capture the packet this is done to capture or grab the individual packets only.

Third is the Dumping data which are called the pcap dumper where this application is used to save the name of the file or documents. There are also filters that are connected to the system and there are also some types of the system like the pcap compile and set filter. Pcap compiler uses the compiler () are used to run the operations in the programs. Set filter sets the appropriate related filter to the program while execution.

The first version of the system was selected by the appropriate language by the developers. It was on the C language when the first version was launched in the early year. In the coming future this system can also be developed on JAVA for getting great demand. On depended on the existing system the designers are currently developing it on the Graphic User Interface. 

  Download  NIT CSE Project Report for Packet Sniffer Project .