Fee Management System Project Documentation

Introduction to Fee Management System Project:

The main of this system is to develop fee management system by using c language. This system mainly reduces the work task and it is easy to maintain the records for a long time than normal hand written records. The user can check his record details by just entering his name no need to search all the record. With the help of this system fee calculations can be done very easily by this system. So the maintenance and management of fee became very easy.

Proposed System:

                          In this new fee management system the difference between old fee system and new fee system is shown. The new system can overcome the old fee system by adding some additional features likeit is totally computerized and data can be easily maintained in database for a long time

Problem Statement:

The aim of problem statement was to design a model

  • The model must be user-friendly
  • It should not allow viewing others data
  • The data privileges should be easily viewed
  • By all this features the admin can handle data easily

Functions to Be Provided:

  •  The user interface should be completely menu driven and user-friendly
  •  The user should not find any difficulties in options field
  •  Faster response should be present
  •  It should also provide view, add, delete features for better fee management system 

Conclusion:

From this system we can conclude that it provides better fee management system and also lot of convince than the old system. This process is very fast data can be easily entered lot of time is also saved. It is very easy to understand and this program can be used anywhere based on requirement.

Download  Fee Management System Project Documentation.

Fast Multi-Resolution Image Querying Using Color Characteristics Seminar Report

Introduction to Fast Multi-Resolution Image Querying Using Color Characteristics Seminar Topic:

The main aim of this project is to build content-based image retrieval depending color and generic shape.  Another name of content-based image retrieval is also called as query-by image content (CBIR). It is originated in 1992 and it is used by Kato. For searching the images in the large data-base content-based visual information retrieval is used. Based on the size shape and color and other information are extracted from image by content-based image retrieval. There is another way to search the images by keywords, captions but this procedure is very expensive to achieve.

The CBIR process retrieves images automatically from database by syntactical analysis of image features. The tools that are used in this process are pattern recognition, signal processing and computer vision

Technical Progress:

                            From day-to-day the interest in CBIR was going on. With the help of current technology textual information can be easily extracted from images. But it’s a difficult process because it should be handled personally for describing every image information in data-base. There is a loss of images when different names are used in their descriptions.

Potential users of CBIR:

  • Art collections
  • Photograph Archives
  • Retail catalogs
  • Medical Records

Content-Comparison Techniques:

        There are three techniques

  • Color
  • Texture
  • Shape

Color:

                   This technique follows comparing the color histograms in images. This technique is most widely used.

Texture:

This technique follows by checking visual patterns and spatial in images. Actually Textures are represented using textures by identifying number of textures the images can be easily identified.

Shape:

                     Shape is detected using segmentation and edge detection and also particular region in the image. But in some circumstances human involvement is necessary for shape detection.

Download  Fast Multi-Resolution Image Querying Using Color Characteristics Seminar Report.

An Advanced Mac Protocol MIMO WLANS Project

Introduction to An Advanced Mac Protocol MIMO WLANS Project:

A format where digital messages are exchanged inside a system network is called communication protocol, MAC or Media access control is such a data communication protocol which acts as a data link layer sub layer. It is part of a 7 layer computer network OSI model. The physical layer of the network and the logical link layer use MAC as an interface between the two.

Communication service by MAC Channel includes

  • Unicast
  • Multicast
  • Broadcast

If the two devices are connected in a network through a wireless medium it is called a wireless LAN network or WLAN network. There are different types of wireless technology used around the globe in WLAN’s. In order to better the connection capacity and the range among the access point and a client station, a new wireless technology is used called MIMO or multiple input or multiple output wireless networks. For this type of wireless communication networks, the standard used are mostly specified in IEEE 802.11 specs.

This project deals with drastically lessens the chance of collision across a network during the case of multi user access streams, CSMA/CA scheme which is advanced is suggested for solving the constant collision problem.  The main disadvantage or drawback of the 1EEE 802.11 system was it had huge block delays during communication and no throughput was happening.

The proposed system displayed an encouraging throughput and there was a considerably improvement in the delay factor. Moreover the proposed system protocol helped in processing large number of data requirements rate applications across a host of networks. The constraint which has very less delay is also managed as effectively with this new protocol. A control channel is not required at all for the transmission of data, moreover the probability of collision is so much less as its dependability is on clusters contending.

Download  An Advanced Mac Protocol MIMO WLANS Project.

Designing Reduced Instruction Set computer RISC Processor Using VHDL Project Report

Introduction to Designing Reduced Instruction Set computer (RISC) Processor Using VHDL Project: 

The designing of super-efficient computer processors and accelerators for hardware is done mainly by reducing the control of the compiler hardware to a low level.  RISC computing or reduced instruction set computing is a design of the CPU that can provide higher performance by simplified instructions which leads to a faster execution.

RISC is a system that allows the usage of optimized set of instruction to the highest level and uses the load/store architecture. Primitive computer languages were used to analyze the sequential programs, much similarly standard language are used to define the digital circuits. Hardware description language or HDL is used in hardware elements to concurrent the process model in it.  The cost effectiveness of the RISC model has impressed many of those who design a compact hardware.

The first step in designing is to test a program to check the input and output in the design module under various conditions. A simulator tool called Verilog simulator verifies the functioning of the design. Algorithm and logical unit will be synthesized and generation of a netlistwill happen which in turn will be transformed into a programmable logic device or PLD image file. The test jig is wired and verified after the PLD files are programmed in a device called CPLD.

Verilog HDL has many pros comparing to the other HDL’s. No special technology is selected while designing, also redesigning the circuit also don’t emerge as a case. The design is implemented into the tool and a gate level net list is created, the verification process is done in the design stage itself eliminating the errors and cons there and then itself.

The functional units of the machine:

Processor

Controller

Memory

Various functions includes data operations on ALU, storage, instruction, address registers and program counter content changing, altering memory content , data retrieval , bus movement controls etc. 

Download  Designing Reduced Instruction Set computer (RISC) Processor Using VHDL Project Report.

Multiple Routing Configurations for Fast IP Network Recovery Documentation

Introduction to Multiple Routing Configurations for Fast IP Network Recovery Project:

We can’t imagine a world without internet these days, the very fact that we use internet for even small things such as navigation or even finding a favorite recipe explains how much it has influenced all of our lives. Moreover the abundance and easy access to internet unlike olden days have made internet mass popular.

We often face problems while accessing the internet and the most re occurring problem is that of a decrease in browsing, uploading and downloading speeds sue to heavy net traffic, this happens mainly due to the failure of the nodes and slow  link recovery across network protocol. MRC or Multiple Routing Configuration is a new innovative technique through which perform a recovery process fast and effective after a node failure. 

Performance are analyzed by MRC by considering 

  • Scalability
  • Lengths of the backup path
  • Distribution of loads 

In cases of net traffic, MRC will reduce the congestion by recovering the traffic and improving its distribution. In the present network the traffic congestion is not managed properly as the work load is mainly relying upon link weights in many cases. Most connections throw light only on the cases where no failures happen.

In the case of load balancing, a better optimization can be obtained with the proposed MRC system as it has a very simple and effective approach.  The recovery is almost guaranteed on scenarios where single failure happens, MRC do this by managing the node and link failures under single mechanism. As this technique is sans a connection and uses hop by hop forwarding technique which are destination based for the assumption. During the diagnosis, if MRC detects a failure an additional routing information are maintained specifically which enables the forwarding of the packet to flow on that alter link without any delay 

Download  Multiple Routing Configurations for Fast IP Network Recovery Documentation  .

A Secure Communication Protocol For Ad Hoc Networks Java Project Abstract

Introduction to A Secure Communication Protocol For Ad Hoc Networks Java Project:

The biggest problem everyone faces while sending or sharing data is the security issue associated with the transfer. The chance of infiltration is higher in a less secured network and as a result there would be loss of important confidential data. The ad-hoc network is independent of any fixed infrastructure and it’s the each individual node in it that works as a router by managing and transferring the data among each other.

There should be a highly secured and safe protocol for communication between each of these nodes. This topic deals with such innovative security measure called clustering adapted for such ad-hoc networks. The data packets are shared between two nodes inside and among these clusters. A head node is selected to execute all important functions and uses various technological processes such as encryption and cryptography to make the whole system more authentic, secure and scalable. 

The data packets are usually vulnerable to hacker attacks and it is extremely important to protect them from such malicious attacks. Techniques such as symmetric key cryptography and authentication techniques such as Kerberos authentication are used to manage the integrity and transparency of these data packets. A method and an algorithm which is randomized to control access to channel broadcast is also another technique used to secure communication protocol of these types of ad-hoc networks.

A distributed clustering algorithm is also used to help cluster the nodes. A leader is selected within a cluster and other nodes maintain close proximity to this leader in cluster leader based scheme which reduces the cluster overhead considerably well. The two different algorithms namely randomized channel control access and distributed clustering are also used for increasing the security of the protocol. By using these methods the overall efficiency of the ad-hoc network increases and the overhead considerably decreases. 

Download  A Secure Communication Protocol For Ad Hoc Networks Java Project Abstract  .

Android Operating System Project Abstract

Introduction to Android Operating System Project:

The Android is a software application for the mobile phone and devices that has been depended on Linux kernel. The Android has innovated and developed by the Google inc. and Open Handset Alliance which is also known as the Consortium of the companies includes Google, HTC, Intel, Motorola, Qualcomm, The T- Mobile, Sprint Nextel and NVIDIA. 

The software application has been coded in JAVA language. The Android device is regulated by the Google JAVA libraries. 

The Android platform architecture consists of hardware instrument like ARM Processors, SQLite, Dalvik, Virtual machine. The operating systems includes Apps, Framework, Libraries, the Linux kernel. The network connectivity is provided with GSM, 3G, EDGE, Wi- Fi. 

The various versions has been developed till now they are Cupcake, Donut, Éclair. 

The features of Android 

  1. Open source to explore and free for users to download
  2. Complete community support
  3. Wide media support
  4. Embedded webkit engine
  5. High class developed environment 

SCOPE 

The Android has explored the future possibilities of mobile applications. By the use of API libraries and application connection the hardware is accessible with controlled manner. The Android has been gone ahead to iPhone in year 2012. The Android application is now been used by many mobile phone and in future it will take over all other applications.

Download  Android Operating System Project Abstract .

Design and Implementation of Sip for Multistreaming Applications Project Report

Introduction to Design and Implementation of Sip for Multistreaming Applications Project:

The Session Initiation Protocol (SIP) is for the signaling protocol used for the preparation and differentiation of the Multimedia type of communications like voice calls and video calls in the field of Internet. The possible applications are like video conferencing, streaming of multimedia distributions, online games, emails etc. The SIP has applications like creation, modification, termination of the two way party or Unicast and Multiparty or Multicast areas of more than one media fields. 

The Proposed topic constitutes of developing the applications for the text and file transfer, voice and video conference by the use of SIP along with proxy server system. The SIP signaling is based on the pattern of Server- Client which uses protocols HTTP or SMTP. The requirement of the project includes the Internet phone or soft phone. The Internet phone applies the Session Initiation Protocol or Media Gateway Protocol (MeGaCo).

The SIP phone consists of the VoIP phone. The Soft Phone runs on the personal computer and does not need any special device. The soft Phone enhances the quality and similar to the normal phone along with head set or can be used with the USB device. The applications of SIP phone includes Voice conference, IP contact, IP phone system, FAX on the IP, Video conference, Call monitoring. 

The modules is needed to develop are

  1. User Agent Client or UAC which develops the conclusion and transfer to the servers.
  2. User Agent Server or UAS which receives the requests and process that requests to create response. 

The system has to be developed in the Linux 2.6 kernel operating system, ANSIC, GCC compiler, GDB debugging tool. The hardware requirements are  2 personal computers, 512 MB RAM, CPU with 2.2 GHz or above, LAN connection.

Download  Design and Implementation of Sip for Multistreaming Applications Project Report .

Practical Training Report on Basic Networking and Microsoft Windows Server

Introduction to Basic Networking and Microsoft Windows Server Project:

Basic networking is a concept which is based on the internet and also in the use of computer technology too. It is also based on the local development which is one of the main parts of the networking concept. In this basic networking user accomplish many authoritative terms by which they can work in a proper way. Here each and every single provides us the information about the authoritative power and the authentication modes.

Basically networks are the accumulation of each single personal computer by a part of networking devices. These accumulations later then work as the abundant networks. These networks are then connected to the computers by a device called as HUB which normally hosts the servers. Internet work has a concept called as Router which is used to join the server networks together to share the data from one computer to another. Packet switching, packet filtering, communication and path choice are the functions that a router can perform.

Another topic is the Topology which is the updates which are made to the material layout of the systems. There are various types of topology and some of them are Single node topology which is always joined with the servers, Bu8s topology which is joined to a common tabled which is named as trunk. Ring topology is which where all networks and devices are associated in a closed loop. Star topology is which every single device is associated with the HUB. Mesh topology is which every device is associated to the other devices.

Networks play an important role in this concepts and LAN, VAN, VPN San are the various types of networks. Layered approach is the part of OSI model which contains application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer are the sub types of reference layers. There are various other topics that are related to the basic networking which is written in detail in various reference books.

Download  Practical Training Report on Basic Networking and Microsoft Windows Server .

Airline Reservation System BCA Project Report

Introduction to Airline Reservation System BCA Project:

The title of the project is “Airline Reservation”. It is used to do reservation in flights through online by using internet. Previously, the existing system is done by manually and not generated immediate and updated results. I.e., if any person wants to do reservation, he/she have to travel certain distance and does the work manually before 2weeks. So they waste their time and money and even not get immediate results. If any information is missing, they can’t get reservation. It is very lengthy process and not secure. So we should provide a new technique. In which these mistakes are not done by us and not to waste anything.

                         Airline reservation system has two parts, which are exercise reservation platform (ERP) and management platform. ERP faces only passengers. To avoid these types of shortcuts we provided a new software, which is not only user interface but also show the details of flights and time schedule all related information. It fulfills the passenger’s desire. Depending on the problem we have to study the feasibility study is nothing but testing the utility of feasibility and meet the user need and effective use of resources and checks the working ability of our propose system.

                         Feasibility study is 3-types, which are Technical feasibility (TF), Economic feasibility (EF) and Operational feasibility (OF). TF is used for both software and hardware existing computer system. These technical resources are sufficient for our system and determines whether. EF is used for economic position not to weigh budget. Consider only s/w and h/w, development and implementation. OF is used for according to user need we have to operate that way. h/w requirements are RAM-64MB, Hard disk and processer. s/w requirements are Microsoft visual basic6.0, MS Access2000, OS windows 98SE.

                          Advantage of this system has online electronic post office. So data is encrypted and performance is accuracy, high-effective, reservation and cancellation enquiry. Future enhancement is our system more reliable, reservation and cancellation enquiry, flight status, all these will be done through online by adding large-scale SQL server, advanced VISUAL BASIV and passengers will ask airline time  and enquiry. 

Download  Airline Reservation System BCA Project Report.