Online Course Portal for a Campus or Organization

The main aim of this Virtual Campus Management project is to provide a Online Course Portal for a Campus/ Organization :

Modules :

1. Administrator Module
2. Application Module – Student
3. Biometrics Based Authentication System.
4. Student Feedback System & Test Assessment Module.
5. Placement Co-ordination and Career Counselling

Module Description :

1) Administrator Module & Circular Automation :

In this module, the various different master tables to be created namely
a. Student Master
b. Faculty Master
c. Course Master.
d. Course Content Master
e. Questions & Answers Master etc are created.

The various attributes and specific characteristics of each master are created to accommodate the minute details pertaining to each entity.

The various functionalities like Addition, Deletion, Edit and Update Functionalities are
implemented to manage the master tables records.

The various Courses and Course Content are added in order facilitate the subsequent Modules.
The circular to be sent to all the different departments can be automated in this module.

The important notifications can be done typed in the pre-designed Text area and it is
Can be saved as per the date and Circular volume numbers. It can also be automated to
be sent to the various recipients.

2) Application Module – Student & Faculty :

In this module, I create the GUI for students and Faculties to apply for the course work and to for the Performance Testing Function. The Form and corresponding database design is created in such a way that the students can apply for the appropriate functionalities by using this Application modules. The Faculty can choose to opt for any course. With the choice of Course work not taken up the any other faculty , the faculty can apply for a definite course of his/her choice subjected to the approval of the Administator (H.O.D / Principal) .

3) Faculty Approval Module & Upload and Download Module for Course :

The Faculty who have applied for course have to be approved the concerned Administrative Personnel. This course selection process has to be authenticated by the administrator who will happen to be H.O.D or Principal who has the administrator login access to this authentication procedure. Once the approval is done that particular course is not available to be taken any other faculties.

The upload and download functionalities which facilitate faculties to upload the Course Contents required for a course and the subsequent process of downloading those content by the corresponding student are implemented in this module. We use specialized functionalities like File Upload Controls to implement file transfer between the Client and Server.

The corresponding Login for Students and Faculties are implemented and the database of the documents available for download are maintained.

4) Biometrics Based Authentication System :

In this module, the finger print recognition process is implemented to authenticate Online Testing process. Either JPEG or GIF files are used are the finger print image input data .User’s scanned finger print images are stored in the database. While key generation for DES algorithm this input finger print images used for key generation. Key will be generated for both existing and new users.

Key Generation Process

Des key for verifying users is generated using the given finger print image. The key is 56 bit binary information. These binary bits are generated using fingerprint images.

Interface for Student to prove his/her Identity :

A java swing based GUI interface is developed in this module. The user can select their electoral parties from this GUI, then they submit their acceptance. This information is forwarded to the voting encoding process module.

5) Student Feedback System & Test Assessment Module.

In this Course Portal the course that has been taken up by the student is tested for learning and retention of the concepts by implementing Testing and Assessment module. In this module the objective type question is given for performance evaluation by creating appropriate GUI to enable using mouse to navigate from one questions.
The evaluation methods gives scoring to the examinee depends on the number of answers that are correct and also based on the difficulty of the questions.
The Student Feedback on the Subject taught by the Course In charge is also provisioned to be posted in the Module. The suitable Text area control is used enabling the student to post his/her comments.

6.Placement Co-ordination and Career Counselling :

In this module, the links and information pertaining to the Company interview that are going to be conducted in and out of campus are updated regularly by the placement division. The various information of the companies and type of Placement procedures are noted down module. Also, separate pages for careers counseling and details pertaining the improvement for aptitude skills are updated.

Secure Data Transfer for Air Gap Networking


We mainly explain about the importance of data security while transmitting data on network. SECURE DATA TRANSFER is a .exe file which enables the employee of a particular organisation to encrypt and decrypt data for security purpose using AES algorithm.

The encryption and decryption methods of cryptography used in developing this system make the surety of the proposed system more efficient in securing the data from unauthorized access.

This project is based on a  new mechanism for data transfer over a secure network and through simplex transmission. We do so using simple embedded system technology.

Many government organizations which require high security and confidentiality of data use an intranet in order to prevent data leakage. This is often done by air gapping the system and physically isolating the hardware in order to prevent security attacks via the internet.

However, this can prove to be a hindrance when we are actually required to transmit some data to another device without the use of the internet.

Also, if our system needs upgradation of some software, there is inevitable use of the internet.

Because of this reason the databases and the systems become unfenced and vulnerable to malicious files. To prevent any hacking/misuse of the data and information, this particular technology is used.


It is a guaranteed one way network connection, which protects secrets and safeguard availability and integrity of critical assets.

It can be conveniently used by the government and its defense organizations, as it provides zero compromise on security. Security and confidentiality of informations is very vital, because of which more than often isolated networks or intra-networks are developed and used. But with this technology no such measures are required as it provides immediate protection, confidentiality and availability.


At present we normally send data by compressing large amount of data by adding security methods like password protection. There are many algorithms available in the market for finding passwords so we need effective algorithms.

Sending sensitive messages, documents and files over the internet, our information is directly open to interception by anyone using different hacking techniques.


Now a days when more and more sensitive information is stored on computers and transmitted over communication means, so we need to ensure information security and safety.

In Proposed system we are introducing the secure data transfer using Intranet(data is transfered with in organization) before it was existed for internet users.

We are implementing this through Air gap networking using AES algorithm (implemented to encrypt data) and MD5 algorithm( is a widely used hash function producing a 128-bit hash value) which is simple, easy to implement and provide high security.

We develop a facility where users who wish to use the platform register their credentials with our database.

When the user wants to login so as to encrypt or decrypt data, he does so by entering his username and password which are validated against the database.

The username and password are concatenated and then, the resulting string is passed to a hash function which generates a unique 160 bit hash code.

This is then truncated to 128-bits and the result is used as the key to our symmetric key cipher. In this system, we are using AES.

The file to be encrypted is zipped and then converted to cipher text.

This file can be transmitted or sent to any other system via serial transfer.

At the receivers end, the exact mechanism occurs, except, to decrypt the data. Received file is unzipped and then passed back to AES for decryption.

Requirement Analysis:

In such an environment, it is absolutely necessary that we create a mechanism in order to transfer data to and from two communication points, albeit securely.

Only authentic user must be able to access his or her documents and should enforce some kind of validation mechanism.

In order to achieve the above, we create a platform through which we can safely access our personal files and encrypt or decrypt as per our discretion.

Also, we must be able to safely send any type of file.


Essentially, we implement techniques such as hashing and message digest to provide security.

We make use of symmetric key cryptography in order to facilitate encryption.

We are also utilizing database validation in order to store records of authentic users.


Software Requirements :

  1. Operating System: Windows 7 or higher.
  2. Language: JAVA.
  3. Database: MySQL.

Hardware Requirements :

  • Processor: Intel Dual core and newer.
  • Hard Disk: 20GB.
  • RAM: 1GB.


In conclusion, this project is highly useful in order to transmit data through simplex or half duplex communication.

We avoid connection to any networks and hence maintain the integrity of the air gap network.

Any upgradation is done via serial-usb data transfer and thus we are completely isolating our network and protecting it from malicious data.

The confidentiality, integrity and authenticity of our data is maintained and data leakage or loss is avoided.

Women’s Complaint Cell Project Abstract


Growing violence against women is a major area of concern for the women development agencies. In most of the cases victims are deprived of their legal rights and protections available in the law due to ignorance of legal procedures and apprehensions.

This Women’s Complaint Cell project aims to provide legal and  medical aid plus counseling to women victims of violence. Initially four complaint cells are being established for the appropriate and timely disposal of complaints and speedy access to justice by victims.

The Complaint  Cells will be equipped with legal advisors, sociologists and supporting staff. The cells will operate under the supervision of a Lady Provincial Consultant, who has the relevant experience of judicial procedures in the cases of violence against women.

To address the major issues of “Awareness” in the combat of violence against women, awareness raising seminars/workshops were conducted which were largely attended by the members of civil society, personnel of the law enforcement agencies and heads of district governments.

Job Satisfaction of the Employees Project


Job satisfaction of the employees is important if the employees are satisfied then only the organization can function smoothly increases its production, faces competition. If employees are satisfied with their job they will carry a positive attitude. Hence the study has been undertaken to assess the employee job satisfaction which is necessary for the organization in order to make sound decisions.


1. To understand the job satisfaction levels of employees at Heritage foods india ltd.
2. To study the training and development programs.
3. To analyze the factors that impacts on the job satisfaction levels of employees.


The job satisfaction refers to a person’s feeling of satisfaction on their job. It is different from person to person. The researcher has chosen to measure the level of job satisfaction in HERITAGE FOODS INDIA LIMITED.


• Population is the aggregate of objects animate and in animate, under study in any statistical investigation.
• The population for the study here was employees in Met life.


The sample size includes 100 employees who are working in the HERITAGE FOODS INDIA LTD.


The study is limited to the policies and practices being followed in HERITAGE FOODS LTD, get the complete data, in view of its classified nature of the organization.

  • Time factor is the main constraint for the study as it was restricted only to eightnine weeks.
  • Sampling error is not taken into consideration.
  • The information given by the sample frame is thought accurate by researcher.
  • As the method adopted is Random Sampling, result may not be accurate and believable.
  • As the sample size is 100, whole of the facts could not be collected.
  • The findings of the study are confined only to the question asked in the questionnaire and through personal interviews.

The study has been carried in HERITAGE FOODS INDIA LTD only.


  • Morality of the respondents doesn’t have freedom to take decisions. This shows centralization in structure
  • Employees feel that they are very important person in the deportment, which shows their level of commitment.
  • Employees in HERITAGE FOODS INDIA LTD can see themselves in a better position in near future which indicates the carrier growth on the company.
  • Company successful in providing good working conditions.
  • Megacity of the respondents feels that they are under paid.
  • Employees in the HERITAGE FOODS INDIA LTD have good relationship with their peers, superiors and sub-ordinates.
  • All most all the employees have positive attitude of the management towards security as employees feel highly secured in HERITAGE FOODS INDIA LTD.
  • Half of the Employees are not satisfied with the personal development.
  • Employees in HERITAGE FOODS INDIA LTD are satisfied with the company policies and procedures.
  • Employees in all dept are well planned while performing their activities.
  • On the whole employees in HERITAGE FOODS INDIA LTD have Job Satisfaction the contributing factors for their satisfaction are good relationship,
  • Working conditions, Company polices and other benefits.


  • As employees feel that they doesn’t have freedom to take decision Which affects job satisfaction adversely, employees should have Some degree of freedom decisions at their workplace.
  • Some employees have low level of commitment has they feel they are not much important in the dept they can explained how important there in the deportment.
  • Some of the employees felt that their skills are not utilized completely; proper measure can be taken job design and placement.
  • As more than half of the people not satisfy their personal development, company may provide carrier development programmers were people can achieve their
    personal and propositional goals.

Automatic Call-Answering Application Synopsis

In present scenario the mobile phone has become the integrated part of the life. No one wants to miss any call whatever he is doing. But sometimes you are forced not to use your mobile such as during driving.

During driving you got a call and just in front of you is traffic police, you at least want to receive the call and tell that you will call after few minutes or any message for specific person but you can’t .In this situation our application is going to help you.

You can record some audio in your phone using the voice recorder. When you get any call the application comes to know from which number the call has come and then according to the person it plays the relevant audio, i.e. you can record some three or four different audio files according your requirements. When any call comes it plays the relevant audio for that particular person.

You have to load the application sis file to the cell phone. It will continuously run in the background. The application will be in the running mode. The application continuously listens for the incoming calls. Whenever there is a call, it finds from which number the call has come and then it plays the audio.

Product Features

  • The application is running in the background.
  • You can start the application or close the application whenever you want.
  • The application works even when the SIM card is changed, i.e. it works for the mobile phone on which the sis file is installed.


  • Works only while the cell phone is ON.


Software Specification

The project requires the following software’s to compile and run:

  • For installing Symbian in our Computer we need to install Microsoft Visual C++ 6.0.
  • In addition to Symbian we need to install third party softwares, i.e. “jre1.3” and “perl”.
  • A Symbian Emulator.
  • The project has been developed using Symbian C++.
  • Any operating System like Windows-XP/2000/NT.
  • Symbian OS
  • Symbian toolkit
  • Symbian c++

Hardware Specification

Intel Pentium- 700MHz or an equivalent/higher processor:

  • 128MB RAM.
  • 600MB of Hard Disk space.
  • CD drives for software installation.
  • USB Bluetooth adapter for communication.
  • A Symbian OS enabled cell phone (Series 60 2nd edition cell phones like 6600, 7610, N72 etc.)
  • Another cell phone to make a call. This cell phone could have any OS in it.