Event Management System Android App

The main purpose this Event management system android app is to provide best event management application with affordable price and time.

Users involved in this:

  • Admin
  • User
  • Organisation


User sends a request regarding an event with an estimated amount and the work to be done


organization if satisfied with the amt quoted accepts the request sent by the user and will be ready to do the event, if not satisfied will quote a better price and send it to the user who sent the request.

Before this the organization should be registered.


Organization registration will be handled by the admin. He/she can add or delete the organization list.

On the whole admin manages the organisation list.

Report Generating System Web Application

Project Abstract 

Title Of Project: Report Generating System (Web Application)

Introduction: This Report Generating System project is an In-house web application for Private or Government Research Organisations, where the Scholars, Research people would login with their credentials and fill their required form, Which would be stored in a local Database and a report would be generated which would give the summary of the form filled with their respective Name and Signature.

Project Analysis: This Web Application consists of the following modules

1. Login with respective credentials ( Using Microsoft’s Active Directory Technology for authenticating)
2. Form Filling Using HTML, CSS
3. Server Side Programming using JAVA, MySQL
4. Report Generating using HTML

Login with Respective Credentials Module:

In this Module we create a general login page and use Active Directory to authenticate credentials.
To be made using HTML5 forms and styled using CSS3

Form Filling Using HTML, CSS Module:

After Logging in, we will generate a home page giving options to 4 forms. Which after selecting will be directed to the form filling page (Independent). Here, different fields will be filled and would be directed to the Database (Using MySQL).

Server Side Programming using JAVA, MySQL Module:

Server Side Programming in JAVA to direct and forms to Database (Using MySQL) and fetch the Login credentials to generate a digital signature of the Scientist.

Report Generating using HTML Module:

Report has to be generated of all the information filled in the forms. Into another independent web page using JAVA and html.

Software Requirements :

Operating System : Linux/Windows/ MacOS
Technology : HTML, CSS, AD, JAVA, MySQL
Web Server : Tomcat 7
Database : Oracle 10g Express Edition
Software’s : JAVA, Microsoft AD

Hardware Requirements :

Hardware : P4 and above.
RAM : 1 GB

Online Examination System Project Report


The project mainly intends to provide the insight of the functionality and behavior of the Online Examination System. This project integrates computer and Internet technologies for the purpose of student assessment .It provides the options of the examinations available on the system according to the user privilege.

Based on the choice of the user, the system provides the questions related to that area. Mostly the questions are in the form of multiple-choice question, they can also be filling in the blanks, matching and essay questions. At the end of the questions, the user will be given the options to report or cancel the scores.

When a person enters the online test, a system will ask for login id and password. If the person is authorized, by simply giving his login id and password he will enter filling the registration field based on the privilege. If the user is new he has to register as a user by filling the registration details. While filling the details he has to take care on privilege. If the user is candidate, he has to take the privilege as “0”, operator as “1” and admin as “2”. Once these details are filled, the user will be provided with a login id. With this login id he can enter base on his privilege.

If the user is candidate, as soon as he submits the login id he enters in to the area section. There he can select the area depending on which he wants to take the test. As soon as he selects the area he will be ready to take the test.

Depending upon the area selected, questions the be displayed with four options and the candidate has to select the correct answer and proceed to the next question till the end of the test. Time is set for the test. Test should be completed within that time period. If he does not complete the test within the given time the test will be lost automatically.

After the test is completed, the candidate has the option to report or cancel his scores. If he wants the hardcopy of the score report he can take it.

If the user is administrator, as soon as he submits the login id he enters into the administration section where he has to handle both operator and candidate functions.

If the user is operator or administrator, as soon as he submits the login id he enters into the administration section. In this, he can change the information of the candidate, view the candidate result, status by simply giving the respective login and he can also modify or update question in any area.

Product goals:

  • The goals of this Online Examination System are:
  • To automate the testing activity. The system will function with a centralized control over all the units that are involved in the online test system.
  • Provide data security from unauthorized users.


when the user is operator or administrator opt for operator section the process will direct to the above screen.This screen can get the user to user edit, candidate view ,current examinees ,exam report ,areas report screens on clicking the corresponding link.

The candidate on starting the test comes to this screen; here according to the selected area the questions are generated automatically from the data basest candidate has to select the correct answer by clicking the radio button corresponding the question. He can stop the test by clicking the stop button else go to the next question.

The above screen is the start of the test, in which the user should validate his/her login id and password by clicking submit button, after entering their identity. New users can register their information’s by clicking register button.

This screen is used when the user is not registered. It is used for registering the new users by entering their personal information’s and then by clicking on save button.

When a user wants to view candidate details he can get this screen by clicking the link of candidate view in the operator section. This screen gets the information of status, Name and login id of the desired candidate.

The current examiners screen gets the information of the login id name, status and date he/she appeared for the test for the specified candidate. On clicking the details the exam report is generated .We can get the copy of the details by clicking the copy.

Based on the privilege of the user, he is directed to the next screen. If he is a candidate the user comes to the above screen. In this he got to confirm the login id and should select the area where he is intending to take the test. The user can start taking the test by clicking the start button.

This question editor screens enable the user (admin/operator) to create and update the new question in the desired area and specified difficulty level. The user can also create a new question by clicking on the new question button.

This screen is used to display the details of the code and the related areas selected. This screen links the user to questions related to that area. Here the user can also create the new area by clicking new area button.
This screen is used to create a new area code and name of the area by mentioning them in the specified text boxes and then clicking on the save button.

The candidate on starting the test comes to this screen; here according to the selected area the questions are generated automatically from the database. The candidate has to select the correct answer by checking the radio button corresponding the question. On clicking the ok button. The answer he opted is stored in the data store and the next question is generated .He can stop the test by clicking stop button. This happens to generate the exam report.

This screen enable the user to answer the numeric ability questions posted to him by clicking on the radio buttons which are given to choose the right answers .The user can also create a new question by clicking on a new question button .

This screen is viewed when the user types either wrong name or password in the given text box and the button back is used to move back to the login page to re enter the right login id and password.

The current examinees screen gets the information of the login id, name, status and date he appeared for the test for the specified candidate. . It also tells about the total number of questions and right answers given by the candidate.


The “Online Examination System” has been successfully completed. The goal of the system is achieved and problems are solved. Final reports are generated as per the specification of the client. The package is developed in a manner that it is user friendly and required help is provided at different levels.

The Online Examination project can be easily used in the process of decision making.


To modify the Online Examination System project to .Net platform to take the advantage of geographical remote area. By shifting the project to the Dot Net platform the project can be made into a Mobile Accessible Application by which the restrictions of the software & hardware requirements can be scaled down, which is not possible using ASP.

2) we can even apply the unique identity of the user by keeping certain formalities which must be answered by the user while entering the test (like the user need to answer again the questions which he did while registering himself for the test) the questions selected will be in random order from his personal data only (like the mole present on the user, etc …) so that we it may confirm that the user itself is writing the test .

3) we can even use the thumb mark of the users to confirm their identities .

4) We can even add the photos of the users in this to confirm the user Identity.
Thus by applying these steps we can make sure that the user itself is writing the exam not the others.

Online Course Portal for a Campus or Organization

The main aim of this Virtual Campus Management project is to provide a Online Course Portal for a Campus/ Organization :

Modules :

1. Administrator Module
2. Application Module – Student
3. Biometrics Based Authentication System.
4. Student Feedback System & Test Assessment Module.
5. Placement Co-ordination and Career Counselling

Module Description :

1) Administrator Module & Circular Automation :

In this module, the various different master tables to be created namely
a. Student Master
b. Faculty Master
c. Course Master.
d. Course Content Master
e. Questions & Answers Master etc are created.

The various attributes and specific characteristics of each master are created to accommodate the minute details pertaining to each entity.

The various functionalities like Addition, Deletion, Edit and Update Functionalities are
implemented to manage the master tables records.

The various Courses and Course Content are added in order facilitate the subsequent Modules.
The circular to be sent to all the different departments can be automated in this module.

The important notifications can be done typed in the pre-designed Text area and it is
Can be saved as per the date and Circular volume numbers. It can also be automated to
be sent to the various recipients.

2) Application Module – Student & Faculty :

In this module, I create the GUI for students and Faculties to apply for the course work and to for the Performance Testing Function. The Form and corresponding database design is created in such a way that the students can apply for the appropriate functionalities by using this Application modules. The Faculty can choose to opt for any course. With the choice of Course work not taken up the any other faculty , the faculty can apply for a definite course of his/her choice subjected to the approval of the Administator (H.O.D / Principal) .

3) Faculty Approval Module & Upload and Download Module for Course :

The Faculty who have applied for course have to be approved the concerned Administrative Personnel. This course selection process has to be authenticated by the administrator who will happen to be H.O.D or Principal who has the administrator login access to this authentication procedure. Once the approval is done that particular course is not available to be taken any other faculties.

The upload and download functionalities which facilitate faculties to upload the Course Contents required for a course and the subsequent process of downloading those content by the corresponding student are implemented in this module. We use specialized functionalities like File Upload Controls to implement file transfer between the Client and Server.

The corresponding Login for Students and Faculties are implemented and the database of the documents available for download are maintained.

4) Biometrics Based Authentication System :

In this module, the finger print recognition process is implemented to authenticate Online Testing process. Either JPEG or GIF files are used are the finger print image input data .User’s scanned finger print images are stored in the database. While key generation for DES algorithm this input finger print images used for key generation. Key will be generated for both existing and new users.

Key Generation Process

Des key for verifying users is generated using the given finger print image. The key is 56 bit binary information. These binary bits are generated using fingerprint images.

Interface for Student to prove his/her Identity :

A java swing based GUI interface is developed in this module. The user can select their electoral parties from this GUI, then they submit their acceptance. This information is forwarded to the voting encoding process module.

5) Student Feedback System & Test Assessment Module.

In this Course Portal the course that has been taken up by the student is tested for learning and retention of the concepts by implementing Testing and Assessment module. In this module the objective type question is given for performance evaluation by creating appropriate GUI to enable using mouse to navigate from one questions.
The evaluation methods gives scoring to the examinee depends on the number of answers that are correct and also based on the difficulty of the questions.
The Student Feedback on the Subject taught by the Course In charge is also provisioned to be posted in the Module. The suitable Text area control is used enabling the student to post his/her comments.

6.Placement Co-ordination and Career Counselling :

In this module, the links and information pertaining to the Company interview that are going to be conducted in and out of campus are updated regularly by the placement division. The various information of the companies and type of Placement procedures are noted down module. Also, separate pages for careers counseling and details pertaining the improvement for aptitude skills are updated.

Secure Data Transfer for Air Gap Networking


We mainly explain about the importance of data security while transmitting data on network. SECURE DATA TRANSFER is a .exe file which enables the employee of a particular organisation to encrypt and decrypt data for security purpose using AES algorithm.

The encryption and decryption methods of cryptography used in developing this system make the surety of the proposed system more efficient in securing the data from unauthorized access.

This project is based on a  new mechanism for data transfer over a secure network and through simplex transmission. We do so using simple embedded system technology.

Many government organizations which require high security and confidentiality of data use an intranet in order to prevent data leakage. This is often done by air gapping the system and physically isolating the hardware in order to prevent security attacks via the internet.

However, this can prove to be a hindrance when we are actually required to transmit some data to another device without the use of the internet.

Also, if our system needs upgradation of some software, there is inevitable use of the internet.

Because of this reason the databases and the systems become unfenced and vulnerable to malicious files. To prevent any hacking/misuse of the data and information, this particular technology is used.


It is a guaranteed one way network connection, which protects secrets and safeguard availability and integrity of critical assets.

It can be conveniently used by the government and its defense organizations, as it provides zero compromise on security. Security and confidentiality of informations is very vital, because of which more than often isolated networks or intra-networks are developed and used. But with this technology no such measures are required as it provides immediate protection, confidentiality and availability.


At present we normally send data by compressing large amount of data by adding security methods like password protection. There are many algorithms available in the market for finding passwords so we need effective algorithms.

Sending sensitive messages, documents and files over the internet, our information is directly open to interception by anyone using different hacking techniques.


Now a days when more and more sensitive information is stored on computers and transmitted over communication means, so we need to ensure information security and safety.

In Proposed system we are introducing the secure data transfer using Intranet(data is transfered with in organization) before it was existed for internet users.

We are implementing this through Air gap networking using AES algorithm (implemented to encrypt data) and MD5 algorithm( is a widely used hash function producing a 128-bit hash value) which is simple, easy to implement and provide high security.

We develop a facility where users who wish to use the platform register their credentials with our database.

When the user wants to login so as to encrypt or decrypt data, he does so by entering his username and password which are validated against the database.

The username and password are concatenated and then, the resulting string is passed to a hash function which generates a unique 160 bit hash code.

This is then truncated to 128-bits and the result is used as the key to our symmetric key cipher. In this system, we are using AES.

The file to be encrypted is zipped and then converted to cipher text.

This file can be transmitted or sent to any other system via serial transfer.

At the receivers end, the exact mechanism occurs, except, to decrypt the data. Received file is unzipped and then passed back to AES for decryption.

Requirement Analysis:

In such an environment, it is absolutely necessary that we create a mechanism in order to transfer data to and from two communication points, albeit securely.

Only authentic user must be able to access his or her documents and should enforce some kind of validation mechanism.

In order to achieve the above, we create a platform through which we can safely access our personal files and encrypt or decrypt as per our discretion.

Also, we must be able to safely send any type of file.


Essentially, we implement techniques such as hashing and message digest to provide security.

We make use of symmetric key cryptography in order to facilitate encryption.

We are also utilizing database validation in order to store records of authentic users.


Software Requirements :

  1. Operating System: Windows 7 or higher.
  2. Language: JAVA.
  3. Database: MySQL.

Hardware Requirements :

  • Processor: Intel Dual core and newer.
  • Hard Disk: 20GB.
  • RAM: 1GB.


In conclusion, this project is highly useful in order to transmit data through simplex or half duplex communication.

We avoid connection to any networks and hence maintain the integrity of the air gap network.

Any upgradation is done via serial-usb data transfer and thus we are completely isolating our network and protecting it from malicious data.

The confidentiality, integrity and authenticity of our data is maintained and data leakage or loss is avoided.