Implementation of Online Banking

The Banking system has now become online means we can perform our transactions, payments, account check on the internet. The Internet Banking now giving services to the people with in their home with the help of the Personal Computer system. We can pay our bills, check our account balance, put request transactions in between the different accounts.

The Internet Banking provides the facility to its customers to perform their financial transactions for the various purposes through a very protected and trusted website of the bank called virtual bank, and credit union, the building community. The Online Banking is now become the add on services of the Banks.  

Now days the limited facility of the old system has changed regarding transactions. The Internet Banking delivers its financial services to their customers that include the transactions, information regarding various plans by the Internet system at home.

The e- banking is still similar to the traditional banking system in payments, inquiry, information processing but the manner of transactions has been advanced and fast and reliable. The e- banking system has successfully achieved its target to go to its customer directly with their financial products and services which is focused on the customer.

The customer has become very much relied on the e- banking system as it gives flexibility for its customers in many ways. The success of the Internet banking can be defined on the basis of transaction security, accurate transaction, quick response, and high network speed. The research is based on the District Sivasagar banks branches. We have been interacted with the Branch Head, Chief Manager and Staff to collect information regarding the e- banking system.

Download  Implementation of Online Banking .

Case Study on Real Time Processing Sensor Network and Automotive Safety Application

Introduction to Case Study on Real Time Processing Sensor Network and Automotive Safety Application:

The very popular quote regarding safety is “Safety is cheap and effective insurance policy”. 

The automobile industry has become very conscious regarding safety. The very much experiment has been done for this area. The number of Processors has been developed to control the automobiles emergency systems. 

The world has been familiar with the various safety sensors consisting of the quick and accurate. These safety sensors are Microwave sensor system, Infrared light system, Laser system, Accelerometer for position detection. The above mentioned sensors have the safety applications like the Front and Rear warning, the lane detection warning system, automatic emergency braking. 

The Proposed safety system deals with the innovating and superb Image processing system that helps a person in skilled and efficient driving. 

The Lane Departure System possesses the high speed camera to take a snap shot of an image on the road at every regular intervals, the image is further transferred to the system for processing. The image goes for the detection called Edge Detection Technique that identifies the lane by the use of Sobel, Canny, and Prewitt edge detector. The Hough Transform further detects the lane and match with the existing vehicle or car situation. The Lane departure system hence keeps control and observation on the car. 

The innovating automotive safety systems are helpful to track the Lane and any incidents. Although the use of high speeds processors such as Blackfinn Processor enhance the use of application in real time system.

Download  Case Study on Real Time Processing Sensor Network and Automotive Safety Application.

Image Processing Project

PURPOSE 

The project is designed on the Graphical User Interface which is very useful as we can explore many features of the application software. The Program of this project is focused on the Abstract Windowing Toolkit or AWT for the benefit of multiple users. The installation of this program has to be done in JAVA 1.1 Runtime Environment. The system must support the Graphical Interface. 

The Existing System 

The existing system is made for the single operating system, also the many formats of the images are being not compatible to the system. The color settings also has to be depended on the system settings. The current system are made for the stand alone systems. 

The Proposed System

 The problem can be solved by the use of JAVA which support the system readable and simple manipulating code. 

The image processing algorithms needs more necessities like CPU cycles and the huge memory which is more demanding than any other computing program. The project here using the programming language JAVA that is high level and time consuming. But we can also use the other programming languages like C, C++, Haskell, The Ada, and Delphito make this project. 

SCOPE 

The processing is the basic process in any graphics, images and image editing work. The Proposed system is able to work on any system. The application of new image processing is able to edit the old images into the new kind of image. The image can be combined with the many applications and also web pages. The main feature of the project is that the image can be changed to other image or format which can be accessible by the other programmer and also the system.

Download  Image Processing Project .

Project Report on Image Processing in Java

Introduction to Image Processing in Java Project:

The System study deals with the initial stage of the software development during the primary investigation. The System study is done for the purpose to stabilize the needs of the attaining, developing and the installing of the system. The primary investigation concludes with the results of the study phase. The development of the system life cycle involves the study phase which includes the study of process of an image. There are many image editors available which are too expensive. We need to develop our own system to process and edit an image. 

The system study life cycle has the following steps.

  1. Primary investigation to systematically organize the necessicite.
  2. Feasibility of the development of the image.
  3. Evalution and analysis
  4. Design and Construction
  5. Development and testing
  6. Implementation and Application
  7. Application debugging 

The Proposed System 

The proposed system is developed to a system that support the designed system to edit an image. The Proposed system is called the “Image Processing Techniques”. The developed system is user oriented and all features are combined. The system has the options for the image editing and processing to display with effects in the menu bar. 

The features of the Proposed System 

  1. Easy to operate and user friendly
  2. Interactive
  3. Quick
  4. Reliable
  5. Fast
  6. 6.     Efficient and accurate
  7. Threat free 

The Proposed system is developed in the Processor Pentium IV, 256 MB RAM, 80 GB hard disk.

Download  Project Report on Image Processing in Java .

Practical Training Report on Basic Networking and Microsoft Windows Server

Introduction to Basic Networking and Microsoft Windows Server Project:

Basic networking is a concept which is based on the internet and also in the use of computer technology too. It is also based on the local development which is one of the main parts of the networking concept. In this basic networking user accomplish many authoritative terms by which they can work in a proper way. Here each and every single provides us the information about the authoritative power and the authentication modes.

Basically networks are the accumulation of each single personal computer by a part of networking devices. These accumulations later then work as the abundant networks. These networks are then connected to the computers by a device called as HUB which normally hosts the servers. Internet work has a concept called as Router which is used to join the server networks together to share the data from one computer to another. Packet switching, packet filtering, communication and path choice are the functions that a router can perform.

Another topic is the Topology which is the updates which are made to the material layout of the systems. There are various types of topology and some of them are Single node topology which is always joined with the servers, Bu8s topology which is joined to a common tabled which is named as trunk. Ring topology is which where all networks and devices are associated in a closed loop. Star topology is which every single device is associated with the HUB. Mesh topology is which every device is associated to the other devices.

Networks play an important role in this concepts and LAN, VAN, VPN San are the various types of networks. Layered approach is the part of OSI model which contains application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer are the sub types of reference layers. There are various other topics that are related to the basic networking which is written in detail in various reference books.

Download  Practical Training Report on Basic Networking and Microsoft Windows Server .

A Spy Based Approach for Intrusion Detection Project Report

Introduction to A Spy Based Approach for Intrusion Detection Project:

The current intrusion detection system (IDS) is able to protect the only host or bunch of the interlinked systems that are networked. The single host IDS is known as the Host- based intrusion detection system. The network host IDS is known as the Network- based intrusion detection system.

The both intrusion detection system has some defaults, like, the host based IDS has demerit of the inability of the detection to the new kinds of the threats in the system, whereas the Network based IDS is cumbersome to handle, which is not able to identify the encrypted packets of data. The Network based IDS creates the time consuming transfer of the log information and that causes the huge collection of the data and resulting in traffic. This concludes with the incorrect performance of the system. 

The Proposed Spy Based IDS has the merit over two IDS by combining the both single host and Network IDS enhancing the efficiency and creates the information transfer with no problem. 

Anomaly Intrusion Detection 

This kind of Intrusion Detection System keeps the information regarding the use of the system and prepares the statistical data for it. This checks the unusual action which can be intrusions. 

Misuse Intrusion Detection 

The IDS can identify the only know intrusion type. This is not able to detect the new type of Intrusion. 

Features of the Spy Based Intrusion Detection System 

  1. Regulator of the system
  2. Honeypots
  3. Possesses network sensor
  4. Spy type
  5. Log
  6. Tracer

HRM Database Management System Java Project Report

Introduction to HRM Database Management System Java Project:

The Project is to create software for the Manager to record the information related to their Personnel and structure in an organization. This application has all terms and its meanings related with all stages of the system in an organization, their wages and salaries according to the category in the system, and complete employee database that works in different departments in above mentioned areas. This includes the Database administrator to access and update the information of the employees. This updating and accessibility is only by the authorized person. An authorized person can edit, update and

Add the information of the employees. The personnel and the administrator can communicate each other. 

The user can access the data or information and edit and get the information without any problem. The system is user interface oriented. The information is secured from an unauthorized person access and the information needed for any inquiry is easy, fast and efficient. 

The aim of the Project is following.

  1. To develop a systematic structure of the organization according to its position and its updating.
  2. To search for the employees, departments, and other information according to department wise, level, and required information.
  3. To keep contact between the administrator and the employee.
  4. Simple handling of the database with important features. 

The system developed for the Windows 2000/XP/vista by applying the Java Net Beans for the front end, Oracle SQL for the rear end. The design tool used is UML. 

The system needs hardware specification x86 compatible processor, 512 MB RAM, 20 GB hard disk. 

Download  HRM Database Management System Java Project Report .

Hotel Nextgen Java Project Abstract

Introduction to Hotel Nextgen Java Project:

The Hotel Nextgen is the software application solution for the Hotel and their associates to perform their work in an easier manner as following:

  1. To maintain Master Data of the Hotel and its Places.
  2. To maintain Master Data of the particular Hotel room or suite Inventory and accounts.
  3. To maintain the Master Data every room needs.
  4. To maintain the seasonal/festival/yearly Tariffs.

The Existing System

  1. The existing system does not able to secure the data as required and the data may be lost due to mishandling.
  2. The existing system doesn’t have the provision to book or reserve the room or suite online for the customers.
  3. Similarly the existing system don’t provide the online status of the Hotel.
  4. The existing system is not able to give the vacant room details immediately.

The Proposed System

The new system gives the opportunity to the Hotel clients to maintain their regular actions in an automatic manner by using data integrating approach. The following functions are there for the users.

  1. To organize the hierarchy or systematic approach for the Hotel group and its associates Locations.
  2. To organize the inventory and account details of the facility of every room and suite.
  3. To organize the details and management of the facility such as Banquet Halls, the Brand stores, about Restaurants, the Coffee Shops, Wallet parking and many more functions.
  4. To organize the Associate Hotel locations and places along with every room facility and Hotel facility.
  5. To organize the Tariff plans for each Hotel.
  6. To create the important reports in Excel sheets.

Software Requirements for the Hotel Management System

Windows XP/2000 or Linux operating system.

HTML, CSS user interface.

JavaScript, JAVA Programming language.

JDBC, Servlets, JSP web applications, My Eclipse 6.0 IDE or Workbench.

Oracle 10g Database, Tomcat 5.x Server, Struts 1.x Framework.

Hardware Requirements for the Hotel Management system

Pentium IV processor, 40 GB hard disk, 512 MB RAM.

Download  Hotel Nextgen Java Project Abstract .

Dual Link Failure Resiliency through Backup Path Mutual Exclusion Abstract

Introduction to Dual Link Failure Resiliency through Backup Path Mutual Exclusion Project:

The main objective of this paper is to give idea of dual link failures. As usage of networks are increasing are day to day, we expect high transmission speed without any interruption. At present huge amount of information is being transferred in the networks and it is necessary to avoid any interruption due to failures.

The main reason why interruption occurs is due to dual link failures. These are important to solve because the links share resources, if there is any failure in shared resources this results in the failure of multiple links and the repair time for a failed link may be few hours or days and this is sufficient  for a second failure to occur. These dual link failures can be reduced by giving automatic backup path. By using this we can avoid dual link failures. This requires a hard disk of 40gb capacity, Ram of minimum 256mb,Processor with speed 3.0ghz and software’s like JDK, Java Swing and Sql 2000.

Brief into design and working:

The networks can be protected from link failures by path protection or link protection. By using path protection we can restore connection end to end by giving a backup path, back up path is given such that if the original path fails to work then this backup path comes into action.

Link protection is used to recover the signal by re-routing the connection at the place where the link is failed. When link protection is done to two failed links independently, then if they fail simultaneously these two links will not use each other in backup paths. This is called Backup link mutual exclusion. 

Download  Dual Link Failure Resiliency through Backup Path Mutual Exclusion Abstract.

Evacuation of Delayed Packets in Networks Java Project Report

Introduction to Evacuation of Delayed Packets in Networks Java Project:

The main objective of this paper is to give idea of delayed packets in networks. At present the networks which we are using supports only two classes of traffic, it takes long time to service if there is any failure. Hence to solve all these problems a OCGRR technology has been developed. This is the advanced version of OCRR technology. It requires a processor of 500MHZ and above, ram of 128 mb and hard disk of 10 gb size. It makes use of jdk 1.5, windows 2000 server family operating system and sql server databases. 

Brief into Evacuation of delayed packets in networks

In OCGRR, small rounds of a frame and a packet-by-packet are made used such that every stream inside a class can send only one packet in each small round. .In this packets of same class  are sent to the destination. Before frame is scheduled, each output port  data streams are stored in a separate Buffer .

Buffers are placed in frames such that each frame consists of only one buffer. Once Scheduling is done transmission traffic occurs and data is transferred according to their priorities. Only one packets are transmitted in one single round.

Advantages:

It minimizes delay, latency and jitter occurring in the network due to delaying of the packets. It can provide good bandwidth for the transmission of data packets. It reduces packet transmission time in the same stream. It can support multi class traffic which can increase the performance of the network.

Download  Evacuation of Delayed Packets in Networks Java Project Report .