Telephone Number Enquiry System Project in Vb.Net

Telephone Number Enquiry System Project in Vb.Net is a simple mini project which covers features like telephone data entry, telephone search, store and search codes, configuration.

Telephone Number Enquiry System Project

Telephone Number Enquiry System Screens:

Search Screen 

With Help of this screen, You can search information about the stored Telephone information based on Telephone Number, Name of the Consumer, Address of the consumer, Class of the Consumer, City of the costumer, State of the consumer. 

When A Criteria is set, We are to Press SEARCH Button and the Results are shown in the Number and as a list in the Result Box. 

When SHOW ALL RECORDS Button Is pressed all the record in the repository is shown. 

When a record is selected and DELETE Button is pressed, the Selected record is confirmed for Deletion.

Search and Add Codes 

With Help of this screen, You can search information and Add information about the Codes and Station in the City. 

A Search Operation can also be done on the Stored Database By Pressing the SEARCH Button after writing the Search Criteria in the Search Section. 

SHOW ALL RECORDS Button Is Used for showing all the records in the Data base repository.

We can Also Delete  a selected Record By Pressing the DELETE button.By Pressing the ADD button we can add a new station name and a station record. 

By Pressing the RETURN Button, We Can return to the MAIN MENU SCREEN.

 There are no telephone billing information available in this screen. we can only search for numbers and codes.

User Management Screen

      Add User

      This screen provides the facility that a new user can be added on this screen and check if the a user with this name already exist. 

      Change Current User Password

      This screen provides the facility that the current user can change his password and after that he can continue with that password.

Splash Screen: 

This Screen appears when you started the system and it remain until all other part like screen and database is loaded in the memory. This screen shows the progress of the loading progress of the components of the software in the memory. This screen shows the name of the software and developer of the project.

B.Tech 2014-2015 Java & .Net Projects in Bulk

B.Tech JAVA Projects -2014-2015 (Selected Projects)

  1. Key – Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  2. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  3. A Hybrid Cloud Approach for Secure Authorized Deduplication
  4. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  5. Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data
  6. Supporting Privacy Protection in Personalized Web Search
  7. Security Evaluation of Pattern Classifiers under Attack
  8. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
  9. Efficient Authentication for Mobile and Pervasive Computing
  10. Friend book: A Semantic-based Friend Recommendation System for Social Networks
  11. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
  12. Secure Continuous Aggregation in Wireless Sensor Networks
  13. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
  14. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
  15. Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption
  16. Automatic Test Packet Generation
  17. A System for Denial-of-Ser vice Attack Detection Based on Multivar iate Correlation Analysis
  18. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  19. Trajectory Improves Data Delivery in Urban Vehicular Networks
  20. Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
  21. Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
  22. Privacy-Enhanced Web Service Composition
  23. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact
  24. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
  25. CLOUDQUAL A Quality Model for Cloud Services
  26. Multi-Core Embedded Wireless Sensor Networks Architecture and Applications
  27. Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
  28. Multicast Capacity in MANET with Infrastructure Support
  29. Efficient Data Collection for Large-Scale Mobile Monitoring Applications
  30. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks
  31. Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks
  32. Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery
  33. Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey
  34. The Design and Evaluation of An Information Sharing System for Human Networks
  35. Web Service Recommendation via Exploiting Location and QoS Information
  36. Congestion Aware Routing in Nonlinear Elastic Optical Networks
  37. Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs
  38. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
  39. Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
  40. Building Confidential And Efficient Query Services In The Cloud With RASP Data
  41. An Empirical Performance Evaluation of Relational Keyword Search Systems
  42. ITA Innocuous Topology Awareness
  43. Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network.

.NET Projects- 2014-15 ( Selected Projects)

  1. Optimized multicast routing algorithm based on tree structure in MANETs
  2. Security Analysis of Handover Key Management in 4G LTESAE Networks
  3. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication
  4. Key Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage
  5. An Empirical Performance Evaluation of Relational Keyword Search Systems
  6. Supporting Privacy Protection in Personalized Web Search
  7. Building Confidential And Efficient Query Services In The Cloud With RASP Data

 

DATA MINING – JAVA

  1. Facilitating Document Annotation Using Content and Querying Value
  2. An Empirical Performance Evaluation of Relational Keyword Search Techniques
  3. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups
  4. Keyword Query Routing
  5. Supporting Privacy Protection in Personalized Web Search
  6. Product Aspect Ranking and Its Applications
  7. Interpreting the Public Sentiment Variations on Twitter
  8. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
  9. An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds

Data Mining – .NET

  1. A Group Incremental Approach to Feature Selection Applying Rough Set Technique
  2. Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
  3. Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count  Approach
  4. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
  5. Fast nearest Neighbor Search with Keywords
  6. Efficient Prediction of Difficult Keyword Queries over Databases
  7. Web Service Recommendation via Exploiting Location and QoS Information (Data Mining with Networking)
  8. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data (Data Mining with Network Security)

NETWORKING – JAVA

  1. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
  2. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
  3. Exploiting Service Similarity for Privacy in Location-Based Search Queries
  4. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks
  5. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
  6. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
  7. Behavioral Malware Detection in Delay Tolerant Networks
  8. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
  9. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

NETWORKING – .NET

  1. LocaWard: A Security and Privacy Aware Location-Based Rewarding System
  2. Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads
  3. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (Networking)
  4. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

CLOUD COMPUTING – JAVA

  1. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  2. Modeling of Distributed File Systems for Practical Performance Analysis
  3. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
  4. A Hybrid Cloud Approach for Secure Authorized Deduplication
  5. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
  6. Secure Deduplication with Efficient and Reliable Convergent Key Management
  7. Transformation-Based Monetary Cost Optimizations for Workflows in the Cloud
  8. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
  9. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage (Cloud Java)

Cloud Computing – .NET

  1. A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers
  2. A UCONABC Resilient Authorization Evaluation for Cloud Computing
  3. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
  4. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  5. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
  6. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
  7. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
  8. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

Mobile Computing – JAVA

  1. Preserving Location Privacy in Geosocial Applications
  2. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
  3. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
  4. Cooperative Spectrum Sharing: A Contract-Based Approach

Dependable and Secure Computing  (Network Security) – JAVA

  1. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
  2. Bandwidth Distributed Denial of Service: Attacks and Defenses (Dependable and secure computing
  3. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
  4. On the Security of Trustee-Based Social Authentications
  5. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

Image Processing – JAVA

  1. Vector-Valued Image Processing by Parallel Level Sets
  2. Accelerated Learning-Based Interactive Image Segmentation Using Pairwise Constraints
  3. Large Discriminative Structured Set Prediction Modeling With Max-Margin Markov Network for Lossless Image Coding
  4. Image Reconstruction from Double Random Projection
  5. Saliency-Aware Video Compression
  6. Translation Invariant Directional Framelet Transform Combined With Gabor Filters for Image Denoising

S. No

All Project Titles

Year
Cloud Computing  
1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014
2 NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 2014
3 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation 2014
4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014
5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 2014
6 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014
7 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014
8 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. 2014
9 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
10 Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability 2014
11 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2014
12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers 2014
13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014
14 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2014
15 Towards Differential Query Services in Cost Efficient Clouds 2014
16 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 2014
17 A Hybrid Cloud Approach for Secure Authorized De duplication 2014
18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014
19 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage 2014
20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 2014
21 Consistency as a Service Auditing :Cloud Consistency 2014
22 A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks 2014
23 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 2014
24 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 2014
25 Secure kNN Query Processing in Un trusted Cloud Environments 2014
26 A Mechanism Design Approach to Resource Procurement in Cloud Computing 2014
27 A Secure Client Side De duplication Scheme in Cloud Storage Environments 2014
28 Balancing Performance Accuracy and Precision for Secure Cloud Transactions 2014
29 Performance and cost evaluation of an adaptive encryption architecture for cloud databases 2014
30 Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor 2014
   
  Network Security  
     
1  Behavioral Malware Detection in Delay Tolerant Networks 2014
2 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2014
3 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014
4 Building a Scalable System for Stealthy P2P-Botnet Detection 2014
5 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
6 Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption 2014
7 Bandwidth Distributed Denial of Service: Attacks and Defenses 2014
8 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 2014
9 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
10 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014
11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
12 PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes 2014
13 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
   
  Ad hoc Networks & VANET & MANET
   
1 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2014
2 STARS: A Statistical Traffic Pattern Discovery System for MANETs 2014
3 Trajectory Improves Data Delivery in Urban Vehicular Networks 2014
4 Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks 2014
5 VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014
6 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014
7 Multicast Capacity in MANET with Infrastructure Support 2014
8 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs 2014
9 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment 2014
10 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014
11 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2014
12 Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks 2014
13 Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs 2014
 
  Mobile Computing
 
1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
2 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
3 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
6 Preserving Location Privacy in Geo Social Applications 2014
7 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
8 Video Dissemination over Hybrid Cellular and Ad Hoc Networks 2014
 
  Wireless Sensor Networks
   
1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
2 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
3 A Survey of Intrusion Detection Systems in Wireless Sensor Networks 2014
4 QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks 2014
5 Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014
6 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2014
7 ALBAR Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks 2014
8 Secure Continuous Aggregation in Wireless Sensor Networks 2014
9 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. 2014
10 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014
11 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing 2014
12 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014
13 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks 2014
14 Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks 2014
15  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s Impact 2014
     
  Android Projects  
     
1 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
2 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
3 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring 2014
6 LocaWard A Security and Privacy Aware Location-Based Rewarding System 2014
7 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
8 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
9 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014
10 MOSES: Supporting and Enforcing Security Profiles on Smart phones 2014
11 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014
12 SOS A Distributed Mobile Q&A System Based on Social Networks 2014
13 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks 2014
14 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive 2014
16 Android College Campus 2014
 
  Data Mining  
     
1 Fast Nearest Neighbor Search with Keywords 2014
2 An Empirical Performance Evaluation of Relational Keyword Search Systems 2014
3 Facilitating Document Annotation using Content and Querying Value 2014
4 Supporting Privacy Protection in Personalized Web Search 2014
5 Secure Mining of Association Rules in Horizontally Distributed Databases 2014
6 Efficient Ranking on Entity Graphs with Personalized Relationships 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Privacy-Preserving and Content-Protecting Location Based Queries 2014
9 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
10 Security Evaluation of Pattern Classifiers under Attack 2014
11 LARS An Efficient and Scalable Location-Aware Recommender System 2014
12 Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014
13 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014
14 Efficient Instant-Fuzzy Search with Proximity Ranking 2014
15 Efficient Prediction of Difficult Keyword Queries over Databases 2014
16 Temporal Workload-Aware Replicated Partitioning for Social Networks 2014
17 Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 2014
18 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014
19 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2014
20 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2014
   
  Networking and Wireless Communication  
1 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks 2014
2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
3 Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks 2014
4 Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 2014
5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014
6 Automatic Test Packet Generation 2014
7 HALO: Hop-by-Hop Adaptive Link-State Optimal Routing 2014
8 A Two stage Deanonymization Attack Against Anonymized Social Networks 2014
9 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2014
   
  Image Processing and Multimedia  
     
1 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014
2 Click Prediction for Web Image Re ranking Using Multimodal Sparse Coding 2014
3 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014
4 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images 2014
5 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites 2014
6 Multi sensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics (Dot Net) 2014
7 Sharing Visual Secrets in Single Image Random Dot Stereograms (Dot Net) 2014
8 Feature Match: A General ANNF Estimation Technique and its Applications (Dot Net) 2014
   
  J2ME Mobile Based Projects
   
1 Adaptation of a virtual campus for mobile learning devices 2014
2 Bluetooth Mobile Based College Campus 2014
3 ECops via Handheld Mobile Devices 2014
4 Privacy-Conscious Location-Based Queries in Mobile Environments 2014
5 Ranking Model Adaptation for Domain-Specific Search 2014
6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2014
7 The Word in a nut shell : CONCISE RANGE QUERIES 2014
  Parallel and Distributed System
 
1 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
2 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014
3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014
4 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures 2014
5 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 2014
6 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014
9 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
10 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014
 

 

 

Insurance for Vehicles Project in Asp.Net

Insurance for Vehicles Project in Asp.Net is developed to automate existing manual procedure used in insurance companies. This application is use friendly and have many modules. 

FEASIBILITY STUDY

The proposed project Vehicle insurance company system is economical feasible due to following reasons:

  1. The manual system requires registers for holding records and consumes much time in searching the appropriate records while the new system will solve these problems.
  2. The efficiency of the company employees will increase with the automatic system.

This project will reduce the wastage of time and paper.

The future of the software is high. Reasons are:

 This software can be used by any vehicle insurance company by slight modification in this software.

 This software can be easily modified.

 This software can be used to keep the records of vehicle insurance company.

 This software is easy to upgrade by future requirements.

 LIMITATION
 This software is stand alone system.
 If user give wrong input. It process on wrong input, for example if user gives wrong customer name it save it.

CONCLUSION
This software is so simple to use. This software will help in daily transaction of data and manage easily. It decreases the errors and collection of paper-work, Increase the accuracy and consistency of system to save time and money. Any type of modification in future this software structure will easily handle.

For full project details with project report, source code in asp.net contact us.

CET Admission System Project in C#.Net with ASP & SQL

Project Profile

University allots Examination centers (As per Candidate’s preferences of examination centre provided in the Application Form) and Seat numbers to the Candidates and generates admit cards informing the seat number, centre and date and time. University publishes the Information of the Hall Tickets & Examination centers allotted on the admission website. The Candidate can print his/her Admit Card by visiting admission website.

CET Admission System Project

University publishes the CET result on admission web site on the stipulated date.

University generates merit list with Combined Score (Academic score + CET score) for admission quota and publishes it on the admission website as well as provides facility to the Candidate to print his/her Scorecard.

As per the data of number of seats available in the college the combined merit (Academic score + CET score) of the candidate, and the preferences given by the candidates in the Option form University allocates seats to the candidates and publishes the college wise candidates list on the admission website.

The Candidate can print his/her provisional Admission Letter by visiting admission website. System administrator adds different colleges with their Admission seat capacity,

also Exam centers list with its capacity along with its unique Id should be maintained. 

Features of the system :

  • Candidate can make enquiry about the CET.
  • Candidate can apply online for CET.
  • Candidate can give online CET Exam.
  • Results will be put on the website.
  • After getting results, Candidate can apply online for Admission.

The total Project can be divided into different sub-systems as follows : 

  1. Application Stage
  2. Pre-CET Stage (Admit Cards)
  3. Online Exam(OES)
  4. Post-CET Stage (Score Cards)
  5. Post-CET Stage (Option Form Filling)
  6. Admission Process
  7. General set-up system

Ajax Functionality Used In Project:

  1. In the Online CET Project, We used Calendar Control with Ajax Functionality in it.
  2. When you forgot your password then there is one Forgot password Page in that page Selected Question
  3. Brings City name into the City DropDownList, whenever user selects the particular State name from the State DropDownList.

TOOLS:- 

C#.NET:-

C- Sharp is used as Front-End Tool. C- Sharp is a general user Interface Programming Language. Programming in C- Sharp is much simple and understandable compared to other programming languages. Even if some error in software remains uncovered, other S/W Professionals can easily handle errors.

MS-SQL :-

MS-SQL is used as Back-End Tool.

Microsoft Word :-

Word is used for basic purpose of writing Help Files because it offers great new ways to polish the formatting in document. 

PLATFORM:- 

Windows XP :-

Windows XP is more convenient and easier to use. All the tools mentioned above works better under Windows compared to other platform.

VALIDATIONS 

USER FORMS : 

Following forms have been validated, through ASP.NET validation controls in each & every fields. 

  • Confirmation Form
  • Forgot Password Form
  • Change Password Form
  • Admission Form
  • Hall Ticket Form
  • Show Detail Form
  • Show Detail1 Form
  • Login Form
  • Signup Form
  • Status Form 

ADMIN FORMS :

DATA DICTIONARY

TBL_CANDIDATE_INFO

This table is used to store candidate personal information, qualification and DD Details.

Primary Key: Candidate_ID

Field_Name Data_Type Size Description
Candidate_ID nvarchar 10 This will be the Id of the candidate & the primary key of the table.
First_Name nvarchar 40 First name of the candidate.
Middle_Name nvarchar 40 Middle name of the candidate.
Last_Name nvarchar 40 Last name of the candidate.
Address_1 nvarchar MAX Address1 of the candidate.
Address_2 nvarchar MAX Address2 of the candidate.
Address_3 nvarchar MAX Address3 of the candidate.
Gender Nvarchar 6 Sex of the candidate.
City nvarchar 30 City of the candidate.
State nvarchar 10 State of the candidate.
Pincode numeric 6 Pincode of the city.
Country nvarchar 20 Country of the candidate.
Nationality nvarchar 20 Nationality of the candidate.
Birthdate smalldatetime Birthdate of the candidate.
Age int Age of the candidate.
STD_Code Int STD code of the Candidate’s Phone no.
Phone_No Numeric 10 Phone number of the Candidate
Mobile_No Numeric 10 Mobile number of the Candidate
Email_ID nvarchar 50 Email id of the candidate.
SSC_percentage numeric 4,2 SSC percentage of the candidate.
SSC_year numeric 4 SSC passing year of the candidate.
SSC_board nvarchar 50 Education board from where the candidate passed SSC.
HSC_percentage numeric 4,2 HSC percentage of the candidate.
HSC_year numeric 4 HSC passing year of the candidate.
HSC_board nvarchar 50 Education board from where the candidate passed HSC.
Graduation_Degree nvarchar 10 Graduation Degree of Candidate.
Graduation_percentage numeric 4,2 Graduation percentage of the candidate.
Graduation_year numeric 4 Graduation passing year of the candidate.
University nvarchar 50 University from where the candidate completed Graduation.
Choice_of_center1 nvarchar 30 Examination Centre1 of choice for the candidate.
Choice_of_center2 nvarchar 30 Examination Centre2 of choice for the candidate.
Choice_of_center3 nvarchar 30 Examination Centre3 of choice for the candidate.
DD_no numeric 10 Demand Draft number issued to the candidate.
MICR_Code Numeric 10 MICR_Code of the DD issued to the Candidate.
DD_Date Smalldatetime Date of the issued DD.
DD_Received bit It shows the status, whether DD is received or not.
Amount Int Amount of the DD paid by the candidate.
Bank_Code nvarchar 10 Bank name which draw the DD.
Branch_Code numeric 10 Branch code of the drawee bank.
Batch_year numeric 4 Batch year for which the candidate is applying.
HallTicket Nvarchar 10 Hall Ticket no. of candidate will be stored.
Seatno Nvarchar 3 Seat no. of the candidate will be stored.
ExamCenter_Id Nvarchar 10 Exam center Id will be stored.

 

TBL_CENTER_COLLEGE

This table is used to store details of the entire examination center.

Primary Key: College_ID

Foreign Key: Center_ID

Field Name Data Type Length Description
Center_Id nvarchar 10 This Column is used to store CenterID which works as a Foreign Key.
College_Id nvarchar 10 This Column is used to store CollegeID which is Unique.
College_Name nvarchar 30 This Column is used to store Center Name.
Address_1 nvarchar MAX This Column is used to store Address.
Address_2 nvarchar MAX This Column is used to store Address.
State_Id nvarchar 10 This Column is used to store State.
Pincode nvarchar 6 This Column is used to store State’s Pincode No.
Course_Id nvarchar 10

 

TBL_GRADUATION

This table is used to store all the graduation’s degree name.

Primary Key: Graduation_ID

Field Name Data Type Length Description
Graduation_Id Nvarchar 10 This Column is used to store GraduationID which is Unique.
Graduation_Name Nvarchar 50 This Column is used to store Graduation Name.

 

TBL_BANK

 

This table is used to store Bank name for DD Details.

Primary Key: – Bank_ID

 

Field Name Data Type Length Description
Bank_Id Nvarchar 10 This Column is used to store BankID which is Unique.
Bank_Name Nvarchar 50 This Column is used to store Bank Name.

 

TBL_COURSE 

This table is used to store courses offered by the colleges.

Primary Key: – Course_ID

Field Name Data Type Length Description
Course_Id Nvarchar 10 This Column is used to store CourseID which is Unique.
Course_Name Nvarchar 50 This Column is used to store Course Name.

 

TBL_STATE 

This table is used to store states.

Primary Key: – State_ID

Field_Name Data_Type Size Description
State_Id Nvarchar 10 It is used to store State Id.
State_Name Nvarchar 30 It is used to store State Name.

 

TBL_EXAMCITYCENTER 

This table is used to all the examination center of any city.

Primary Key: – ExamCenter_ID

Foreign Key: – ExamCity_Id

Field_Name Data_Type Size Description
ExamCity_Id Nvarchar 10 It is used to store city Id.
ExamCenter_Id Nvarchar 10 It is used to store Exam Center Id.
ExamCenter_Name Nvarchar 30 It is used to store Exam Center Name.
Address Nvarchar MAX It is used to store Exam Address.
Phone_no Nvarchar 20 It is used to Phone No.
TotalSeat Int
AllotedSeat Int

TBL_USERS 

This table is used to store Login related information. Candidate ID will be used as user name.

Foreign Key: – Candidate_ID 

Field_Name Data_Type Size Description
Candidate_ID Nvarchar 10 This Column is used to store UserID of the user which is Unique.
Password Nvarchar 30 Password will be stored in the Encrypted Form.
SecQue Nvarchar MAX Security question will be stored.
SecAns Nvarchar MAX Security Answer will be stored.
Type Nvarchar 20 Type of the user will be stored whether He is administrator or User.

 

TBL_EXAMMASTER 

This table is used to store all the exams which are available in this system.

Primary Key: – Exam_ID 

Field_Name Data_Type Size Description
Exam_ID Nvarchar 10 This Column is used to store ExamID of the Exam which is Unique.
Exam_Name Nvarchar 30 This Column is used to store Exam Name.
Totalque Int This Column is used to store total no. of question related with the exam.
Timing Numeric 5,2 This column will be having value of allotted time for the exam.
Total_Marks Int It shows the total marks of the examination.
QueSet Int Question that will appear in the exam. Question will be selected randomly from the question paper Entity.

  

TBL_USERRESULT

This table is used to store information about the various exams given by the user, status of the exam (whether user has completed it or not) and his marks.

Foreign Key: – Candidate_ID and Exam_ID 

Field_Name Data_Type Size Description
Candidate_ID Nvarchar 10 This Column is used to store UserID of the user which works as a Foreign Key.
Exam_ID Nvarchar 10 This Column works as a Foreign Key and used to store the exams given by the user.
Status Bit This column shows that whether user has completed the exam or not. If It is set to 1 that means exam is completed by user.
MarksScored Int Marks Scored by the user.

 

TBL_CITY

This table is used to all the city of examination center.

Primary Key: – City_ID

Foreign Key: – State_Id

Field_Name Data_Type Size Description
City_Id Nvarchar 10 It is used to store city Id.
City_Name Nvarchar 30 It is used to store city Name.
State_Id Nvarchar 10 It is used to store State Id.

 Following forms have been validated, through ASP.NET validation controls in each & every fields. 

  • Login Form
  • Admit Center Form
  • Candidate DD Form
  • Candidate Result Form
  • Bank Form
  • City Form
  • State Form
  • College Form
  • Course Form
  • Exam Center Form
  • Graduation Form
  • Hall Ticket Form
  • Candidate Information 

NOTE : More information about validation you can find in TEST CASES sheet.

Tour and Travels Web Application in ASP.Net with C# & SQL

ABSTRACT

This site is used to provide the information to all the people who love to travel and wants to explore the beauties of the nature and wants to see the manmade monuments. Being armed with the right information about the places to visit, the facilities over the places and the way to reach to that place.

The main aim of this system is to bridging the gap between the people from all over the world who wants to visit one of the India’s most popular hill station uttranchal and the agents providing the facilities and the hotels available over the tourist’s places.

Tours and Travels management System in asp and csharp

As internet now a days become the media, which is most commonly used by the person, so in this direction we have plane to facilitate the travelers, the agents, hotels and the guides to interact at the common place.

It is a forum where viewer, travel agents and manager of hotel can exchange information, quickly, effectively and inexpensively. At our site you can register hotels, search for a tourist place. It is a one stop where you get information about tourist place, travel agents, hotels and other things.

It can provide detail knowledge for tourism in a specialized manner and also provide a information in following manner like area wise, agent wise, hotel wise etc.

By using our website user can introduce the wastage of fairs in finding each and every station it provide centralized information of tourism places as well as provide strategically planning for travel.

OBJECTIVE:

To provide the information to travelers in searching for the information about the destination. We can access any type of information any time any way. At our site you can advertise for hotels, register the travel agents, visit sub places of tourist places and can get the information about relatively guides.

  1. To provide the details of all tourist places.
  2. Provide the tips for travelers.
  3. Providing the helps to hoteliers, agents and guides for registering on the site for the visitors to view them.
  4. To provide links for various travels and tourism sites.
  5. Act as a resource useful for all the persons involved in the process of tour and travels.

This project focus on exploring the functioning of “TOUR AND TRAVELS” site means exploring the information regarding the tourist places on internet and provide facilities to reach these places .This project contain the information about the distance, fares, places for visits and facilitate provided over there .

The user group of this project is

1. Administration department

2. Visitors section

3. Registration section.

4. Guide lines for travelers.

Different users may access different sections and information as per there requirement and under the area of their authentication.

This project is based on “WEB APPLICATION” by means of internet and is based on .NET platform as Front end tool (C#, ASP.NET) and a back End (MS-SQL SERVER). 

THEME OF THE PROJECT:

This project peeps deep in to the activities and functioning of the TOUR AND TRAVELS site .This project tries to make the process of information gathering on various tourist places quiet easily and interactively. Every visitor, hotel’s owner, travel agents, guides will feel quiet easy in accessing information and getting answers of their queries.

DATA STRUCTURE: 

TABLES USED DURING PROJECT: 

TABLE NAME:  Registration Table

DESCRIPTION:It will contain the detail of login admin.

Attribute Types        
Registration No Text
Booking Date Text
Special Package Text
Destination Text
Number of Days Text
Number of People Text
Vehicle Text
Phone Number Text
Total Expenditure Text

Conclusion:

The project has been able to achieve most of its objectives and features within the estimated schedules and quality features. We have to say that for sure that the project was really tough to put our skills to the worst possible test and it gives us immense satisfaction that we have come through successful. It helps us to develop a system, which is helpful in saving the time of a user.

Saving Scheme Management System Project

Saving Scheme Management System Project  is a perfect blend of software excellence and Saving Scheme domain knowledge. This project is developed in asp.net , this application is useful for managing monthly deposit schemes and savings.

Existing System:

                       In Existing Paint Color Adjustment Options are Not Added and Text Speech Options are not added. In this System included with existing paint options and Adjust Cons tract and soften clone options are added and some extra functions are added needs with client Requirement.

Limitations of existing system:

                In existing there was no absolute protection guarantee for stored data

 Proposed Saving Scheme Management System:

                     In this system we propose fulfill the requirements related with Paint with additional options are added such as bright ness adjustment and color adjustment. Speech Recognitions options are added it suitable with blind people. 

problem formulation

  1. User Login checking for authorization process. To avoid unauthorized person.

      2.      Applying Color Adjustment Function concept.

  1. Text Speech options are added using Microsoft Speech Object Library

FUTURE ENHANCEMENT

                        Now we applied only in Paint Options and Color Adjustment.  In future we can apply at any Mobile Supported Paint that is capturing file from Mobile and Mass Storage Devices and Transferring Images to Mobile and Remote Machines and any other Extra enhancement.

Multi Desktop Spying Project in Asp.Net

Multi desktop Spying Project in Asp.Net is a network based application useful for monitoring multiple users desktops from a single window. This application primarily useful for network administrator in companies.

Multi Desktop Spying

Multi desktop Spying Project Modules:

MODULES

  • Desktop capturing
  • Remote application execution
  • Remote system Lock
  • Monitor and control the remote computer
  • Import and Export RDP files. 

Desktop Capturing

The desktop image capturing module captures a remote system desktop upon request from the server/administrator. With the command from the server the client captures the desktop images by generating a print screen event. When the key press event is triggered the system captures the currently displayed information in the monitor and places it in the clipboard memory of the client system. Once the connection will be established the server can do all the activities in the client screen through the server system. They need not go the client system for any activities. 

The next event is to convert the image in the clipboard memory into a “.Bmp” file format. The converted bit map image is saved in a specified path. After the capturing and conversion of the image the file is transferred to the server system and then the file is displayed. 

Remote Application Execution

This module in the serer will display all the application which can be executed in the client system. But this information can be fetched only when the connection between the server and the client is established. The application along with the path in the client system is displayed and a corresponding command button is displayed. So the users or the administrator can press the command button to run the corresponding application in the client system. The software is designed to have three applications.

 Remote system Lock

With this module the administrator can connect to the client and check if the system is being used by nay user, this can done by capturing the desktop image of the client system. Once if the system is found to be idle and not used by any users then the administrator can lock the remote system from his system. The system lock process is achieved by calling a windows application programmers interface function.

.Net Application Projects using ASP.Net, C# and SQL Server

We have implemented Real Time Application projects in asp.net using C# and SQL server 2005 and 2008. Mainly these applications works like Web applications and Windows applications (Desktop applications). Academic Students can easily download and execute these projects on their system using guidelines and how to execute video file provided by us.

Students or users can send us their innovative ideas/requirements to implement in the real time manner.

Services we provide:

  • .Net Application project training (Offline and online).
  • Development of real time projects

.Net Application Projects 

  1. A new color filter array system for image acquisition
  2. A secured image watermarking system for image ownership
  3. A secured key based secret data sharing system in steganography
  4. A user-oriented image retrieval system
  5. Advanced patient management system
  6. Alert based monitoring of stock trading systems
  7. An efficient color image compression using wavelet based technique
  8. An efficient human facial expression recognition system
  9. Application layer blocker for preventing on cyber security
  10. Autonomous network reconfiguration system in WMM
  11. Biometric authentication using eye tracking and finger print authentication
  12. Bug tracking system
  13. Human expertise search engine
  14. Human motion tracking using live web camera
  15. Information leak detection and prevention
  16. Online art gallery
  17. Online budget analysis system
  18. Air port authority of India
  19. Scar global life insurance
  20. Pharmacy management system
  21. Travel desk management
  22. Social ethical aspect of data mining
  23. Multipurpose national RFID
  24. Organization work tracking analysis system
  25. Infrastructure management system
  26. Fuzzy data mining
  27. Expo management system
  28. Digital right management
  29. Citizen management system
  30. Agriculture system
  31. Interpretative key management
  32. Fivatech feature extraction
  33. Yard management system
  34. Sulekha classifieds website management system
  35. Spam filtering using mobile application
  36. Numerous remote system manager
  37. Web enabled estate mgmt system
  38. Human expertise search engine
  39. Online employees communication system
  40. Predicting missing items in shopping carts
  41. Human facial expression recognition
  42. Remote networking service group
  43. Online road transport authority
  44. Online warehouse management system
  45. Online vehicle services
  46. Courier service management system
  47. Web based library management system
  48. Integrated project management and controlling system
  49. Web based hospital management system
  50. Web based cargo manager
  51. Alert based monitoring of stock trading systems
  52. Online visa processing
  53. Spare parts management system
  54. Online e-learning
  55. Gas-agency management system
  56. E-community management system
  57. Bug Tracking system
  58. Premium customer information management
  59. Defect tracking system
  60. Corporate recruitment system(CRS)
  61. Distributed products automation
  62. Online survey manager
  63. TCPIP based process monitoring
  64. Access control system
  65. Enterprise resource information systems
  66. Mining information system
  67. Online trading system
  68. Textile management system
  69. Repository and search engine of a college
  70. Toll gate management system
  71. Voting Software
  72. Warehouse management system
  73. Work flow management system
  74. Steganography In Audio Files
  75. Image Compression and De-compression
  76. Marine Operations And Management System
  77. Multi-Lingual Website
  78. Citizen Card System
  79. Voyage Management
  80. Medical Image Compression
  81. Online Crime file Management
  82. Contract Labor Management System
  83. Data Leakage Detection
  84. Load Shedding In Mobile Systems With Mobiqual
  85. Publishing Search Logs
  86. Issue Tracker
  87. Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking
  88. Mindtech Bug And Component Systems
  89. Web Enabled Automated Manufacturing System
  90. Enterprise Fleet Management Syste
  91. Effective Audio Video Transfer Using Real Time Protocol
  92. Extended XML Tree Pattern Matching
  93. Multihoming Route Control
  94. VAS for Hand Held Device
  95. Personal Authentication Based On Iris Recognition
  96. Intranet Mailing System
  97. Mobile i Broker
  98. Mobiminder: Location Based Reminder on Mobiles
  99. Mobile Electronic Program Guide
  100. RITAS: Services For Randomized Intrusion Tolerance
  101. Resilient Online Coverage For Surveillance Applications
  102. Improving Utilization Of Infrastructure Clouds
  103. Stealthy Attacks In Wireless Ad Hoc Networks
  104. MultiAuctioneer Progressive Auction For Dynamic Spectrum Access
  105. Continuous Monitoring Of Distance-Based Range Queries
  106. Natural Image Segmentation Based On Tree Equipartition
  107. Card Management System
  108. Company Information Tracking System
  109. Credit Card Management System
  110. E -Crime File Management System
  111. Company Security Reporting System
  112. Data Delivery Properties of Human Contact Networks
  113. Design and Performance Analysis of Mobility Management
  114. Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries
  115. Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks
  116. Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing
  117. Ensuring Data Storage Security in Cloud Computing
  118. Fast Detection Of Mobile Replica Node Attacks
  119. Implementation and Validating Environmental and Health
  120. Inter Bank Fund Transfer in Distributed Network
  121. A Fault-Tolerant Token Based Atomic Broadcast Algorithm
  122. Real-Time Detection Of Clone Attacks
  123. Mobility Management Approaches for Mobile IP Networks
  124. Modeling and Detection of Camouflaging Worm
  125. Multiple Routing Configurations for Fast IP Network Recovery
  126. Noise Reduction By Fuzzy Image Filtering
  127. Nymble: Blocking Misbehaving Users in Anonymizing Networks
  128. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Network
  129. Ranking Spatial Data by Quality Preferences
  130. Remote PC Administration Using J2ME
  131. Script Identification Through Temporal Sequence Of The Strokes
  132. SPAF: Stateless FSA-based Packet Filters
  133. Staying Connected in a Mobile Healthcare System
  134. Twitter Client For Android Based Smart Phone
  135. Virtual Router Using Destination-Sequenced Distance Vector
  136. IT Project and Process Management
  137. Minimum Bandwidth Reservations For Periodic Streams In Wireless Real Time Systems
  138. Mobile Sampling of Sensor Field Data
  139. Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
  140. Online Real Estate Property Management
  141. Online Recruitment System
  142. Online Rental House Web Portal
  143. Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks
  144. Automation Of Analysis And Development Management
  145. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficient
  146. SMS Based Mobile Banking with Security
  147. Adaptive Location-Oriented Content Delivery In Delay-Sensitive Pervasive Applications
  148. Control Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs
  149. Autonomous Deployment Of Heterogeneous Mobile Sensors
  150. Cooperative Clustering Protocol For Energy Saving Of Mobile Devices
  151. Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh Networks
  152. Effective Scheduling In Infrastructure-Based Cognitive Radio Networks
  153. Cross-Layer Optimization For Multimedia Transport Over Multicode CDMA Networks
  154. Efficient Location Training Protocols For Heterogeneous Sensor And Actor Networks
  155. Dynamic Time Slot Partitioning For Multimedia Transmission In Two-Hop Cellular Networks

.Net Mini Projects for BCA, MCA and BTech

.Net Projects (Non-IEEE, Web Based, Window Based)

.Net Application Projects List

  1. Online Rental System
  2. Course Finder And Allocation Management Tool
  3. Load Balancing Strategies
  4. Web Enabled Estate Management System
  5. A Wavelet-Laplace Variation Technique
  6. Traveler Info System
  7. Web based Cargo Manager
  8. Defect Tracking System
  9. Distance Learning System
  10. Education Loans
  11. Human Resource Management System project
  12. Insurance Management System
  13. Online Art Gallery
  14. Online E Learning
  15. Online Examination
  16. Online Visa Processing
  17. Repository and Search Engine of a College
  18. Survey Manager
  19. Voting Software
  20. Content Based Image Retrieval System
  21. Addiction Recovery
  22. Airline Reservation System
  23. Asset Management System
  24. Automatic E-Card Forwarding
  25. Background Verification System
  26. Back To My Village
  27. Chemical Management System
  28. College Info
  29. Crime Detection Using Face Recognition
  30. Data Secure Encryption System
  31. E_Former
  32. E-Certificate
  33. E-Learning
  34. Electrical Database Maintenance
  35. E-Payroll
  36. E-Post office System
  37. E-Scholarship
  38. Fin Corp-Cash Controller
  39. Franchisee Management System
  40. Gram Panchayat Management System
  41. HRMS Resource Planning
  42. Information Portal
  43. instant interact New
  44. Intranet Communication
  45. Live Meeting Mailing System
  46. Digital Library
  47. Distributed Computing For E-Learning
  48. Digital School Management System
  49. Financial Forecast System
  50. TV Broadcasting System (Window Application)
  51. Employee Monitoring System
  52. Web Based Mail Service
  53. Airline Reservation System
  54. TV Shows project
  55. Access a World of Information
  56. Remote Networking Service
  57. Matrimonial Application
  58. Steganography
  59. Health Care Management
  60. Online Recruitment Process New
  61. Multi User Contact Manager
  62. Net Banking
  63. Office Management System
  64. Online Auction
  65. Online Auction For Customs Products In Sea Ports
  66. Online Bidding
  67. Online Evaluation tool
  68. Online Service Pivot
  69. Online Shopping
  70. Online Test Center
  71. Online Vehicle Tracking
  72. Online Virtual Classes
  73. Online Air Ticketing System
  74. Online Blood Bank (Blood Camber Services)
  75. Online Selection
  76. Order Processing Order
  77. Patron Complaints Resolving System
  78. Project Scheduler System
  79. Property 4 Hyderabad
  80. Pub Maintenance System
  81. Radical Application Portal
  82. Reality Event Organization
  83. RTA Information System (RTA)
  84. Societal Informatics
  85. Soft Solutions
  86. Software Project Organization
  87. Student Halt Mart
  88. Super Market
  89. Task Tracker Arranger System
  90. Tax Assessment Services
  91. Tele Communication Services
  92. Time Login & Leave Management
  93. Vehicle & Health Insurance Policy Premium Calculator
  94. Venture Information System
  95. Warehouse Management System
  96. Web Enabled Estate
  97. Web Tourist Programming System
  98. Zeppelin Reservation System
  99. Universal Feed Reader
  100. Information Screen In Share Marketing
  101. Online Art Gallery
  102. Secure Multimedia Audio & Video Streaming
  103. Automated Mobile Examination Results
  104. BSNL Office Management System
  105. Civil Registry
  106. Corporate Recruitment Management System
  107. Trading Partners Collaboration (Consulting Website)
  108. E Postal Services Network
  109. E2M Conference
  110. E-Cops (Online Crime Reporting)
  111. E Mobile Shop
  112. E-School Management System
  113. Friends Adda Social Networking Site
  114. Geo Spatial InfoTech Solutions
  115. H1B Visa Processing System
  116. Insurance Agent Management System
  117. Integral Construction Portal
  118. Knowledge Management System
  119. Knowledge Process Outsourcing
  120. Lead to Reed Transformation system
  121. Loss Control System (LCS) for Insurance Producers
  122. Prison Management System
  123. Mobile Payment System
  124. Online Auction
  125. Online Property Search
  126. Slow Orthogonal Frequency Division Multiplexing
  127. Speed Cash System
  128. Student Fee Management System
  129. Advanced Online Parking
  130. Web Mart Online Shopping Paradise
  131. My Club – Club Management System
  132. College Information System
  133. Cooking Recipe Portal
  134. Shopping Cart System
  135. Digital Portico
  136. DTC Packers & Movers
  137. E Commerce Mobile Shop
  138. Online Electronic Shop
  139. Expo Management System
  140. E Learning Solutions
  141. Kiosk Management System
  142. Online Learning – Learn Direct through E-Commerce System
  143. Online Art Gallery
  144. Online Bus Reservation
  145. Online Real Estate
  146. Online Social Networking
  147. Security for OSN User Walls by Blacklisting the Misbehaving Users
  148. Perfume Gallery
  149. Online Learning Center
  150. Inventory Management System
  151. Tours & Travels Website
  152. Extreme Sport – Online Store
  153. Store Management System
  154. E Banking
  155. Online Survey Creator
  156. Enterprise Project and Defect Tracking Tool
  157. AICTE Campaign System
  158. Web Based Digital Watermarking Screenshots
  159. Web Hosting System
  160. Online Learning System

Technologies used to implement These Projects are:

ASP.Net, C#.Net, ADO.Net, SQL Server.

Inventory Maintenance of Wedding card Organization

Inventory Maintenance of Wedding card Organization: 

  • The System is undertaken for the development of electronic maintenance of inventory of the organization who works as wholesale merchandise of wedding and varied types of cards.
  • The information related to enterprise such as transportation details, sales details, purchase details, dealers details, are maintained manually on paperwork. It becomes overhead for the entrepreneur of organization to maintain this entire task manually and to generate report & analysis of any activity on demand.
  • So the demand for electronically maintaining this all task under single head had gave rise to the development of this system.

The process of organizational workflow goes in following way:-

  • Transportation Company provides the goods to the proprietor of the organization, sent by the manufacturers.
  • The organization keeps details of transportation.
  • The parcels are kept in the go down where the details of inward goods are maintained.
  • The details of inward goods are maintained by organization from the bill (invoice) from dealers/manufacturers.
  • The single invoice contains details for more than one item.
  • The organization after recording the details of inward invoice assigns a unique identification to each card/ product and also the sale price.
  • The organization sale this goods on retail and wholesale basis to their customers.
  • Customers of this organization are printing press firms and common people as it is wedding card organization.
  • Additionally the organization also maintains the current stock of organization by deducting sold stock from purchase stock.
  • Organization also maintains personal details of dealers and customers for their reference purpose.

Scope

As the system maintains the inventory of a commercial organization of sole proprietorship, its bound is up to the entrepreneur of the firm. The owner of the business maintains all the task of maintaining details about transportation, purchase, sales, stock and personal information of dealers and customer as well.

We can extend this system by portioning stock into two parts. I.e. stock on shop and stock in go down. And e-mail will automatically send to customer s about their purchases and dealers about the confirmation of receiving goods successfully.

Requirements:

  • The system should be able to maintain the personal information of dealer which includes :

Dealer name, firm name, address, city, state, contact no, e-mail ID (if any), category, and tin no

  • The system should be able to store the details of purchase which includes:

Dealer‘s firm name, product name, product type, quantity, price, payment mode, payment details.

  • The system should also be able to store the details of sales done by organization. The details include:

Customer name, date, product name, qty, price.

  • The system should also be able to maintain the stock of the organization by manipulating purchase and sales details.
  • Owner should be able to assign unique no to the product and sales price.
  • Owner must also be facilitate to store the transportation details which includes:

Receipt no, Dealer firm, transportation name, date, no of parcels, transportation cost.

  • The entrepreneur must also be facilitate to make the post payment to the dealers and should be able to maintain details of it like dealer name, amt paid, date of payment, mode of payment, payment details. 
  • Owner must be able to store personal details of customers. Which include:

Name, address, city, state, contact no, email ID (if any), tin no (if he is wholesale customer).

  • And last but never the least, the owner must be able to edit and delete the existing details. This includes:

Transportation  details.

Personal details of dealers as well as customers.

Purchase information (If any, due to wrong entry of data.)

Sales information (If any, due to wrong entry of data.)

Details of product (unique on and sale price).

Output Screens Below:

  • Login Section
  • Inventory Maintenance Login System
  • Validation Page
  • Add Transportation Details
  • View-Edit  Transportation Details:
  • Add Dealers details
  • View-edit Dealer
  • Add Purchase Details
  • Add more purchase details
  • View Purchase Details
  • Assign list of numbers to be assigned
  • Assign Numbers and sale price
  • View Assigned Numbers
  • Add New Customer
  • View Customer details
  • Generate Sales Invoice
  • View Sales Details
  • View Total Stock
  • View Sold Stock
  • Current Stock
  • Do Payment to Dealer

Transportation Details Source Code below:

[php]

Transportation Details.aspx.cs
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;

public partial class TransportDetails : System.Web.UI.Page
{
//string dlrid;
public string name;
public string id;
public void clear()
{
txtrrno.Text = "";
txttransname.Text = "";
txttransdate.Text = "";
txtnop.Text = "";
txttranscost.Text = "";

}
protected void Page_Load(object sender, EventArgs e)
{
name = Session["name"].ToString();
id = Session["id"].ToString();
TextBox1.Text = "Welcome," + name;

}
protected void btnstore_Click(object sender, EventArgs e)
{

Dealers dls = new Dealers();
DataSet ds = dls.getDealerNames(ddldlrfirm.SelectedItem.Text);
string dlrid = ds.Tables[0].Rows[0][0].ToString();
Transport trans = new Transport();

string userid = id;

try
{
trans.insertTransportDetails(Convert.ToInt32(txtrrno.Text), dlrid, userid, txttransname.Text, txttransdate.Text, Convert.ToInt32(txtnop.Text), Convert.ToInt32(txttranscost.Text));
Response.Redirect("ViewTransportationDetails.aspx");
}

catch (Exception ex)
{
// Response .Write (ex.Message );
TextBox1.Text = "Error in Recording.!!";
}
}

protected void ddldlrfirm_SelectedIndexChanged(object sender, EventArgs e)
{
ddldlrfirm.Focus();
}
}

[/php]

Contact us for more details about this project.