Você está na página 1de 33

Mobile Synchronization Sync Easy

1. Introduction: Mobiles are becoming an inevitable part of modern society. People using mobiles to make calls, to send and read SMS, to store contact information, to store person files, photos, videos and music etc. Mobiles so became an important storage device with lot of personal and business related information and messages. The necessity of the information security is increased in this context. So a mobile backup mechanism is important for the people who think their mobile contents should be secured. 2. Challenge: Challenge is to create a mechanism to synchronize the mobile contents with the backup server online. The items need to be synchronized are incoming sms, contacts, videos, photos and music. This process should be made as simple as a click of a button. 3. Proposed Solution: Proposed solution is a Windows mobile client application which will allow users to simply click and upload the mobile contents to a personalized backup server online. Users will have an option to select the items which they dont want to take a backup. Application will show the last synchronized time and the necessity to do sync. Proposed solution also contains a web site to see the uploaded contents online and a web service to interact the web site and the windows mobile client application. 4. Technology: Technologies used are Microsoft .Net 2.0 Visual C# language ASP.Net 2.0 ASP.Net 2.0 web service SQL Server 2000

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Windows Mobile 5.0 pocket PC phone SDK Windows Mobile 5.0 pocket PC phone emulator Active Sync 5.0 or later

5. System Diagram:

6. Future enhancements: Mobile Sync can be developed further to restore the back up data to a new mobile in case if the users mobile lost or damaged. 7. Conclusion: Mobile backup mechanism may become an inbuilt feature for all mobiles in future. But unfortunately this option is not present now. The importance of Mobile Sync is increasing in this context.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Anti-Theft Library Organizer


ABSTRACT: Library management has been a big task these days in Software Company, where huge amount of book are managed for staff reference. There should be Software to track these book issue and return transactions, the application will also control book theft. The aim of this project is to deal with a RF Receiver through RS-232 conductor which association the interface between data processing and data communications equipment, and is widely used to connect microcomputers to peripheral devices. The data read from the RFID is received and forwarded to application by RF reader via RS232, the application will sort the information read and make it easy to analyze for the library manager, and he will work over the data for book issue or return and then save it to database. This application contains maximum software based and less hardware based, where hardwares like RFID, RS 232 and RF reader are meant for data communication and identification, the software part plays and pivotal role in this in managing the data communication. Retrieving data , analyze and then added to database during the time of issuing new books, on return of book database is accessed and made changes, the application is robust and user friendly where less control based operation is done. Where most of the data is automatically generated from RFID of employees and from RFID in book. This application acts perfectly between software and hardware, its prime job is to make the library management much easier and operating this application doesnt need any prior study. INTRODUCTION: In early days the library management was carried by manual ledger writing of issue and return, which has the drawback of wrong entry, book theft and many others to the

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

management, later library management was computerized, though it has its own bugs like time taking in issue and return of book as everything need data input.

To overcome all above said problem this project is developed, the project deals library application communicating and managing with a RF Receiver through RS-232 conductor which association the interface between data processing and data communications equipment, and is widely used to connect microcomputers to peripheral devices. The user of the library has to swipe the RFID in entry to read who are all, came into the library on taking a book the RFID Card shows the information of the person who takes the book, as RFID in the book gives information about the book to issued are returned through RF reader connected to system via RS232 is given the information to the application where it is analyzed by the library manager. The in charge person will then store it to database, the information contains the time the person who took book came in and what books he took ,what is the book name, how many days for returning the book in case of issue or how many days kept in terms of returning . We can also make the application to show some other useful information about the library as an optional one like show book shelf on giving book name and other useful info like book availability HARDWARE REQUIREMENTS: PROCESSOR RAM HARD DISK RESOLUTION : Pentium 4 : 512MB : 100MB : 1024 X 768

CONNECTIVITY : RF reader

SOFTWARE REQUIREMENTS: C#.NET(HARD-CODE) MS SQL OR XML

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Advantage: Day to day information is been stored in PC to check later. The outside people cannot enter in to this library with using this technology. Managing Library will become much easier and efficient way.

Disadvantage: If RF reader doesnt work application cant get input information.

Application: The Present software is very useful to the Library because it is a data collection technology that uses RF concept coupled with this application will make library management much easier in an efficient way. BLOCK DIAGRAM: Sender Side:

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

RFID Block Diagram Receiver Side:

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Cloud OS-Cloud Computing


1. Introduction: Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. 2. Overview: In this synopsis, the term cloud is used as a metaphor for the Internet, based on how the Internet is depicted in computer network diagrams and is an abstraction of the underlying infrastructure it conceals. A technical definition is "a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (ex: servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction." This definition states that clouds have five essential characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud computing customers do not generally own the physical infrastructure serving as host to the software platform in question. Instead, they avoid capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity) are consumed, while others bill on a subscription basis. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates, as servers are not unnecessarily left idle (which can reduce costs significantly while increasing the speed of application development).

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

A side effect of this approach is that overall computer usage rises dramatically, as customers do not have to engineer for peak load limits. Additionally, increased high-speed bandwidth" makes it possible to receive the same response times from centralized infrastructure at other sites. Ex: www.icloud.com The cloud OS which we are supporting will be having 1. File Explorer 2. Document create, Edit and save capabilities 3. User and log-in management 4. Image and media file management 5. Calculator and games etc 3. Technology: Technologies used are Microsoft .Net 2.0 Visual C# language ASP. Net 2.0 AJAX. Net SQL Server 2000

4. System Diagram:

A. System diagram

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

B. Cloud computing sample architecture 5. System Components: ASP. Net AJAX Cloud Platform This is a virtual OS on cloud, which will allow us to host different services and applications which will allow user to perform day to day life computing tasks. This platform is developed in ASP. Net AJAX technology which will allow asynchronous web requests to the server. SQL Server 2000 database This component allows to store all user related information and supply to the clients as per request. 6. Future enhancements: In future we can add more operating system capabilities to the cloud platform like a command prompt, document editing and save in all Microsoft supported document formats etc. 7. Conclusion: This cloud OS initiative will be a step stone to make more reliable, fast and scalable cloud platform development in future. Cloud computing will be the next big thing going to be on the internet world today. cloud

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Digital Image Tracing by Sequential Multiple Watermarking


Abstract:

The possibility of adding several watermarks to the same image would enable many interesting applications such as multimedia document tracing, data usage monitoring and multiple property management. In this paper, we present a novel watermarking scheme, which allows inserting and reliably detecting multiple watermarks sequentially embedded into a digital image. The proposed method, based on elementary linear algebra, is asymmetric, secure under projection attack and robust against distortion due to basic operations such as storage, transmission, and format conversion. Proposed system: The proposed method, based on elementary linear algebra, is asymmetric, involving a private key for embedding and a public key for detection. Its robustness against standard image degradation operations has been extensively tested and its security under projection attack has also been proven even though the envisaged applications refer to a collaborative environment, in which malicious attacks are not a critical aspect.

Existing System: The existing method, only done by a single water marking. That will not give that much security to image. Although some researchers focused on the viability of existing watermarking approaches for the insertion of multiple signatures, the development of specific techniques can provide much more effective results. The general problem of multiple digital watermarking has been the object of several investigations since the pioneering contribution. It is suggested that the insertion of multiple watermarks can be exploited to convey multiple sets of information. More recently, a multiple watermark-embedding procedure was proposed, which allows simultaneous insertions without requiring the key sets to be orthogonal to each other. Specific applications such as the already mentioned medical image management may even require the insertion of two different types of watermark, namely, a robust one for authentication purposes,

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

and a fragile one for data integrity control. This paradigm is often referred to as multipurpose watermarking.

Hardware Requirements: SYSTEM HARD DISK FLOPPY DRIVE MONITOR MOUSE RAM KEYBOARD : Pentium IV 2.4 GHz : 40 GB : 1.44 MB : 15 VGA colour : Logitech. : 256 MB : 110 keys enhanced.

Software Requirements: Operating system Front End Coding Language :- Windows XP Professional :- Microsoft Visual Studio .Net 2003 :- Visual C# .Net

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Location Based Reminder on Mobiles


1. Introduction: Reminders or alerts in existing system allows user to do some task at a particular time. Sometimes it is desirable that we get reminders based on the location. The proposed application allows user to set reminders based on location. 2. Overview:

Have you ever gone to the grocery store, only to find you forgot your list? Have you ever been at work, and thought of something you needed to do when you get home? Have you ever wished your to-do list would remind you based on your location?
The application Location Based Reminder solves all these problems. It offers below services: 1. Keep an ongoing list of things to buy next time you're at the grocery store 2. Tell you to take the trash to the street when you get home after work 3. Keep your life more organized with a location-based to-do list 4. Prompt you to purchase a birthday gift the next time you're near the mall 5. Tell you to deposit your paycheck next time you're near the bank 6. Remind you to call a client the next time you arrive at the office 7. Ability to save favorite locations for future use 8. Easy to use interface for quick and efficient navigation 9. Option to re-enable alerts from the past 3. Technology Technologies used are J2ME GPS

4. System Components Entire application is built using J2ME. GPS technology is used for getting location (longitude and latitude) of the user. The application has below modules 1. Add Location

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

This module allows user to add the locations for which he wants to set reminders. User can give name of location, latitude and longitude of location. Google Maps can be used to obtain the latitude and longitude of location. 2. Add Reminder This module allows user to add the reminder. User can choose the location which is already added. User can set the description of reminder. For example, user can choose location as Forum Mall and set the description as Buy movie ticket for 2012 movie Once the reminder is added, when user is near the location, the text description will be alerted to the user. 3. View Locations This module allows user to view all locations which user has added. 4. View Reminders This module allows user to view all reminders which user has added. 5. Settings This module allows user to set some settings for the applications. 5. Hardware Requirements Mobile which has below features a. GPS b. Java Enabled (MIDP 2.0, CLDC 1.1) with JSR 179 6. Software Requirements a. SUN WTK 2.5.2 or above. b. NetBeans IDE 7. Future enhancements In future location based reminder can also be combined with time.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Image Recognition with Neural Networks (IEEE)


Title: Domain: Standalone Application

Abstract:

Artificial Neural Networks are a recent development tool that is modeled from biological neural networks. The powerful side of this new tool is its ability to solve problems that are very hard to be solved by traditional computing methods (e.g. by algorithms). This work briefly explains Artificial Neural Networks and their applications, describing how to implement a simple ANN for image recognition.

Artificial Neural Networks (ANNs) are a new approach that follows a different way from traditional computing methods to solve problems. Since conventional computers use algorithmic approach, if the specific steps that the computer needs to follow are not known, the computer can not solve the problem. That means, traditional computing methods can only solve the problems that we have already understood and knew how to solve. However, ANNs are, in some way, much more powerful because they can solve problems that we do not exactly know how to solve. That's why their usage are recently spreading over a wide range of area including, virus detection, robot control, intrusion detection systems, pattern (image, fingerprint, noise...) recognition and so on.

Back Propagation ANNs contain one or more layers each of which are linked to the next layer. The first layer is called "input layer" which meets the initial input (e.g. pixels from a letter) and so do the last one "output layer" which usually holds input's identifier (e.g. name of the input letter). The layers between input and output layers are called "hidden layer(s)" which only propagates previous layer's outputs to the next layer and [back] propagates the following layer's error to the previous layer. Actually, these are the main operations of training a Back Propagation ANN which follows a few steps.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

SOFTWARE REQUIREMENTS Operating System Frame Work Language Windows XP Professional Visual Studio .Net 2005 Professional C# .Net

HARDWARE REQUIREMENTS

Processor RAM Secondary storage Keyboard Mouse Display Network Adapter

Pentium IV 2GHz and above 512 MB RAM 40 GB HDD Standard 102 Keyboard Standard Serial Mouse 15 VGA Adapter Ethernet card 100Kbps

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Steganography for Regions with different data density (IEEE)


Title: Steganography for Regions with different data density

Abstract: A well known method of stegano analysis is to search one colored area of the image for variations. In diffuse areas where every pixel has a different color than its neighbors, variations by hidden bits are hard to detect, but most pictures also contain areas with smooth colors. The blue sky in the upper middle should not contain hidden data, because there are nearly no natural variations in the colors.

The clouds have more shades of blue, but anything that's not blue would be easy to find. If any data has to be hidden in the clouds, not more than one bit per pixel should be changed. It is the same with the trees on the right: changing the higher bits would produce light colors, but only dark pixels are allowed here, so the capacity of each pixel is reduced to one or two bits.

The boats and the beach on the left side are better. They contain red, yellow, and white, blue, green... We can change up to 7 bits in this region, nobody will notice anything. To escape from simple variations analysis, we'll hide our secret message only in these regions, and with adjusted "bit rates":

Edit and Store Regions: Just as in the preceding examples, we need a carrier bitmap, a secret message, and a key. The new feature is a Region Editor which lets the user define regions and their capacities. An easy way to draw a region is to click the points of a polygon. So, we let the user click on the image, and add every clicked point to a polygon. A polygon can be closed with a double click, then the next click starts a new polygon. When a polygon is being closed by a double click, we have to make sure that it does not overlap one of the already existing polygons. If the new

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

polygon intersects another polygon, we merge the two regions. If the polygon stands alone, we create a new region and add it to the list. CtlRegions is a RegionInfoList; this control displays statistics and input fields for each region.

SOFTWARE REQUIREMENTS: Operating System Frame Work Language Windows XP Professional Visual Studio .Net 2005 Professional C# .Net

HARDWARE REQUIREMENTS: Processor RAM Secondary storage Keyboard Mouse Display Network Adapter Pentium IV 2GHz and above 256 MB RAM 40 GB HDD Standard 102 Keyboard Standard Serial Mouse 15 VGA Adapter Ethernet card 100Kbps

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light (IEEE-2009)
Abstract The structured light vision system is a successfully used for the measurement of 3D surface in vision. There is some limitation in the above scheme that is tens of pictures are captured to recover a 3D sense. This paper presents an idea for real-time Acquisition of 3-D surface data by a specially coded vision system. To achieve 3-D measurement for a dynamic scene, the data acquisition must be performed with only a single image. A principle of uniquely color-encoded pattern projection is proposed to design a color matrix for improving the reconstruction efficiency. The matrix is produced by a special code sequence and a number of state transitions. A color projector is controlled by a computer to generate the desired color patterns in the scene. The unique indexing of the light codes is crucial here for color projection since it is essential that each light grid be uniquely identified by incorporating local neighborhoods so that 3-D reconstruction can be performed with only local analysis of a single image. A scheme is presented to describe such a vision processing method for fast 3-D data acquisition. Practical experimental performance is provided to analyze the efficiency of the proposed methods.

Existing System:

In case of the existing system we need to take a lot of image to make a 3D Sean. And also took a lot of time to create the 3D Sean. And also we cannot estimate the time in which the Sean can be created. In order to obtain a better resolution, a technique based on the combination of gray code and phase shifting is often used. The main drawback of this is that we need a lot of image to achieve that. And so look forward to advanced system.

Through which we can make the process quicker.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Proposed System:

In case of the proposed system we over come the problem in the existing system. And also we propose a structured pattern in order to manage the image from a computer. We are getting the image in a matrix, converting to grayscale. Using encoded pattern project, we getting the combination of image from the matrix and adding new pixel colors according to the encoded one, with out using any similar images.

Hardware Requirements: SYSTEM HARD DISK FLOPPY DRIVE MONITOR MOUSE RAM KEYBOARD : Pentium IV 2.4 GHz : 40 GB : 1.44 MB : 15 VGA colour : Logitech. : 256 MB : 110 keys enhanced.

Software Requirements: Operating system Front End Coding Language :- Windows XP Professional :- Microsoft Visual Studio .Net 2005 :- C# 2.0

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Online Exam with Graphical Presentation


ABSTRACT: The Online Exam is a practice test, which is commonly available to higher education students. The extent of student use of such study tools and the relationship of use to achievement. However in all the fields i.e., Colleges, Business etc have encouraged to use online Exams in academic achievement. In the academic they have been associated with positive learning outcomes subordinate have increased confidence.

As one of this online exam tools are quite effective in this generation however, we have developed a web-based online exam system, which can create questions closely, competitively, and collaboratively by students for purpose of reducing the load required for a teacher and promoting interactions among students and between the teacher, this should be done in order to improve students comprehension levels and learning motivation.

This light version of online exam is presented to you in a simple and easy format that enables you to improve your effectiveness and efficiency to prepare for interviews and certification exams. Online exam will test your knowledge and intelligence on various technical and aptitude interview related topics to see how smart you are and assesses your performance which helps you to analyze your strong and week areas.

This is intuitive application through which we can conduct online exams on various topics as we desire.

INTRODUCTION: This project deals with online exam, as one of this online exam tools are successfully implemented in universities. This project improves students comprehension levels and learning motivation. This Online exam tool had been programmed in xml file on the server from the information technology department.

In a first step an invitation email will be sent to all the students for online registration to manage their account by providing username and password to conduct the online exam, after logging in you will be having instruction to follow the procedure and later on main exam paper

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

will be displayed and there schedule time will be fixed, we have to finish online exam in scheduled time. Questions appear in the website with answers, answer will be subdivided into 4 sections, you just have to search to find the correct answers, after each question there is a link for the next web page, if any answers are wrong you will have the opportunity to go back and try again for the correct answer.

When you have answered the entire question, you have to click on the submit button at the bottom of the exam page and our computer will calculate your results on the spot. You may then choose to review your exam for any wrong answer given. Later results can be downloaded or can be taken the printout.

Each exam is dynamically created and built with the latest server-side technology using advanced randomization techniques for increasing security, but implements widely compatible client-side technology so that almost anyone with a web browser can use the system. The data is then stored in server-side, making it nearly impossible to cheat the system.

COMPONENTS USED: PROCESSOR RAM HARD DISK RESOLUTION : Pentium 4 : 512MB : 100MB : 1024 X 768

SOFTWARES USED: C#.NET(HARD-CODE) MS SQL OR XML

Advantage
You can login and take the exam at any time In spot the computer will calculate the results It can be used from any place with Internet connection Easy Job Fast and effective service

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Disadvantage PC Dependable Answers cant be discussed with any one Fixed time cant be extended. Initially its expensive.

Application This project is very useful for this generation because anyone can successfully begin online exam, it is presented to you in a simple and easy format that enables you to improve your effectiveness and efficiency to prepare for interviews confidently and successfully.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Neural Networks for Unicode Optical Character Recognition


Abstract: The central objective of this project is demonstrating the capabilities of Artificial Neural Network implementations in recognizing extended sets of optical language symbols. The applications of this technique range from document digitizing and preservation to handwritten text recognition in handheld devices.

The classic difficulty of being able to correctly recognize even typed optical language symbols is the complex irregularity among pictorial representations of the same character due to variations in fonts, styles and size. This irregularity undoubtedly widens when one deals with handwritten characters.

Hence the conventional programming methods of mapping symbol images into matrices, analyzing pixel and/or vector data and trying to decide which symbol corresponds to which character would yield little or no realistic results. Clearly the needed methodology will be one that can detect proximity of graphic representations to known symbols and make decisions based on this proximity. To implement such proximity algorithms in the conventional programming one needs to write endless code, one for each type of possible irregularity or deviation from the assumed output either in terms of pixel or vector parameters, clearly not a realistic fare.

An emerging technique in this particular application area is the use of Artificial Neural Network implementations with networks employing specific guides (learning rules) to update the links (weights) between their nodes. Such networks can be fed the data from the graphic analysis of the input picture and trained to output characters in one or another form. Specifically some network models use a set of desired outputs to compare with the output and compute an error to make use of in adjusting their weights. Such learning rules are termed as Supervised Learning.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

One such network with supervised learning rule is the Multi-Layer Perception (MLP) model. It uses the Generalized Delta Learning Rule for adjusting its weights and can be trained for a set of input/desired output values in a number of iterations. The very nature of this particular model is that it will force the output to one of nearby values if a variation of input is fed to the network that it is not trained for, thus solving the proximity issue. Both concepts will be discussed in the introduction part of this report.

The project has employed the MLP technique mentioned and excellent results were obtained for a number of widely used font types. The technical approach followed in processing input images, detecting graphic symbols, analyzing and mapping the symbols and training the network for a set of desired Unicode characters corresponding to the input images are discussed in the subsequent sections. Even though the implementation might have some limitations in terms of functionality and robustness, the researcher is confident that it fully serves the purpose of addressing the desired objectives.

SOFTWARE REQUIREMENTS FRONT END BACK END OPERATING SYSTEM LANGUAGE : : : : VS .NET 2005 SQL SERVER 2000 Windows XP. Visual C#

HARDWARE REQUIREMENTS HARD DISK RAM PROCESSOR I/O DEVICES : : : : 40 GB 512 MB Pentium IV Keyboard, Mouse

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Bug Tracking System


Abstract For many years, bug-tracking mechanism is employed only in some of the large software development houses. Most of the others never bothered with bug tracking at all, and instead simply relied on shared lists and email to monitor the status of defects. This procedure is error-prone and tends to cause those bugs judged least significant by developers to be dropped or ignored. Bug Tracking System is an ideal solution to track the bugs of a product, solution or an application. Bug Tracking System allows individual or groups of developers to keep track of outstanding bugs in their product effectively. This can also be called as Defect Tracking System. The Bug Tracking System can dramatically increase the productivity and accountability of individual employees by providing a documented workflow and positive feedback for good performance. Some salient features are 1. Product and Component based 2. Creating & Changing Bugs at ease 3. Query Bug List to any depth 4. Reporting & Charting in more comprehensive way 5. User Accounts to control the access and maintain security 6. Simple Status & Resolutions 7. Multi-level Priorities & Severities. 8. Targets & Milestones for guiding the programmers 9. Attachments & Additional Comments for more information 10. Robust database back-end Existing System In any software development bugs are inevitable. Let it be in any kind of product bugs arise at any phase of development. One has to take a great care in the proper maintenance and resolution of the bugs. In the Existing system the bugs are not properly maintained and they are simply relied on shared lists and email to monitor the bugs. In this type of system it becomes difficult to track a bug if a bug is over looked then it may cause tremendous errors in the next phase and can improve the cost of project what ever necessary effort spent on the bug maintenance may not be worthy. So bug history has to be maintained properly. And there is no

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

efficient search technique. One has to search the whole database for the details of particular bug which might have occurred some time earlier. It is both time consuming and error prone. And it is very difficult to share the bug among several users as there is no proper maintenance of the bugs. In order to have an efficient product bugs must be maintained properly and should be resolved in time both to reduce time and money spent on the development. Proposed System The proposed system has many advantages over the existing system. This system maintains the products, Bugs and bug tracking. It has advantage of maintaining bug history it stores all the details from bug origin to bug resolution. So that it would not be difficult for the user to know how much effort spent on the bug? Each product can have versions for easy maintenance of the product and all the user of the product is stored in the database. It provides the advantage of maintaining users to the bugs and resolutions provided by them. This product provides efficient search technique. As the number of bugs for a product increases tremendously it would be difficult to search for a single record. Our system provides the searching based on status, priority, and operating system. It provides with user and bug hierarchy, which would be helpful in knowing the relation between bugs and users allotted to the bug. It is provided with a fully authenticated system with password encryption. And has the facility for storing attachments for a bug. One can keep a track of the bug in a product with much lower cost and effort. The most advantage of this system is maintaining log records which are helpful in knowing any errors or misuse of the system by other users. Technical Specifications: HARDWARE Intel Celeron / P III / P4 600Mhz greater 128MB 512MB 100MB to or SOFTWARE Operating System Win 2000 Ser. / Pro.

RAM (SD / DDR) Hard Disc

Web Server Development Tools Database

IIS 5 or 6 VB.NET, ASP.NET MS SQL / Oracle

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

ENTERPRISE RESOURCE INFORMATION SYSTEM (ERIS)


ABSTRACT

Enterprise Resource Information System (ERIS) is a computerized solution for recruiting agencies and software consultants. This application maintains electronic database comprises of job applicants, workers and employers. User of this system can create and access details of all the information using advanced GUI screens comprises of menu, bitmap toolbars, status bar and many more. This is an Intranet application, which is used by a consultant to maintain his clients and employees status and schedule interviews for applicants. The Project is divided into three modules.

Applicant: This module is used to maintain Applicants Employee: This deals to maintain the status of employee like at which client is the employee working Clients: This module deals with various clients. Reports are generated finally for the convenience of the consultant.

DESCRIPTION

Enterprise Resource Information System (ERIS) is a computerized solution for recruiting agencies and software consultants. This application maintains electronic database comprises of job applicants, workers and employers. User of this system can create and access details of all the information using advanced GUI screens comprises of menu, bitmap toolbars, status bar and many more. This is an Intranet application, which is used by a consultant to maintain his clients and employees status and schedule interviews for applicants. The Project is divided into three modules. The first module is used to maintain Applicants, second deals to maintain the status of employee like at which client, he is working and third module deals with various clients. Reports are generated finally for the convenience of the consultant.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Hardware Requirements:

o o o

Processor Hard Disk RAM

: : :

Celeron 1.7 GHz processor or above. 20 GB or above 256 MB or above

Software Requirements:

o o o

Operating System Languages Back End

: : :

Windows 2000 Professional ASP.net with VB.net SQL SERVER 7.0

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Push-Pull Email Utility on Mobiles


Check Ur Email on the move Present Challenges: With number of people using mobile phones is increasing, it has become a need for users to provide on their mobiles, all facilities one is been utilizing on the Internet. One of such facility is handling emails easily on mobiles. People have been accessing their emails on their mobiles by logging in to the email portals (for example www.yahoo.com) using GPRS connectivity on their mobile phones. But the fact that such method of directly accessing the emails has given bad user experience as it consumes lot of time to download an email and hence consuming more GPRS connection time, there is a need to have easy and friendly interface to email portals, which will give good experience for mobile users. Such email web portals need to have interface for the mobile users too in order to have this facility to be used via a mobile with GPRS connectivity. Many such web portals are enhancing towards this, mainly, to capture most of mobile users as their customers. As per current market figures, which shows that around 70% of mobile market has been captured by Symbian phones. So if such web portals want to have many mobile customers then there is need to have support given to smart phones which has Symbain OS embedded in it. To have this web portal will require the interface to mobile phones and add-on software to be installed on mobile phones. This software will interact with web portal on behalf of the user. For example, let us take into consideration of a person who is on the move and want to check his emails and reply to some mails on his journey. Using the mobile push-pull email software on his mobile he can immediately check for new mails and send some urgent mails if required. Key Features: Push-Pull Email utility software can do below : Download text emails View emails Send text emails

Some of the future enhancements are: Send emails with attachments: Send a file as an attachment along with email via mobile pushpull email software.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Receive emails with attachments: Receive a file as an attachment along with email via mobile push pull email software. Benefits: Anytime, anywhere Emails: Earlier people have to check their emails by logging in to the email portals using GPRS connectivity on their mobile phones. This way of accessing emails has shown bad user experience as it consumes lot of time to download an email and hence consuming more GPRS connection time. Hence nowadays, it is very rare that a person would check his emails on phone. Now life is made easy, with the mobile push-pull email software on mobile, receiving and sending email is easy and fast via GPRS connectivity used for lesser time. Easy maintenance of emails: emails will be maintained in database in web portal. User can have choice as whether he wants to keep the downloaded emails on the portal or delete it once downloaded. Technologies Used: Below components are required 1. Email Web service: The responsibility of this component is to receive the emails from several mobile users, which are to be sent. This component will also download the emails for the users and send it to mobiles. The upload or download request can be sent through Mobile push pull email software on mobiles. Technologies used: Programming Language C#.Net, XML 2. Mobile push-pull email software widget: This software widget needs to be installed on mobile. The responsibility of this component is to interact with user and provide with different features of mobile pushpull email as mentioned above. Technologies: Programming Language C++, Symbian OS (Mobile Operating System), XML

Hardware Requirements: Any Mobile Handset having Symbian OS 7.0, Series 60 with GPRS enabled in it.

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Neural Networks for Unicode Optical Character Recognition


Abstract The central objective of this project is demonstrating the capabilities of Artificial Neural Network implementations in recognizing extended sets of optical language symbols. The applications of this technique range from document digitizing and preservation to handwritten text recognition in handheld devices.

The classic difficulty of being able to correctly recognize even typed optical language symbols is the complex irregularity among pictorial representations of the same character due to variations in fonts, styles and size. This irregularity undoubtedly widens when one deals with handwritten characters.

Hence the conventional programming methods of mapping symbol images into matrices, analyzing pixel and/or vector data and trying to decide which symbol corresponds to which character would yield little or no realistic results. Clearly the needed methodology will be one that can detect proximity of graphic representations to known symbols and make decisions based on this proximity. To implement such proximity algorithms in the conventional programming one needs to write endless code, one for each type of possible irregularity or deviation from the assumed output either in terms of pixel or vector parameters, clearly not a realistic fare.

An emerging technique in this particular application area is the use of Artificial Neural Network implementations with networks employing specific guides (learning rules) to update the links (weights) between their nodes. Such networks can be fed the data from the graphic analysis of the input picture and trained to output characters in one or another form. Specifically some network models use a set of desired outputs to compare with the output and compute an error to make use of in adjusting their weights. Such learning rules are termed as Supervised Learning.

One such network with supervised learning rule is the Multi-Layer Perception (MLP) model. It uses the Generalized Delta Learning Rule for adjusting its weights and can be trained for a set of input/desired output values in a number of iterations. The very nature of this particular

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

model is that it will force the output to one of nearby values if a variation of input is fed to the network that it is not trained for, thus solving the proximity issue. Both concepts will be discussed in the introduction part of this report. The project has employed the MLP technique mentioned and excellent results were obtained for a number of widely used font types. The technical approach followed in processing input images, detecting graphic symbols, analyzing and mapping the symbols and training the network for a set of desired Unicode characters corresponding to the input images are discussed in the subsequent sections. Even though the implementation might have some limitations in terms of functionality and robustness, the researcher is confident that it fully serves the purpose of addressing the desired objectives.

SOFTWARE REQUIREMENTS

FRONT END BACK END OPERATING SYSTEM LANGUAGE

: : : :

VS .NET 2005 SQL SERVER 2000 Windows XP. Visual C#

HARDWARE REQUIREMENTS

HARD DISK RAM PROCESSOR I/O DEVICES

: : : :

40 GB 512 MB Pentium IV Keyboard, Mouse

IGSLABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinalyearproject.com

Você também pode gostar