abstract dotnet
TRANSCRIPT
S. No Project Title Page No.
1 Resource Allocation for Session-based 2Dimensional Service Differentiation on e -Commerce Servers
4
2 Electronic Customer Relationship Management 6
3 Session Based Peak Load Management System For Commercial Web Server
7
4 Applying Concept Analysis to User-Session- Based Testing of Web Applications
10
5 Online Quiz 12
6 Web Based Stock and Sales Management System for Fire Equipment Service Providers
13
7 Building a Multiple-Criteria Negotiation Support System
15
8 Workload Aware Load Balancing Scheme for Replicated Web Servers
17
9 Electronic Job Allocation System 19
10 Distributed Trust Management for Banking System
20
11 Learning Management Systems 21
12 Secure E-voting 23
1
13 A Flexible Payment Scheme and its Role based access control
24
14 Kids World 26
15 College Office Management Software 27
16 Web Based Application for Blood Donation Process
28
17 Online Mobile Showroom 3018 Web Based Remote Database Administration 31
19 E-Commerce Solutions 3220 Sustaining Availability Of Web Services Under
Distributed Denial Of Service Attacks34
21 Dynamic and Temporal Role-Based Access Control for Enterprise System
36
22 Integrated Online Booking 3823 Supply chain Management 4024 Online Teleservice 4225 Online Textile Showroom 4326 Service Mining Based On The Knowledge and
Customer Databases44
27 Single Sign on Authentication System 4628 Intranet Based Motor Vehicle Insurance 4829 Agent based architecture for secure
access from multiple hospitals49
30 Utilizations Of User Sessions in Testing 5131 Research On Personal Credit
Evaluation System Of Commercial 52
2
Banks
32 Framework Architecture of e-Loan Negotiation System Sales force Automation
53
33 Sales Force Automation 5434 Truth Discovery with Multiple Conflicting
Information Providers on the Web55
35 Antimony Laundering Compliance System 5636 A Novel Reputation Computing Model for
Mobile Agent-Based E-Commerce Systems58
37 A Content based Algorithm for Blog Ranking 59
38 A Monitor Tool For Anti-Spam Mechanism And Spammer Behaviors
60
39 Mining the E-commerce Data to Analyze the Target Customer Behavior
61
40 Electronic Consulting In Marketing 62
41 An Urban Traffic Information Portal Using web GIS
63
42 Project Status Reporting and Auditing 6443 Online Jewellery Showroom 6644 Online Laptop Showroom 6745 Airline reservation System 6846 Railway Reservation System 6947 Hotel Reservation System 70
3
Resource Allocation for Session-based 2Dimensional Service Differentiation on
e -Commerce Servers
Abstract
A scalable e-Commerce server should be able to provide different
levels of quality of service (QoS) to different types of requests based on
clients’ navigation patterns and the server capacity. E-Commerce workloads
are composed of sessions.
A session is a sequence of individual requests of different types made
by a single customer during a single visit to an e-Commerce site. During a
session, a customer can issue consecutive requests of various functions such
as browse, search, select, add to shopping cart, register, and pay. It has been
observed that different customers exhibit different navigation patterns.
Actually, only few customers are heavy buyers and all others are occasional
buyers or visitors. Recent studies on customer behaviors of some e-
Commerce sites showed that only 5% to 10% customers were interested in
buying something during the current visit and about 50% of these customers
were capable of completing their purchases. Although it is important to
accommodate the remaining 90% to 95% customers in order to turn them
into heavy buyers in future, the 5% to 10% heavy buyers should be
preferential. However, most e-Commerce servers schedule processing
resources equally between heavy buyers and occasional visitors. It is widely
recognized that poor performance perceived by heavy buyers can be the
major impediment for the success of e-Commerce. This requires a scalable 4
e-Commerce server to provide different levels of QoS to sessions from
different customers. We refer to this as inter-session service differentiation.
An e-Commerce session contains a sequence of requests for various
functions in different states. Requests in different states have different
opportunities to turn themselves to be profitable. A scalable 2 e-Commerce
server should also provide different levels of QoS to requests in different
states in each session so that profitable requests like order and checkout can
be completed in a timely manner. We refer to this as intra-session service
differentiation. Thus, for a session-based e-Commerce workload, service
differentiation provisioning should be two-dimensional. In this paper, we
investigate the problem of two-dimensional (2D) service differentiation
provisioning on e-Commerce servers, where the customers (and their
requests) are classified according to their profiles and shopping behaviors.
Thus the Server Loading is decreased from the occasional visitors.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
5
Electronic Customer Relationship Management
ABSTRACT
Electronic Customer Relation Management (E-CRM) is the
software built for effective management of Customer enquiry and Product
development. E-CRM is web-based solution, and has multiple user access.
E-CRM automates tasks involved in Product Development that include
Enquiry, Marketing/CSR, Technical, System Admin, Quality Control (QC),
Accounts and other features.
The flow starts from enquiry of product as per the needs of the
customer to successful implementation at customer place. The benefit
includes cost effectiveness, reducing process life-cycle time, and improved
productivity. E-CRM ensures the smooth flow and access up-to-date
information. And E-CRM is basically Transaction Oriented Software.
E-CRM generates various kinds of reports required for Administration
Departments, Marketing/CSR, Employees, Technical Team, and also reports
required by the Customer. It also handles Accounting section, which
includes the customer Payment details (Credit Card Payment).
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
6
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
SESSION BASED PEAK LOAD ANAGEMENT SYSTEM FOR COMMERCIAL WEB SERVER
ABSTRACT
Evaluation of web server performance generally focuses on achievable
throughput and latency for a request-based type of workload as a function of a
traffic load. The server performance (throughput) is characterized as maximum
achievable number of connections per second while maintaining the required file
mix. Commercial applications impose a set of additional, service-level
expectations. A Session-based workload gives a new interesting angle to revisit
and reevaluate the definition of web server performance. It naturally proposes to
measure a server throughput as a number of successfully completed sessions.
If a load consists of single, unrelated requests, then the server throughput is
defined by its maximum capacity, i.e., a maximum number of connections the
server can support. Any extra connections will be refused and extra load-requests
will be dropped. Thus, once a server has reached its maximum throughput, it will
stay there, at a server maximum capacity. However, if the server runs a session-
based workload, then a dropped request could occur anywhere in the session. That
leads to aborted, incomplete sessions. Using a simulation model, we show that an
overloaded web server can experience a severe loss of throughput when measured
in completed sessions while still maintaining its throughput measured in requests
per second. As an extreme, a web server, which seems to be busily satisfying
clients requests and working at the edge of its capacity could have wasted its
resources on failed sessions and, in fact, not accomplished any useful work.
7
Peak load management is required to improve the customer perception of
the web site quality of service and to ensure a quality end-user experience to win
customer loyalty. The main goal of a session based admission control (SBAC) is
the prevention of a web server overload and, as a result, an improvement of the
quality of service on a web site. An admission control mechanism will accept a
new session only when a server has the capacity to process all future requests
related to the session, i.e., a server could guarantee the successful session
completion. If a server is functioning near its capacity, a new session will be
rejected (or redirected to another server if one is available). The idea of
introducing admission control for a web server running a session-based workload
to guarantee web QoS closely resembles the admittance of a new flow into a
resource constrained network in a traditional QoS setup Deferring a client at the
very beginning of their transaction (session)-rather than in the middle-is another
desirable web quality of service property for an overloaded server. It will
minimize the amount of wasted server work. We show that a web server
augmented with a session-based admission control is able to provide a fair
guarantee of completion, for any accepted session, independent of a session
length. This provides a predictable and controllable platform for web applications
and is a critical requirement for any e-business.
A customer who's completing a purchase transaction, for instance, is much
more important than someone browsing for information. As such, Web QoS
allows incoming requests to be screened and categorized as high, medium, or low
priority based on things like source/destination IP address, requested URL, and so
on. Different service-level policies can then be applied to each category. For
example, if the server is experiencing heavy traffic, low priority requests can be
redirected to an alternative server or receive rejection notices. Web QoS allows
administrators to selectively manage Web site performance and availability, while,
at the same time, providing extra protection against Denial of Service attacks.
8
We believe that sending a clear message of rejection to a client is very
important. It will stop clients from unnecessary retries, which could only worsen
the situation and increase the load on the server. However, issuing an explicit
rejection message imposes an additional load on a web server. The “worst case”
overhead analysis depending on workload type and applied load Values.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
9
Applying Concept Analysis to User-Session- Based Testing of Web
Applications
Abstract
The continuous use of the Web for daily operations by businesses,
consumers, and the government has created a great demand for reliable Web
applications. One promising approach to testing the functionality of Web
applications leverages the user session data collected by Web servers. User-
session-based testing automatically generates test cases based on real user
profiles. The key contribution of this project is the application of concept
analysis for clustering user sessions and a set of heuristics for test case
selection. Existing incremental concept analysis algorithms are exploited to
avoid collecting and maintaining large user-session data sets and to thus
provide scalability. This project completely automated the process from user
session collection and test suite reduction through test case replay.
Incremental test suite update algorithm, coupled with experimental study,
indicates that concept analysis provides a promising means for incrementally
updating reduced test suites in response to newly captured user sessions with
little loss in fault detection capability and program coverage.
For example, link testers navigate a Web site and verify that all
hyperlinks refer to valid documents. Form testers create scripts that initialize
a form, press each button, and type preset scripts into text fields, ending with
pressing the submit button. Compatibility testers ensure that a Web
10
application function properly within different browsers. User-session-based
testing as an approach to test.
The functionality of Web applications while relieving the tester from
generating the input data manually and also to enhance a test suite with test
data that represents usage as the operational profile of an application
evolves. The fault detection capability appears to increase with larger
numbers of captured user sessions. One approach to testing the functionality
of Web applications that addresses the problems of the path based
approaches is to utilize capture and replay mechanisms to record user-
induced events, gather and convert them into scripts, and replay them for
testing.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
11
Online Quiz Abstract
This is online quiz is used to improve the student talent through this
site. This site is divided into many different categories like:
1. Science
2. Sports
3. General
4. History
Science section is used to improve the student science knowledge in medical
oriented and biochemical oriented and many fields.
Sports section is very useful to improve the sports knowledge in different
section of sports.
General section is used to improve the general knowledge in various area,
example politics and many another general knowledge.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
12
Web Based Stock and SalesManagement System for Fire Equipment
Service Providers
Abstract
This Project entitled “Distributed Fire Equipment office Automation
Software” is used maintain all the operation of the Fire Equipment service
providers, who have various branches in various places. Maintaining all the
operations of all branches in single face is not an easy process and gives
some confusion to the user. So this project gives the clear-cut transaction
flow and avoids the above-mentioned problems.
This project contains four major modules- Master, Transaction,
Reports, and User Rights Verification. Master Module Contains some
subdivisions as follows- Customer, Area, Item, Service Due, Item Group,
Marketing Person, Sales Type, Purchase type, Supplier. The Customer
module is used to get the Customer details, user divided their customers into
three types – Our Customer, Competitor Customer, Training Customer.
The Transaction module has been divided into four subgroups as
follows Sales Order, Invoice, Purchase, Receipt. The Sales order form is
used to register the order, which is given by the Customers. The sales order
contains the detail about the item and their quantity, which the Customer
needs. The order may be issued through letter or in the form of verbal
(Telephone). Our module has the capability to store the both type of orders.
Then the company gives the Invoice to the customer. In invoice we have to
enter the sales order number only. The items detail and the quantity details
13
are automatically displayed. Finally the company gives the purchase note to
the customer. The Receipt entry is used to calculate the outstanding amount
of each customer. The Reports module contains many reports, which are
very useful for the organization. The User Rights Module is used to generate
the Authorization Policy. In this Form we gave various rights to the user.
This module divides the user and tells which user can access, which
modules. So Via this we can deny the unauthorized users.
“Distributed Fire Equipment office Automation Software” is a wed
based application. So it has the ability to maintain the centralized database.
The modifications made in the transaction at any branch will affect the
unique database that is maintained in the server. By this the user can easily
view all the transaction with the use of single database.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
14
Building a Multiple-Criteria Negotiation Support System
Abstract
Electronic marketplaces have recently been built that allow many
types of multiple-criteria bargaining schemes. Within these marketplaces,
systems have been constructed to enable bargaining between a single buyer
and a single seller, which is known as bilateral bargaining; forward auctions
that involve many buyers and one seller and reverse auctions that involve
one buyer and many sellers, which are known as multilateral bargaining; and
dynamic exchanges between many buyers and many sellers, which are
termed double-sided bargaining. However, recent developments in
information technology have enabled the creation of a single platform that
can aggregate many buyers and sellers with various pricing schemes through
the use of such technologies as mobile agents, which combine the demands
of buyers to solicit better offers from sellers. This project proposes a
negotiation support system that uses the utility function to model the
preferences and strategies of negotiators. The proposed system is an active
collaboration and negotiation framework that uses an active document that
consists of data and software, data and macros, or data and scripts that can
be manipulated interactively. The document can initiate complex actions
when certain form fields are completed, which allows business logics or
business rules to be embedded and adapted to different collaborative
15
strategies. An active collaboration and negotiation framework is a
negotiation support system to support decision-making and group
collaboration. This project proposes an active collaboration and negotiation
framework for the construction of a semi-automated negotiation process in
which a utility function depicts the preferences of the negotiators. A semi-
automated approach is used because human preferences and behavior are
very complex, and it is difficult to completely and precisely model internal
reference prices, reference prices, and different types of negotiation
strategies. This study allows human involvement in the determination of
bargaining strategies and utility functions, but the negotiation process is
fully automated through the use of mobile agents and stationary agents.
Mobile agents are used because they can carry active documents between the
negotiators while the stationary agents process the activities locally.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
16
Workload Aware Load Balancing Scheme for Replicated Web Servers
Abstract
Serving the ever-increasing and diversified customer population in
web systems while ensuring high availability in a cost-effective way is a
challenge. Service replication is the obvious vehicle to achieve scalability
and availability, but this requires robust load balancing policies, especially
given the complexity of the workload characteristics experienced by a Web
cluster. Contemporary servers provide not only static and read-only
information, but also personalized dynamic pages created on demand. This,
in conjunction with busty client request rates that fluctuate dramatically even
within short periods of time and the wide disparity of per-request CPU and
I/O resource requirements, further complicates resource allocation in Web
server clusters. Being able to swiftly adapt the scheduling policy to the
workload without human intervention is critical for the commercial success
of Web sites. An effective load balancing policy must self-adjust its
parameters as the arrival and service characteristics of the incoming
workload changes.
This project proposed a new policy work load aware load balancing
and gave a proof of concept that dynamically readjusting its parameters
based on the monitored workload is a promising approach. It advocates
dedicating servers to requests of similar size, with the aim of reducing the
average job slowdown through separation of long and short jobs. The policy
is based on the empirical distribution of the workload resource demands, i.e., 17
the request sizes and their frequencies. The policy is examined under a
workload that changes dramatically across time and uses knowledge of the
history of request distribution to allocate incoming requests and to adjust its
balancing parameters on-the-fly.
Workload aware load balancing tends to assign requests for the same
file to the same server, thus it achieves a high cache hit ratio and low
slowdowns. Unlike location-aware policies, though, it does not have to
maintain the status of each server’s cache.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
18
ELECTRONIC JOB ALLOCATION SYSTEM
ABSTRACT
This project is to automate the process of creating awareness to job
seekers. The scope of this project is to design and deliver functional
application called Electronic Job Allocation System. Now a day, lack of
proper approach between employee and employer is the major problem
faced by the job seeker and also company which need a proper manpower.
Consultancy firms acts as a middleman between them. They collect the data
from both the parties and try to fulfill their needs by asking a perfect match
of either requirement (that of employee and employer). This project has been
divided into following modules – Authentication, Candidates detail entry,
and Employer details entry, Requirements and qualification Compare and
Search for job.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
19
Distributed Trust Management for Banking System
Abstract
The access control mechanisms used in traditional security
infrastructures have been proven inadequate, inflexible, and difficult to
apply to the Internet of today. In this work, we have proposed a general
purpose, application-independent Distributed Trust Management System
(DTMS). In DTMS, access rights are directly associated with a trust value.
The trust values are further classified into direct trust values, indirect trust
values and trust authorization levels. We have calculated and expressed each
type of the trust values into explicit numerical numbers. The core of this
model is the recommendation based trust model, and the authorization
delegation realized by delegation certificate chains.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
20
Learning ManagementSystems
ABSTRACT
The main aim of this project is to design and implement an Intranet
Portal for a university department using .NET technologies. We have
developed the system for the Computer Science and Software Engineering
(CSSE) department of this University.
As most other university departments, the CSSE department has a
traditional and static webpage. It displays the general information about the
department, such as the programs/ courses offered, faculty / staff directory,
and student organizations. This type of webpage suffers from two
shortcomings: First, it does not serve as an interactive media for the students
and faculties in the department. That is, it does not provide any facilities for
a student, a faculty member, a research group, or a student club, to
communicate or collaborate with the others in the same department. Second,
it needs webmaster’s manual effort to present the up-to-date information
about the department, such as news and events-to-come. In today’s world, it
is difficult to rely on a single webmaster to present frequently updated
information. If anybody eligible in the department can upload new
information, information will be shared in a more efficient way. To address
these problems, we propose to develop an Intranet portal that provides the
following functionalities:
A user (faculty or student) belonging to the respective home department
can log in using his/her ID and Password. Then depending on the type of
21
the user, the portal will present information that is relevant to that
particular user and his/her specific request.
The faculty and students can be given different access rights to the
various resources presented.
The faculty members can upload their research work, post lecture notes,
and make announcements.
The students can search, view and download online material posted by
faculty.
A user can send messages to another user or a group of users.
The faculties and students can participate in text-based discussion forums
which is viewable to everyone.
Data collection techniques such as Surveys and Polls can be implemented
to collect information from different groups of users. This data can
further be analyzed to get a perception of the aspects of a user or a group
of users. This will make the portal more interesting and informative.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
22
Secure E-voting
ABSTRACT
This is online secure e-voting. People can vote their desired party with
help of this site. And this site is also provides to know the voting status of
the corresponding party to allover India. Every voter should have registered
before voting. Voter Id will be provided to each registered voter, By using
this voter id only we can apply the vote. Every citizen should be vote to
select the leader, at the same time vote should be preserved. Entire details be
checked before apply the vote, including voting status. Voting status will be
changed after applying of their vote. Vote Counting Also maintained each
person is applying their vote. This site divided into two parts admin and
elector. Admin work for this site is to decided party and gives permission to
vote for elector.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
23
A Flexible Payment Scheme and its Role based access control
Abstract
This paper proposes a practical payment protocol with scalable
anonymity for Internet purchases, and analyzes its role based access control
(RBAC). The protocol uses electronic cash for payment transactions. It is an
offline payment scheme that can prevent a consumer from spending a coin
more than once. Consumers can improve anonymity if they are worried
about disclosure of their identities to banks. An agent provides high
anonymity through the issue of a certification. The agent certifies encrypted
data after verifying the validity of the content from consumers, but with no
private information of the consumers required. With this new method, each
consumer can get the required anonymity level, depending on the available
time, computation, and cost. We use RBAC to manage the new payment
scheme and improve its integrity. With RBAC, each user may be assigned
one or more roles, and each role can be assigned one or more privileges that
are permitted to users in that role. To reduce conflicts of different roles and
decrease complexities of administration, duty separation constraints, role
hierarchies, and scenarios of end-users are analyzed.
24
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
25
KIDS WORLD
ABSTRACT
Dress shop is one of the good businesses in the world. This kind of business
cannot come under anytime. So there is need of secure business to sale and buy.
For this create a online dresses shopping site. We can order any through online
with help of this site. This online reservation is used to book any type of models.
This site will also offer home delivery, canceling and also embedded all kind of
credit card
The main objective of this project is to undertake a technically take on
business. This project also supports bill payments through online. This project has
user module and admin module. The administrator has to provide details of dress
models and rates in the kid’s world for purchase. In an user module user has
provide details about his/her requirements, conduct information etc
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
26
College Office Management System
ABSTRACT
The requirements of educational institutions alone made it possible to bring out
the “College Office Management Software” for the longing Educational Institutions.
Scores of high profile and quality conscious educational institution management have
acclaimed the greatness of this project. This is a user-friendly system, which enables the
management to store student’s information and academic details in a database, which can
be retrieved. Providing attendance management with facility for internal mark
calculation. Fees like College, Hostel, and Mess etc are maintained and viewed as
reports.
“College Office Management Software” (COMS) is a software project specially
made for educational institutions for hassle free management operations of the institution.
We have done extensive research and incorporated all necessary functionalities needed
for Educational Institutes Management. The Management, Staff and other users will have
different levels of authentication to access the data. This will be ensured by enforcing
strict log in access to the individuals.
Hostellers, Transport using student details are managed. Fees like Hostel fee,
Transport fee, Mess fe
e, Exam fee and other fees are maintained separately. Easy dues facility and
report generation. Cyclic test, model exams and semester results are maintained. Internal
marks to be generated based on cyclic test marks and attendance percentage.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
27
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Web Based Application for Blood Donation Process
Abstract
One can almost say that blood is that magic potion which gives life to
another person. Though we have made tremendous discoveries and
inventions in Science we are not yet able to make the magic potion called
Blood. Human blood has no substitute. Requirement of safe blood is
increasing and regular voluntary blood donations are vital for blood
transfusion services.
This project aims to produce a model to determine the best policy for
dispatching blood units to hospitals and clinics. The model that has been
developed finds the optimal dispatching policy while minimizing the
number of outdated units and maintaining safety stocks as well as satisfying
no-shortage policies in blood banks. Meeting the demand of hospitals and
clinics for a complex mix of blood products is very critical in terms of health
care and has to be done within resource constraints placed on blood banks.
Voluntary blood donor was identified as one of the important areas
under this project. The availability of blood is maintained here and is used if
any requirement for blood during emergency is found. Safe blood can be
procured only through voluntary blood donation. This project maintains
registered donors, which are utilized during emergency. But rare blood
28
groups are still difficult to find, this led to thought of having a
comprehensive donor forum under this project.
The Blood Donors Directory gives information regarding the Donors
and their Blood Groups. The Directory is made Blood Group wise and is
handy for use by all. It also gives information about Blood Transfusion,
Blood Groups and other interesting chronological developments related to
Blood Transfusion by specialists. A person who wishes to register may
register online by posting the information regarding name, age, address,
telephone number, email address and blood group in the Registration
module.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
29
ONLINE MOBILE SHOWROOM
Abstract
Now a day mobile shopping business is moving good. This kind of
business cannot come under anytime. So there is need of secure business to
sale and buy. For this create a online mobile shopping site. We can order any
through online with help of this site. This online reservation is used to book
any type of models. This site will also offer home delivery, canceling and
also embedded all kind of credit card
The main objective of this project is to undertake a technically take on
business. This project also supports bill payments through online. This
project has user module and admin module. The administrator has to provide
details of mobile models and rates in the mobile shop for purchase. In an
user module user has provide details about his/her requirements, conduct
information etc
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
30
Web Based Remote Database Administration
Abstract
Web based remote database server administration is a complete database
server access system from any location around the globe over the internet. The
main functionality of the software is as follows,
Remote login enable the admin to access the database from any location.
Create, insert, delete, update and view tables could be done in a remote
machine in user-friendly manner.
Multiple database support – Oracle, MS-SQL, MS-Access.
Mandatory access control policy is supported to restrict the user access
level. There are three access levels a) Operation level b) Table level c)
Database level.
It can be used to technical person to fix the problems on web server without
appear on that machine.
Remote Database Administration (DBA) services, as a means to reduce IT
expenses is the order of the day.
Remote rendering of DBA services results in improved system
performance, enabling high efficiency and lower cost of operation. Gain a
predictable annual budget for database administration
Reduce DBA expenses: salary increases, benefits, recruiting, and training.
SOFTWARE REQUIREMENT
Platform : Windows XP
31
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
E-COMMERCE SOLUTIONS
ABSTRACT
The Purpose of modifying this system is to make online customer services,
which are done manually in Retail stores. This project is for a supermarket,
which having various retail outlets in the city. Within each outlet, there are
two kinds of stores that are maintained. Main stores and Shelf inventory. Main
stores reflect the outlet's stores from where items are moved to the shelf. Shelf
inventory reflects items in stock on various shelves in the outlet. Therefore,
total stock of item is the main stores stock added with the shelf inventory
stock.
Minimum total stock positions are defined for each item. Re-order levels
are also defined for each item. Whenever stock falls to the Re-order level,
stock indents are placed to the nearest stock depot. Stock depots reach items
twice every day - morning and afternoon. Minimum Shelf quantities are also
maintained for each item.
In this automation, Customers are divided into two categories. Walk-in
customers and Account Customers. Account customers are provided with
customer card and they may use that card while billing at the counter or
alternatively, quote the Card Number while ordering stocks over the Net.
32
Account customers can order for stocks over the Web. The minimum value
for door-delivery orders is fixed.
The Dispatch Manager compiles door delivery orders, three times during the day.
After completion of deliveries, deliveryman will settle collections with the dispatch
manager. This system also produces reports according to the queries raised by the user.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
33
SUSTAINING AVAILABILITY OF WEB SERVICES UNDER
DISTRIBUTED DENIAL OF SERVICE ATTACKS
Abstract
The recent tide of Distributed Denial of service (DDoS) attacks against
high-profile web sites demonstrate how devastating DDOS are and how
defenseless the Internet is under such attacks. We design a practical DDOS
defense system that can protect the availability of web services during severe
DDOS attacks. The basic idea behind our system is to isolate and protect
legitimate traffic from a huge volume of DDOS traffic when an attack
occurs. Traffic that needs to be protected can be recognized and protected
using efficient cryptographic techniques.
Due to increase in number of users on internet, many people want to
attack other system resources. Competitors also want to make their web site
more popular than others. So they want to attack the service of other’s web
site. They keep on logon to a particular web site more times, and then
service provided by the web server performance keeps degraded. To avoid
that one, this application maintains a status table. In that it keeps the IP
addresses of current users and their status. If the particular IP address has
been signed on for a first time, it makes the status as genuine user. For
second and third time, it marks as Normal user. 34
For the fourth time it makes the particular IP address status as
Attacker. After that, the user can not allow get the service of that particular
web site. The service is denied to that particular IP address.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
35
A Generalized Temporal Role-Based Access Control Model
Abstract
The Role based access control consists of four basic components: a
set of users, a set of roles, a set of permissions, and a set of sessions. A user
can be a human being or an autonomous agent. A role is a collection of
permissions needed to perform a certain function within an organization.
Permission refers to an access mode that can be exercised on an object in the
system and a session relates a user to possibly many roles. In each session, a
user can request activation of some of the roles he is authorized to assume.
Such request is granted only if the corresponding role is enabled at the time
of the request and the user is entitled to activate the role at that time. In the
RBAC model, for four sets, namely, Users, Roles, Permissions, and
Sessions, several functions are defined. The user role assignment and the
role permission assignment functions model the assignment of users to roles
and the assignment of permissions to roles, respectively. The user function
maps each session to a single user, whereas the role function establishes a
mapping between a session and a set of roles activated by the corresponding
user in the session.
In many practical real time applications, users may be restricted to
assume roles only at predefined time periods. Roles may only be invoked on
pre-specified intervals of time depending upon when certain actions are
permitted. However, the TRBAC model addresses the role enabling
constraints only. In this project, we propose a Generalized Temporal Role-
Based Access Control model capable of expressing a wider range of
temporal constraints. In particular, the model allows expressing periodic as
36
well as duration constraints on roles, user-role assignments, and role-
permission assignments. In an interval, activation of a role can further be
restricted as a result of numerous activation constraints including cardinality
constraints and maximum active duration constraints the main features of
this model include periodic enabling of roles and temporal dependencies
among roles which can be expressed through triggers. A role is said to be
enabled if assumed by a user. Priorities are associated with role events,
which in conjunction with a set of precedence rules, are used to resolve
conflicts. TRBAC also allows an administrator to issue runtime requests for
enabling and disabling a role.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
37
INTEGRATED ONLINE BOOKING
Abstract
Organizations entering electronic markets find
themselves in an unusual role. They become content
providers and have to electronically deliver accurate and
timely information about their business policies, products,
and services. This is particularly true for the travel and
tourism industry, whose special characteristics increase the
attractiveness of disseminating information electronically.
Tourists have to travel to the place of consumption and
cannot test the product in advance. They must agree upon
the contract before being able to directly evaluate and
consume the product. Third party information is the only
means to assist them in the decision-making process. Thus,
travel, transportation, and holiday services are among the
most popular items to sell online. Managed processes with
integrated system bring your e-Commerce applications back under control
and harness the synergies. This project can manage events ranging in size
and diversity from an end of year school concerts to a national dance school.
It supplies a centralized online booking process for all your customers and
staff. Best of all, it is fast and efficient. The main objective of this project is
to undertake a technical and functional audit of Integrated Online Booking,
with a view to initiating a support and development service in multiple
online booking.
38
This project also supports bill payments through online. Another
advantage of this Integrated On-Line Booking is integrated into the solution
to allow travelers the flexibility of logging into one system creating the
authorization and clicking a button to allow them to make air ticket booking,
hotel and rental car reservations within the same application. This will allow
travelers more efficient and effective travel document processing. This
project has user module and admin module. The administrator has to provide
details of air ticket reservation, hotels and car rental bookings to the
travelers.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
39
SUPPLYCHAIN MANAGEMENT
Abstract
We can implement SCM into web based online shopping. In our SCM
can provide lot of offer to the supplier, manufacture, distributor and
customer. Supplier can post the post the material into website. This material
will show the website. Manufacture only view this materials and our SCM
can provide online Shopping manufacture can buy this material through web
(online). Manufacture can post their new product into our SCM site.
Distributors only view this product. Distributor can buy this product through
online. Distributor can post their product into our SCM site. This product
can view only customer. Customer can buy this product through online. We
give relationship to supplier and manufacture, manufacture and distributor,
distributor and customer.
Another important action of this project is supplier must send request
to admin this request post to administrator also admin view this request if
admin give permission to post material to supplier, distributor, manufacture
and customer then only they post product or material to this site. Other wise
supplier, manufacture, distributor and customer cant post material or product
into the site. This project is purely based on online shopping. Manufacture,
distributor and customer can buy any posted product or material through the
site. We allowed credit card to buy product in our SCM site. We initially
40
allow three type card to buy product or material.1.American Express, 2.
Master card, 3. Visa card. Once manufacture or distributor or customer can
buy the product or material that product or material can delivery within one
to their mentioned place.
In SCM site supplier manufacture distributor and customer can easily trace
the material and product flow. In SCM project can reduce cost of Product
and increase speed of the process.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
41
Online Tele service
Abstract
This is online teleservice site. User can directly enter the problems
through this site. User can view the status of connection problem. This site is
divided into two types 1. Admin side 2.customer side. Admin can create new
connection and see all customer complaints and set the status to customer.
Customer side customer can enter their complaints and also see their
complaint status.
Customer can also see monthly bill and they can pay money through online.
This site is divided into four types like:
1. Connection
2. Complaint
3. Bills
4. Updation
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
42
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Online Textile Showroom Abstract
This is online teen shop order site. We can order teen wear through
online with help of this site. This online reservation is used to book any
material any place India. This site will also offer home delivery, room
booking and canceling and also embedded all kind of credit card.
We have been in this field for more than 10 years. We are following
our forefather’s passion for making materials. We are supplying materials to
abroad for more than 6 years. The product that we are selling is made by us
with good makers.
We have the collections of KIDS
1.Jeans
2.Shirts
3.Medies
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 200043
Service Mining Based on the Knowledge
And multiple databases
Abstract
Service-mining is based on customer service database, through
analysis and statistics tool to obtain each customer’s consumption
characteristic or use habit of a certain specific product, combining with
relevant expert knowledge and service guideline issued by products maker.
SMS can predict a suitable time and the item of service through the
behaviors of a customer.
The knowledge to predict is based on the data processing from
customer databases, and the knowledge can be amended by the system itself
as the new service records are added into customer databases. SMS provides
the solution to its users by reckon from knowledge and the records of
customer database. Types of vehicles are different, the purchase time is
different and driving style is different and the service needed by customer at
a certain time is certainly different. SMS easily manage the above problem.
Service-mining database is divided into three parts 1.guide line
database 2.customer database 3.knowledge database. Guide line information 44
provides the information about product and auto parts Service guide line is
come from repair and maintenance specification. This information is for
service center to make service schedules for their customer. Customer
information is provides their personal details and service information.
Knowledge information is provides customer behavior and product behavior
also provides the behavior of auto parts.
In SMS, feedback can be received from customer and service centers. This
information is used to analysis and makes service guide line.
SOFTWARE REQUIREMENTS
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
45
SINGLE SIGN ON
AUTHENTICATION SYSTEM
ABSTRACT
With the increasing use of distributed systems users need to access
resources that are often remote. Traditionally users have had to sign-on to
multiple systems, each of which may involve different usernames and
authentication techniques. In contrast, with single sign-on, the user needs to
authenticate only once and the authenticated identity is securely carried
across the network to access resources on behalf of the user. To solve these
problems by letting individuals log in to many Internet services while
authenticating only once, or at least always in the same way.
Enterprise hopes that single-sign-on protocols will significantly
decrease customer-care costs due to forgotten passwords and increase e-
commerce transactions by enhancing the user experience. Commercial
interest centers on distributed enterprises and on small federations of
enterprises with existing business relationships, such as supply chains. To
use sign-on protocol, an individual registers with a so-called identity
provider. The identity provider will later be the only party to directly
46
authenticate the user, either globally or within a federation of enterprises.
This confirms the user’s identity to the other parties, or service providers.
SOFTWARE REQUIREMENTS
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
47
INTRANET BASED MOTOR VEHICLE INSURANCE
ABSTRACTGeneral Insurance is one of the biggest corporate businesses in the
world. It accounts to a substantial part in the Global economy. Human
properties have great value in all situations. General insurance Company
provides real worth of your properties through its schemes. It takes
responsibility for your property and takes risk on behalf of you. The Motor
Insurance System supports the business processes for providing insurance
for Motor vehicles. Such policies enable clients to receive payments in case
any loss or damage to vehicle by accidental external means, fire, and
lightning, self ignition, external explosion, burglary of theft, other malicious
act etc. The Motor Insurance System maintains client policies and manages
claims made on those policies and any payment made on accepted claims to
replace income. The main processes supported are the establishment of
policies and collection of premiums on the policies and management of
claims on these policies. Basically two departments handle this insurance
operation. Higher authority peoples did the administration work it covers
modification in endorsement detail and assume works to clerical staffs.
Clerical staffs do the clerical works like entry, premium calculation and
claim disbursement.
SOFTWARE REQUIREMENTS
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
48
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Agent Based Architecture for Secure Access from Multiple Hospitals
Abstract
Internet-based health-record management requires not only the
provision of strong data protection to prevent privacy intrusion and
unauthorized access, but also the introduction of a common healthcare-
record format to allow cooperation using heterogeneous repositories held at
various hospitals. Accessing health care information through World Wide
Web has attracted considerable attention due to use of internet and the
introduction of Electronic Health Care Record. The use of web based
applications allows the healthcare data produced in different hospitals to be
interconnected and accessed simultaneously.
Web based applications allow easy integration of heterogeneous
applications and exchange of health care data through internet. The health
care information to be accessed from multiple reservoirs gets scattered
between different hospitals. The privilege to access each reservoir should
depend on the individual user. The health care data should be confidentially
exchanged. However, hospitals have different security policies and different
record format which can block the unified and seamless information
exchange from multiple reservoirs. Hence, web based health care
49
information systems require a unified security policy and common data
format for secure information exchange and sharing.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
50
Applying Concept Analysis to User-Session-Based Testing of
Web ApplicationsAbstract
Software testing cost is rising with the complexity of modern
applications, user interfaces, frameworks and technologies. However, testing
stays an important software engineering stage that insures the quality of the
developed software and eventually reduces the overall cost. This paper
proposed utilizing user sessions for test case generation and execution. User
sessions can be gathered from the application in production environments
and represent user stories or scenarios. Rather than rerunning user sessions
for test automation, as in record/replay tools, this research takes the track of
abstracting requirements of the scripting language or the tool that created
them. The suggested approach abstracts user sessions to make them more
independent and reusable. This approach is expected to improve the
utilization of user sessions from being copied and reused in the same
original format, which makes it complex to edit and inflexible, to a format
that can be used and utilized in different applications and platforms.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 200551
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Research on Personal Credit Evaluation System of Commercial Banks
Abstract
Based on the analysis of personal credit evaluation index systems in
and out of China, this paper establishes personal credit evaluation index
system of commercial banks suitable for China, which can be divided into
three parts: Personal indices, economy indices and credit indices; and this
paper builds personal credit synthetic evaluation model based on GEM
algorithm to better make use of experts’ experiences and wisdom, and to
overcome the inconsistency of experts’ evaluation results. This evaluation
system provides references for commercial banks to make customer loan
decisions.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
52
Framework Architecture of e-Loan Negotiation System
Abstract
To stay ahead of competition banks are creating new and
personalizing and refining existing customer oriented services. Loan
negotiation is a time consuming process, requiring considerable tie delays
and efforts from both a lender and a borrower, and can considerably benefit
from automation. Such system will provide help to bank clients in selecting
bank and negotiating loan on conditions that satisfy them. In this work we
use CBR and software agent approaches in design of the framework for
electronic bank loan system as an alternative to existing system.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
53
Sales Force Automation System
Abstract
Sales Force Automation (SFA) capabilities allow you to manage the
entire selling process, including sales order entry, post-sale follow-up and
support, as well as up selling opportunities. Unlike our competitors, Net
Suite provides complete customer purchase histories, which enable your
sales representatives to serve your customers better, improve customer
satisfaction and increased profitability.
On the Internet, E-Commerce is the selling of products, services, or
information between businesses. The companies buying from and selling to
each other online. But there's more to it than purchasing.. In traditional sales,
the buyer and/or the salesman are the active party. In one case, the buyer
initiates the purchase by either going to the store to buy or calling on the
phone and making an order. Due to increase in number of users on internet,
many people want to attack other system resources. Competitors also want
to make their web site more popular than others. So they want to attack the
service of other’s web site. They keep on logon to a particular web site more
times, and then service provided by the web server performance keeps
degraded. In another situation, the salesman goes to the home or place of
business to make the sale, or he calls on the phone to make the sale. A third
method combines action from both parties.
54
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Truth Discovery with Multiple Conflicting Information Providers on the Web
Abstract
The World Wide Web has become the most important information
source. People retrieve all kinds of information. But, there is no guarantee
for the correctness of information on the web. Different websites often
provide conflicting information for the same product. We propose a new
problem called Veracity, which studies how to find true facts from large
amount of conflicting information provided by various websites on many
subjects. Our proposed system use an algorithm called Truth Finder, which
uses the relationships between websites and their corresponding information.
This framework explains “a website is trustworthy if it provides many pieces
of true information and a piece of information is likely to be true if it is
provided by many websites”. Because of this interdependency, we propose
an iterative computational method. For each iteration, the probabilities of
facts being true and trustworthiness of websites are inferred from each other.
Our experiment shows that Truth Finder, an iterative computational method
achieves very high accuracy in identifying true facts and it can select
trustworthy websites than other search engines.
55
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
ANTI MONEY LAUNDERING SYSTEM-DETECTION AND
SOLUTIONAbstract
Anti-money laundering (AML), these solutions worked by
establishing fixed rules-based monetary thresholds and detecting specific
money laundering patterns and user scenarios that breached those thresholds.
These “intelligent enterprise systems” are able to learn and adapt,
comprehending new money laundering schemes as they arise. With their
enterprise-wide approach, they are able to analyze both the client profile and
all of the transactions that are undertaken by them, helping the financial
institution prevent money laundering schemes in a much more effective and
efficient manner. By analyzing financial data, AML solutions allow the
financial establishment to deter potential money launders before they are
able to proceed, providing protection in the form of full compliance as part
of a strategic anti-money laundering technology plan within today’s
financial organizations.
Failure to meet these anti-money laundering (AML) regulations or to
allow suspicious transactions to go undetected can have a severe impact on
any financial entity, including damage to its reputation, market 56
capitalization, as well as its customer perception and loyalty. The
implementation of this software, that relies on sophisticated behavior
detection techniques to correctly assess an organization’s current level of
risk exposure, and ensure complete regulatory compliance for all of their
financial operations.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
57
A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce Systems
ABSTRACT
Mobile Agent based e-commerce systems are increasingly
drawing more and more attention in recent years. However, there exist some
transaction risks while enabling agents make purchase decisions and exploit
information to other unknown agents in the virtual markets. Trust and
reputation are widely introduced to mitigate this risk by deriving the
trustworthiness of certain agent from his transaction history. Despite existing
of some proposed reputation-based trust models addressing the above issue,
most of them can not readily be used since there are many unforeseen
changes in the electronic markets. To this end, this paper proposes a novel
reputation computing model that integrates a direct reputation and a
recommended reputation. Specially, we present a three-factor method to
evaluate the direct reputation from personal self-experience, and adopt the
vector similarity to evaluate the recommendation credibility that can
effectively detect the dishonest recommendations. In addition, we amend the
short term reputation and penalty factor metric to make our mechanism
58
effective in detecting malicious agents with strategic behavior. Our
experiments show that the model is highly dependable and effective.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
A Content based Algorithm for Blog Ranking
Abstract
Due to the different structure and content character of blogs, the
traditional ranking algorithm of web page turns to be insufficient. To solve
this problem, a novel ranking algorithm of blog is presented. The algorithm
considers both the link analysis and the content analysis of the blog, It helps
mining more implicit features of blog, such as common topics, to improve
the satisfaction of the users. The experimental results show that the proposed
method can improve retrieval performance obviously.
A mechanism of ranking web log or "blog" item is provided. More
particularly the subject mechanisms can facilitate ranking blog feeds and
blog items contained there in thus focusing and intelligently delivering
content (e.G., log items) to users. The subject innovation facilitates ranking
the blog feeds and blog items by creating a context rank around each blog
feed. The context rank represents a sum of a context weight, a track-back
weight and a comment weight. Accordingly, this context rank can allow
readers to sort blog items in the order of popularity or importance thus
effectively reducing content noise.59
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
A MONITOR TOOL FOR ANTI-SPAM MECHANISM AND SPAMMER BEHAVIOR
ABSTRACT
Sending spam is a profitable activity for spammers and more than
95% of the Internet messages will be spams in a near future. This paper
presents a tool that helps developers of anti-spam systems to monitor the
current spammer behavior, monitor the performance of current anti-spam
systems, and analyze new anti-spam mechanisms developed. Performance
analyses for the mostly used anti-spam mechanisms are provided and the
tool can be easily extended to analyze new anti-spam systems. Some
characteristics of the processes used by the spammers to harvest electronic
addresses, create the messages, and send them are also evaluated. The results
show the low efficiency of the analyzed anti-spam mechanisms. Moreover,
results also show important characteristics of the harvest and email sending
processes, such as the high delay between the two processes and the long
period of time that addresses are kept on spammers’ lists.
60
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Mining the E-commerce Data to Analyze The Target Customer Behavior
ABSTRACT
In the advent of the information era, e-commerce has developed
rapidly and has become significant for every business. With the advanced
information technologies, firms are now able to collect and store mountains
of data describing their myriad offerings and diverse customer profiles, from
which they seek to derive information about their customers’ needs and
wants. Traditional forecasting methods are no longer suitable for these
business situations. This research used the principles of data mining to
cluster customer segments by using K-Means algorithm and data from web
log of various e-commerce websites. Consequently, the results showed that
there was a clear distinction between the segments in terms of customer
behavior.
61
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
ELECTRONICCONSULTING IN MARKETING
ABSTRACT
In an electronic consulting marketing, service provider being utilized
by product vendors and end users. A so-called business-to-business
subscription system between the marketing service provider and a plurality
of product vendors is established. This system integrates the conventional
media, e.g. TV, radio and newspapers, the modern information society tools
e.g. TV, radio and newspapers, the modern information society tools, e.g.
mobile phone technology, personal computers and internet. Product vendors
are now provided with a powerful and effective marketing tool, while end
users with personalized desired data acquisition and the tools for purchasing
on the safe and timely manner. In this paper we suggest a strategy in e-
business by developing a new style in e-marketing. People from all over the
world can take advantage of consulting with experts by using e-consulting
web-sites. These web-sites can gather information from different companies
62
and factories and, after processing them, help consumers to select the best
product they want to buy.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
URBAN TRAFFIC INFORMATION PORTAL USING WEBGIS
Abstract
Generally, traffic information is depending on message board and
public radio service in china, which usually sends out static information
without dynamic interaction between the services and the users. It is
possible to introduce the Web-based multiple architecture into the traffic
information system with the development of WebGIS and its successful
application. Now days, WebGIS portals only provide static information in
words and figures without any significant dynamic aspect. Dynamic aspect
is very important requirements for traffic information service. We develop
an urban traffic information portal for dynamic information updating and
responding, which is based on the fast growing rich Internet application and
WebGIS technology. The portal can not only provide the real-time
information but also can interact with users for more specific.
63
This paper introduces the multi-layer architecture used in our project.
Reusable services related with GIS services are designed and encapsulated
as port let. We briefly introduce some implements and optimization at the
end of this paper.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2005
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Project Status Reporting and Auditing
Abstract
This status reporting tool allows the managers to predict the accuracy
with which the employees are working. This is important because an
accurate forecast is the key for having the right product, in the right place, at
the right time. By providing an accurate forecast, the correct product can be
delivered to the customers at the right time. The proposed project aims to
design an application by which it is possible for the managers to predict the
performance of the employees. The system permits only authenticated users
who have been assigned access rights to work with the application.
On login, the system validates the user and displays the various
working links. The user can then select the necessary link to work upon. But
there is some restriction on the access of the various links. The employees
are only allowed to enter their daily timesheet and are not allowed to access
64
other links or even view other employee’s details. The employees can only
enter the working details and are not allowed to modify the details but are
allowed to modify their personal details. The entry of the daily working
hours is done on weekly basis.
The project leaders are can view the details of the employees only
under their projects. The Project leader has to enter the details of the number
of resources, training details for particular project.
The project managers can have access to almost all the employees in
the company. The project manager is the one who can allocate projects to
the employees. For this project manager must look upon the projects on
which the employees are working so that any employee is not overloaded.
The project manager allocates the projects and decides the project leader and
the employees for that particular project.
The Group leader can view and even modify the employee details. It
is only the Group leader who can have access to the overall company aspects
regarding the resources and the other billing details in the form of an excel
sheet. Thus only the Group leader can access to all the links. User and Group
level security is implemented in this status-reporting tool.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
65
Online Jewellery Showroom
Abstract
Jewellery is one of the biggest businesses in the world. Gold, diamond
has great value in all situations. So there is need of secure business to sale
and buy. For this create an online jeweler shopping site. We can order any
through online with help of this site. This online reservation is used to book
any type of jewellery. This site will also offer home delivery, canceling and
also embedded all kind of credit card. The main objective of this project is to
undertake a technically take on business. This project also supports bill
payments through online this project has user module and admin module.
The administrator has to provide details of land, house for purchase and
rental. In an user module user has provide details about his/her requirements,
conduct information etc
66
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
ONLINE LAPTOP SHOWROOM
Abstract
Now a day laptop shopping business is moving good. This kind of
business cannot come under anytime. So there is need of secure business to
sale and buy. For this create a online laptop shopping site. We can order any
through online with help of this site. This online shopping is used to book
any type of company, hardware, configuration etc., We can search our desire
configuration and view the entire details of that configuration, including
price details. This site will also offer home delivery, canceling and also
embedded all kind of credit card
The main objective of this project is to undertake a technically take on
business. This project also supports bill payments through online. This
project has user module and admin module. The administrator has to provide
details of laptop models and rates in the laptop shop for purchase. In an user
67
module user has provide details about his/her requirements, conduct
information etc
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Airline Reservation System
ABSTRACT
By this system we can get flight tickets for all over the world.
This tells us an overall view about the each flight. By entering the flight
name, we can get the details of that particular flight, then the place. By
clicking the particular place, we can get the details of, how to get there,
the cost and the transportation details. It is also used for storing
information about the passengers, and their personal details, like the
number of persons, number of adults and Childs, ticket fare for them, the
places to be visited by them, the transport reserved for them and the date
of their travel etc. The traveling details include whether it is a first class
or second class, whether it is AC or Non Ac and the charges etc. The
availability of ticket is maintained here and is used if any requirement for
ticket during emergency is found. A person who wishes to register may 68
register online by posting the information. This project is mainly builds
on the secure, scaleable and reliable. This project also supports bill
payments through online. It is user-friendly so passengers can easily
work on these project modules. Main advantage for using this project is
admin can be able to update at anytime. So passengers can get current
information.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Railway Reservation System
Abstract
Organizations entering electronic markets require accurate and timely
information about their services. This is particularly true for the railways,
whose special characteristics increase the attractiveness of disseminating
information electronically. This is very useful for the travelers who need to
reserve. This project aims to produce a ticket reservation method globally.
The availability of ticket is maintained here and is used if any requirement
for ticket during emergency is found. A person who wishes to register may
register online by posting the information.
This project is mainly builds on the secure, scaleable and reliable. This
project also supports bill payments through online. It is user-friendly so
passengers can easily work on these project modules. In this project
69
reservation should be categorized into classes. Main advantage for using
this project is admin can be able to update at anytime. So passengers can
get current information.
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
Hotel Reservation System
Abstract
Organizations entering electronic markets require accurate and timely
information about their business policies, products, and services. This is
particularly true for the hotels, whose special characteristics increase the
attractiveness of disseminating information electronically. This is very useful
for the travelers who need to reserve.
This project aims to produce a room reservation method globally.
The availability of room is maintained here and is used if any requirement for
room during emergency is found. A person who wishes to register may register
online by posting the information. In these, project there are category
specification for room. So room charge should be differs as per his/her
specification. This project is useful to systemize and maintain. The system is
secured from unauthorized access. This project also supports bill payments
through online.70
SOFTWARE REQUIREMENT
Platform : Windows XP
Front End : ASP.NET 2.0, C#.Net 2.0
Back End : SQL Server 2000
Web Server : IIS 5.0
Documentation Tool : MS WORD 2000
71