Вы находитесь на странице: 1из 6

http://www.seminarsonly.

com/Engineering-Projects/Computer

Friend Mapper on Mobile


Abstract

In current system, in order to find out the location of friends, user need to call and ask friend about his where abouts. The proposed system will help user to find out friends locations as well as the distance from users location. The proposed system will also allow user to see all friends on Google map as well. Overview The application Friend Locator on Mobiles solves all these problems. It offers below services 1. Allows user to select friend for his location updates. 2. Uploads users current location at specific frequency. 3. Get friends current location 4. Shows friends location on Google Map. 5. Shows distance in kilometers for friends away from user Mobile Application: Android Google API. GPS (for getting users current location) GPRS (for internet connectivity between mobile and server) Server Application: WCF: (Windows communication Foundation) REST service. REST: (Representational State Transfer protocol) Hardware Requirements Mobile which has below features (The app can also run on emulator) a. GPS b. GPRS c. Android phone Software Requirements a. Android SDK 1.5 or above. b. Eclipse IDE c. VS 2008 d. SQL Server 2000
Related Projects : SMS Based Mobile Banking with Security ,SMS Based Student Intimation ,Social Networking With Advertisement ,Software Project Management ,SPAF: Stateless FSA-based Packet Filters ,Staying Connected in a Mobile Healthcare System ,Stealthy Attacks In Wireless Ad Hoc Networks ,Steganography In Audio Files ,Tanrox Work Force ,Text Encryption And Decryption ,Twitter Client For Android Based Smart Phone ,VAS for Hand Held Device ,Virtual Office Management ,Virtual Router Using Destination-Sequenced Distance Vector ,Voyage Management ,Web Enabled Automated Manufacturing System ,Web Alerts ,Web Blossom Bazzar ,Wireless Health Care System ,World Recipe ,Zeppelin Reservation

Smart Network Profile Manager


Abstract This utility tool is very useful for those who work on the laptops and go around places and get bugged up with the frequent changes in the IP Configuration and the IE Proxy settings in order to start off with the actual work. This utility tool helps in maintaining different profiles with different IP Configuration and the IE Proxy settings of different locations so that one can start off with the actual work by just clicking on the desired suitable profile.

http://www.seminarsonly.com/Engineering-Projects/Computer

Purpose Our product Smart network profile manager , which gives a utility tool, is very useful for those who work on the laptops and go around places and get bugged up with the frequent changes in the IP Configuration and the IE Proxy settings in order to start off with the actual work. This utility tool helps in maintaining different profiles with different IP Configuration and the IE Proxy settings of different locations so that one can start off with the actual work by just clicking on the desired suitable profile Proposed system This tool stores the entire network address and proxy server name in the laptop based on different location. If we select particular location it will automatically gets the network address and proxy server name (if necessary) and connects to internet Environment: .NET Frame work, Microsoft Visual Studio.NET C#, ASP.NET, XML Web Services. Data base and web server: Microsoft SQL server 2000 and Internet Information Server (IIS)
Related Projects : File Security System ,Fin Corp and Cash Controller ,Flaw Tracking System ,Fleet Manager ,Friend Mapper on Mobiles ,Global Tracker ,Good Welfare Services ,Health Maintenance System ,Image Compression and De-compression ,Image Processing Editor ,Improving Utilization Of Infrastructure Clouds , Information Content-Based Sensor Selection ,Information Portal ,Insurance Broker System ,Learning Made Easy , Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking ,Load Shedding In Mobile Systems With Mobiqual ,M-banking ,MACA ,Mailing Portal ,Mail Client ,Marine Operations And Management System ,Medical Image Compression ,Millennium Planning ,Mindtech Bug And Component Systems ,Minimum Bandwidth Reservations For Periodic Streams In Wireless Real Time Systems ,Mitigation of Control Channel Jamming ,Mobi-Thesaurus ,Mobile Advertisement System ,Mobile Banking System

E-Bidding
Abstract Auctions are among the latest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared. Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price. This price is then increased until only one bidder is willing to buy the object, and the exact manner in which this is done varies. In my model a bidder who drops out at some price can "reenter" at a higher price. With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort of ones own home has seen a change like never seen before. Within the span of a few short years, what may have began as an experimental idea has grown to an immensely popular hobby, and in some cases, a means of livelihood, the Auction Patrol gathers tremendous response everyday, all day. With the point and click of the mouse, one may bid on an item they may need or just want, and in moments they find that either they are the top bidder or someone else wants it more, and you're outbid! The excitement of an auction all from the comfort of home is a completely different experience.

http://www.seminarsonly.com/Engineering-Projects/Computer

Society cannot seem to escape the criminal element in the physical world, and so it is the same with Auction Patrols. This is one area wherein a question can be raised as to how safe Auction Patrols. Proposed system 1. To generate the quick reports 2. To make accuracy and efficient calculations 3. To provide proper information briefly 4. To provide data security 5. To provide huge maintenance of records 6. Flexibility of transactions can be completed in time After understanding the existing system and understanding the need for developing a new system different people involved in the related activities have been consulted. The data needed for the study has been collected from company records. The computerization of this system would avoid the wrong interpretation and bad calculation of data .The system help the user to see any documents, source code, tasks, activities, team information with details at the click of a button. The record data is maintained and backed up such a way that data is not loss. The speed of the system could also increase. The general description gives an "executive overview" and is very client-oriented. It expounds on the functional and data requirements of the application. It also lists the limitations, assumptions and dependencies of the application. Section 3.0, the specific requirements section, includes the developers' technical view of the client's expectation of the application. It also touches on the performance and quality requirements of the application and provides a solid definition of the interface The entire system is divided into 2 major modules 1. Admin 2. Buyer HARDWARE REQUIREMENTS: RAM : 128MB HARD DISK : MINIMUM 20 GB SOFTWARE REQUIREMENTS: OPERATING PLATFORM : WINDOWS 2000/NT/XP RDBMS : SQLSERVER 2000 SOFTWARE : VS.NET 2005 FRONT END TOOL : ASP.NET
Related Projects : Diamond Web-Hosting , Digital Signature , Distributed Computing For E-Learing ,Document Manager ,Drive 2 Destiny ,E-Bidding ,E-Buy ,e-FASHION ,E-Gift Shoppe ,E-Post Office ,E-Pricing ,E-Tutor Online Jobs ,E2M Conference ,Easy Leave , Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks ,Effective Scheduling In Infrastructure-Based Cognitive Radio Networks ,Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks ,Electronic Cash Controller ,Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing ,Energy Maps for Mobile Wireless Networks ,Ensuring Data Storage Security in Cloud Computing ,Enterprise Fleet Management System ,Enterprise Security Services ,ERP System ,Examination Branch System ,Exam Experts ,Extended XML Tree Pattern Matching ,Ezee Mail System ,Fast Detection Of Mobile Replica Node Attacks ,A Fault-Tolerant Token Based Atomic Broadcast Algorithm

http://www.seminarsonly.com/Engineering-Projects/Computer

Online University
Abstract Student System and Staff System is software which is helpful for students as well as the college authorities. In the current system all the activities are done manually. It is very time consuming and costly. Our Online University System deals with the various activities related to the students. During analysis, data collected on the various files, decision points and transactions handled by the present system. The commonly used tools in the system are Data Flow Diagram, interviews, etc. Training, experience and common sense are required for collection of relevant information needed to develop the system. The success of the system depends largely on how clearly the problem is defined, thoroughly investigated and properly carried out through the choice of solution. Modules: There are mainly 3 modules in this software Student module Admin Module Staff Module In the Software we can register as a user and user has of three types, student, admin and manager. Admin has the power to add new user and can edit and delete a user. A student can register as user and can use visible for mark list and attendance his profile. The admin can add edit and delete marks for the student. All the users can see the marks. The manager can add and delete new student and staff performance PROPOSED SYSTEM: In our proposed system we have the provision for adding the details of the students by themselves. So the overhead of the college authorities and the teachers is become less. Another advantage of the system is that it is very easy to edit the details of the student and delete a student when it found unnecessary. The marks of the student are added in the database and so students can also view the marks whenever they want. Hardware Requirements: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb. Software Requirements: Operating system : Windows XP. Coding Language :HTML,CSS,JavaScript,JSP Data Base : Mysql 5.0
Related Projects : Mobile Electronic Program Guide ,Mobile Gadgeteer ,Mobile i Broker ,Mobile Invoice ,Mobile Location Alarm ,Mobile Phone Tracking ,Mobile Sampling of Sensor Field Data ,Mobile Video Archive ,Mobility Management Approaches for Mobile IP Networks ,Mobility Management Schemes Based On Pointer Forwarding For Wireless Mesh Networks ,Mobiminder: Location Based Reminder on Mobiles ,Mobi Travel Guide ,Modeling and Detection of Camouflaging Worm ,Movement-Assisted Connectivity Restoration ,Movie World ,Multi-Lingual Website ,MultiAuctioneer Progressive Auction For Dynamic Spectrum Access ,Multihoming Route Control Multiple Routing Configurations for Fast IP Network Recovery ,Multi Banking System ,Multi User Chat System ,Natural Image Segmentation Based On Tree Equipartition ,

http://www.seminarsonly.com/Engineering-Projects/Computer

SMS Controlled Industrial Controller


Abstract In a process control industry, it is very difficult for a person to be present or to monitors the system continuously. If not, there occurs damage in the whole process industry. In order to view the process continuously and to check the status of the process we are going to use our project "SMS CONTROLLED INDUSTRIAL CONTROLLER". This project has been implemented in various platforms, now we are going to do this project using LABVIEW Here we can monitor any number of process parameters. The hardware unit consists of all the hardware requirements needed for the process. This project is implemented by using LABVIEW software to send the message when there prevails any deviation in the process station. Suppose to say, if we are monitoring eight parameters we have to set the limits for all the parameters so that if any parameter value goes out of range then the corresponding message will be sent to the operator indicating there is a deviation in the process. The parameters like temperature, voltage, speed, current, level, pressure etc. can be measured by using the LABVIEW software. The hardware unit is interfaced with the system using LPT terminal to PC. In our program we have to enable the parallel port mode by setting the appropriate register values to the port. By using ADC configuration using the program, data acquisitions from different channels are performed. Plotting the graphs for these values with respect to time. If the parameter value goes out of range, then the message is sent to the operator. One mobile is connected to the PC that is having the hardware interface unit and the other one will be with the operator. To send the message to the other user, we have to do the following settings. First of all we have to establish serial communication using VISA card. After setting the serial communication mode, enter the phone number and the message that has to be sent. This will indicate only if there is any deviation in the parameter value. We can also use buzzer to get ON whenever the data's acquired goes out of range by using DIGITAL OUTPUT configuration using the LABVIEW program. For this we have to out the data as 1 or 0 to ON and OFF the buzzer unit for indication purpose. The hardware unit is interfaced with the PC by accessing the parallel port and the mobile phone is connected with the PC by accessing the serial port. The Speed parameter can be measured and controlled by using DAC configuration in lab view. Initially set the motor speed at a particular rpm by using the above said mode by counting the data from 00 to FF. By using DIGITAL INPUT configuration, count the number of pulses for every five seconds and convert it into rpm. Compare the current speed with the set speed and out the data using DAC configuration and monitor the speed value in the PC through LPT terminal. If the parameter value goes out of range, then the message is sent to the operator APPLICATION: This project is very useful in the industrial application

http://www.seminarsonly.com/Engineering-Projects/Computer

Finger Print Based Car Starting System


Abstract Finger Print Based Car Starting System project is developed for the users to start a car through finger print. It consists of a finger print scanner, microcontroller unit, car controlling system and LCD display. When the user places his finger in the tracer, it sends signal to the microcontroller. The microcontroller analyses the signal and sends signal to the car controlling system. If the finger print matches the existing finger print of the owner, it switches on the car motor. Other wise it produces a beep. The details will be displayed in a LCD display. This is very much used in vehicles where security and authentication are required. This project uses microcontroller PIC16F73. The microcontroller programs are written in Assembly language Intruder Detection System Over Abnormal-Internet-Sequence Introduction This paper reports the design principles and evaluation results of a new experimental hybrid invasion detection system (HIDS). This hybrid system combines the advantages of low falsepositive rate of signature-based invasion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic sequences from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate invasion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/ Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting invasions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection sequences. SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS Processor : Intel Pentium IV RAM : 512 MB Hard Disk : 40GB SOFTWARE REQUIREMENTS Operating System : Windows 98,2000,xp Tools : jdk1.5.0 Technologies : Java Swings, JDBC, Servlets
Related Projects : Bluetooth Home Automation,Creepy Crawler System,ATM Reporting system,E-Mail Campaign System,Mingle Box,Trade Service Engine,SMTP Mail Server,Virtual Shopping,Value card Smart card based Loyalty,Universal Web Based File Coordinator,UA Portal,Trackerz,Survey Logics,Pro-net Communication,Implementation of Security in WAN,Implementation of OSPF on IPV6,Support Vector Machines For Face Recognition,Web based Applications for Insurance Services,Cold Boot Attack,Virtual Class Rooms,Electronic Mail Server,SUDOKU,Bluetooth Hotspot ,Result Alert System With E-mail and SMS,Bug Tracking System,Partial Face Recognition Using Core features Of The Face,Face Recognition in e-attendance,Online Examination System,Chat Server,Bandwidth-Allocation-for-Distributed-Algorithm

Вам также может понравиться