Академический Документы
Профессиональный Документы
Культура Документы
documents into digital format. An electronic image of the original paper document is
created which can be viewed on a computer. There are many benefits of converting paper
into digital format and that is why it has been seen that more and more companies are
converting their files, manuals, catalogues, brochures - in short all data which is on paper
into a digital image. Data recording systems are systems designed to faithfully capture
digital and analogue data, using a variety of standard and non-standard electronic interfaces
and protocols, in such a way that the captured data can be analyzed, reproduced, and
These can be avoided by making use of this system. The mechanism, which
This Project is developed in .NET Platform and base language is VB.NET. Because
Vb.NET is very effective language to write, understand easily also user friendly to both
Programmer and user compare to all other web technologies. Data communication has
become a fundamental part of computing and data networks. Visual Basic .NET comes with
This chapter outlines the profile of the organization at which the project is
developed and specifies the system environment
Modules:
file Sending
File Receiving
Hide File
Extract File
Digital documentation is a method by which a company can convert Text documents into
digital format. An electronic conversion of the original Text document is created which can be
viewed on a computer. There are many benefits of converting Text into digital format and that is
why it has been seen that more and more companies are converting their files, manuals, catalogues,
brochures - in short all data which is on Text into a digital Format.
This utility will transfer a file between two computers using a TCP port of your choosing.
One computer uses Passive mode and listens on a port for a connection from the other computer,
which will use Active mode to connect to the first computer via its IP address. Regardless of the
selection of which computer will use Passive mode and which will use Active mode, files can be
sent in either direction.
HIDE FILE
This module is used to hide picture in data file. It has the following
process like, Image Location, Save File Location, Encryption Key is
provided by the user to hide picture file in the saved data file location.
Image location
The Image file, which is already, exists in the system. User has to
open the file from the open dialog box.
This is also Image file, which is generated by the user. User has to
save this new file in any location according to their wish. This file is used
to embed the picture file in the data file .
Encryption Key
This key is the public key. This is confidential key between sender
and receiver. This is also embedding the picture file with data file.this key
generated by using triple des algorithm
Validation code
This is actual file size of the image location. This is in bytes. The
picture file is added to the saved image location after this last byte.
Hide
It is used to hide the data file into saved picture file. Picture file
VIEW FILE
This module is used to display the picture files embed with data
file. Forms, Filename, validation code are displayed in the list. The receiver
can download the selected file by right click the list view box. The
downloaded file is stored in c:\download folder in the client machine from
server.
EXTRACT FILE
Image Location
Downloaded images by the user are given as input in this text box.
Encryption key
The key used to extract the file. This is a secret key. Receiver
should know this key to retrieve message.
Validation Code
This is the offset of the file where actually the picture file is
resided.
Extract File
When receiver clicks this button the picture file is shown to the
receiver. Encrypted files are decrypted and then shown in the text box.
1.3 SYSTEM ENVIRONMENT:
HARDWARE CONFIGURATION:
PROCESSOR : PENTIUM IV
HARD DISK CAPACITY : 40 GB
MONITOR : 14 “SAMTRON MONITOR
FLOPPY DISK DRIVE : 1.44 MB
PRINTER : TVS 80 COLOR
INTERNAL MEMORY CAPACITY : 128 MB
KEYBOARD : LOGITECH OF 104 KEYS
CPU CLOCK : 1.08 GHz
MOUSE : LOGITECH MOUSE
SOFTWARE CONFIGURATION:
This is the range of types that the .NET runtime understands, and
therefore that .NET application can use. The common type system supports
both object oriented programming like java as well as procedural languages
like ‘c’ .It deals with two kinds of entities such objects and values.
This is a subset of the CTS that all .NET languages are expected to
support. The idea is the any program that uses CLS-compliant types can
interoperate with any .NET program written in any language. If a component
written in one language (say c#) is to be used from another language (say
VB.NET) then the component writer must adhere to type and structures
defined by CLS.
2.2.1.3 CIL-Common Intermediate Language
The JIT or just in time compiler is the part of the runtime execution
environment, which is used to convert the intermediate language contained in
the execution file, called assemblies , into native executable code. The security
policy settings are referred at this to decide if code being compiled needs to be
type safe.
Forms
Toolbox
Tabs
Properties windows
Solution explorer
Output windows
Task list window
2.3.1 Forms
A form is one of the most basic objects in which the application code and
acts as a container for the controls placed on it thus providing a visual
interface. VB.NET initially includes a default form; form1 file in each new
project .Every form object has its properties, events and methods associated
with it.
2.3.2 Toolbox
methods and properties rather than a view of files are provided by the class
view in the world of object-oriented world of .NET.
Task list window is a feature that is used to provide a quick list of all the
current build and syntax errors in our application. The main advantage of using
the task list is that by double-clicking on an error listed in the window will
take us right to the troublesome point in our code.
In this chapter, concepts associated with term structured system and how
they are implemented in the project has been dealt with the tools used for structure
system analysis are,
process piping
major equipment symbols, names and identification numbers
control, valves and valves that affect operation of the system
interconnection with other systems
major bypass and recirculation lines
system ratings and operational values as minimum, normal and maximum flow,
temperature and pressure
composition of fluids
SYSTEM FLOW DIAGRAM
4. SYSTEM DESIGN
Input design is one of the most important phase of the system design. Input design is
the process where the input received in the system are planned and designed, so as to get
necessary information from the user, eliminating the information that is not required. The
aim of the input design is to ensure the maximum possible levels of accuracy and also
ensures that the input is accessible that understood by the user.
The input design is the part of overall system design, which requires very careful
attention. if the data going into the system is incorrect then the processing and output will
magnify the errors.
Input design features can ensure the reliability of the system and produce result from
accurate data or they can result in the production of erroneous information. The input design
of the system includes the following
OUTPUT DESIGN
reliable output the user may feel the entire system is unnecessary and avoids using it. The
proper output design is important in any system and facilitates effective decision-making.
Computer output is the most important and direct source of information the user.
Efficient, intelligible output design should improve the system’s relationships with the user
and help in decision making. A major form of output is the hardcopy from the printer.
Output requirements are designed during system analysis. A good starting point for
the output design is the data flow diagram. Human factors reduce issues for design involved
CODE DESIGN
an entry or attribute. Sometimes used in the place of name of the item they can be specified
also show inter relationship and may some time be used to achieve secrecy or
confidentiality.
Most computer systems are stable from the compiler down to the execution of
binary instructions. Therefore, it's natural to think of "product" as the artifact just above that
base. That's language source code. The system that produces that artifact is still quite
unpredictable, so it's not likely we'll shift our orientation. Artifacts more abstract, be they
whatever, will constitute a nebulous range of "designs" or "specifications". I think it's the
lack of a direct and strictly repeatable translation of these artifacts that characterizes them.
5. TESTING AND IMPLEMENTATION
5.1 TESTING
exercise the computer based system. Although each test has a different purpose, all work
should verify that all system element have been properly integrated and performed allocated
function. Testing is the process of checking whether the developed system works according
The philosophy behind testing is to find the errors. A good test is one that has a
high probability of finding an undiscovered error. A successful test is one that uncovers the
undiscovered error. Test cases are devised with this purpose in mind. A test case is a set of
data that the system will process as an input. However the data are created with the intent of
determining whether the system will process them correctly without any errors to produce
Types of Testing:
Unit testing
Integration testing
Validation testing
Output testing
User acceptance testing
5.1unit Testing
All modules were tested and individually as soon as they were completed and were
checked for their correct functionality.
5.2 Integration Testing
The entire project was split into small program; each of this single programs gives a
frame as an output. These programs were tested individually; at last all these programs
where combined together by creating another program where all these constructors were
used. It give a lot of problem by not functioning is an integrated manner.
The user interface testing is important since the user has to declare that the
arrangements made in frames are convenient and it is satisfied. when the frames where
given for the test, the end user gave suggestion. Based on their suggestions the frames
where modified and put into practice.
Validation Testing:
At the culmination of the black box testing software is completely assembled as a
package. Interfacing errors have been uncovered and corrected and a final series of test i.e.,
Validation succeeds when the software function in a manner that can be reasonably
After performing the validation testing the next step is output testing of the proposed
system. Since the system cannot be useful if it does not produce the required output. Asking
the user about the format in which the system is required tests the output displayed or
generated by the system under consideration. Here the output format is considered in two
ways. one is on screen and another one is printed format. The output format on the screen is
found to be corrected as the format was designed in the system phase according to the user
needs. And for the hardcopy the output comes according to the specifications requested by
the user.
User Acceptance System
Performance Testing
This project is a application based project, and the modules are interdependent with
the other modules, so the testing cannot be done module by module. So the unit testing is
not possible in the case of this driver. So this system is checked only with their performance
to check their quality.
QUALITY ASSURANCE
Correctness: The extent to which the program meets the system specifications and user
objectives
Reliablility: The degree to which the system performs its intended functions overtime
Efficiency: The amount of computer resources required by a program to perform a
function
Usability: The effort required learning and operating a system
Maintainability: To use with which program errors are located and corrected
Testability: The effort required a testing a program to ensure its correct performance
Portability: To ease of transporting a program from hardware configuration to another
Accuracy: The required position in input editing computation and output
Risk identification is the systematic attempt to specify threats to the project plan
(estimates the schedule resource overloading etc.). By identifying know and predictable risk
the first step is to avoiding them. When possible and controlling them when necessary there
are two types of risks
Generic Risk
Product specific risk
Generic risks are potential threats to every software project. Only those with a clear
understanding of technology can identify product specific risk The people and the
environment that is specific to the project at a hand and to identify the product specific risk
and the project the plan and the software statement of scope are examined and answer to the
following question is developed.
What special characteristics of this product may threaten the project
plan one method for identifying risk is to create a risk item and checklists. The checklist can
be used for risk identification and focus on some subset to know and predictable risk in the
following sub categories.
Product risk
Risk associated with overall size of software to built or
modified
Business imparts
Risk associated with constraints imposed with management
Customer characteristics
Risk associated with sophisticated of the customer and developers ability to communicate
with the customer in a timely manner.
Different categories of risks are considered
Project Risks
It identify a potential budgetary, schedule, personnel like staffing, organizing,
resource, customer requirement, problems and their impact on a software project
Technical risks
Technical risks identify potential design implementation interface, verification, and
maintenance problems.
SYSTEM IMPLEMENTATION:
turned into the working system. The most crucial stage is giving the users confidence that
organization requirements. During the implementation stage a live demon was undertaken
and made in front of end-users. The various features provided in the system were discussed
during implementation
It making the new system available to a prepared set of users (the deployment), and
positioning on-going support and maintenance of the system within the Performing
Organization (the transition). At a finer level of detail, deploying the system consists of
executing all steps necessary to educate the Consumers on the use of the new system,
placing the newly developed system into production, confirming that all data required at the
start of operations is available and accurate, and validating that business functions that
interact with the system are functioning properly. Transitioning the system support
maintenance mode of operation, with ownership of the new system moving from the Project
List of System implementation is the important stage of project when the theoretical design
is tuned into practical system. The main stages in the implementation are as follows:
Planning
Training
System testing and
Changeover Planning
Planning is the first task in the system implementation. Planning means deciding on
the method and the time scale to be adopted. At the time of implementation of any system
people from different departments and system analysis involve. They are confirmed to
practical problem of controlling various activities of people outside their own data
processing departments. The line managers controlled through an implementation
coordinating committee. The committee considers ideas, problems and complaints of user
department, it must also consider;
descriptions of these roles can be found in the Introductions to Sections I and III.
_ Project Manager
_ Project Sponsor
_ Business Analyst
_ Data/Process Modeler
_ Technical Lead/Architect
_ Application Developers
_ Customer Decision-Maker
_ Customer Representative
_ Consumer
The purpose of Prepare for System Implementation is to take all possible steps to
ensure that the upcoming system deployment and transition occurs smoothly, efficiently,
and flawlessly. In the implementation of any new system, it is necessary to ensure that the
Consumer community is best positioned to utilize the system once deployment efforts have
been validated. Therefore, all necessary training activities must be scheduled and
coordinated. As this training is often the first exposure to the system for many individuals, it
synchronized with the deployment plan and with each other. Often the performance of
_ Consumers may experience a period of time in which the systems that they depend on to
perform their jobs are temporarily unavailable to them. They may be asked to maintain
detailed manual records or logs of business functions that they perform to be entered into
responsibilities while at the same time having to continue current levels of service on other
activities to all parties involved in the project is critical. A smooth deployment requires
strong leadership, planning, and communications. By this point in the project lifecycle, the
team will have spent countless hours devising and refining the steps to be followed. During
this preparation process the Project Manager must verify that all conditions that
must be met prior to initiating deployment activities have been met, and that the final ‘green
light’ is on for the team to proceed. The final process within the System Development
the Performing Organization. In order for there to be an efficient and effective transition, the
Project Manager should make sure that all involved parties are aware of the transition plan,
the timing of the various transition activities, and their role in its execution.
Due to the number of project participants in this phase of the SDLC, many of the
necessary conditions and activities may be beyond the direct control of the Project Manager.
Consequently, all Project Team members with roles in the implementation efforts must
understand the plan, acknowledge their responsibilities, recognize the extent to which other
implementation efforts are dependent upon them, and confirm their commitment.
System Maintenance:
Maintenance is necessary to eliminate errors in the system during its working life and to
tune the system to any variations in its working environment. It has been seen that there are
always some errors found in the system that must be noted and corrected. It also means the
review of the system from time to time. The review of the system is done for:
If a major change to a system is needed, a new project may have to be set up to carry out the
change. The new project will then proceed through all the above life cycle phases.
CONCLUSION
The “File Transfer in Audio Stegnography” has been developed to satisfy all
proposed requirements. The system is highly scalable and user friendly. Almost all the
system objectives have been met. The system has been tested under all criteria. The system
minimizes the problem arising in the existing manual system and it eliminates the human
The software executes successfully by fulfilling the objectives of the project. Further
extensions to this system can be made required with minor modifications. The invention can
There is a wide scope for future development of the software. The world of
computer fields is not static it is always subject to change. The technology which is famous
today will become outdated very next day. To keep abstract of technical improvements, the
system may be refinement. So it is not concluded. Yet it will improve with further
enhancements.
It is essential to change the software when a new software arrives with more
Third Edition,2003
II