Study Galaxy

Dear friends we are happy to inform you that we launched our new website for you, this website have complete study materials like Notes, Project Reports and PPTs for every subject and student, so please visit us at www.studygalaxy.com.
Thanks

Sunday, April 24, 2011

Project Report On ATM

Report On ATM

Download

Description:
PROJECT REPORT ON SOFTWARE FOR IMPLEMENTATION OF ATM
INTRODUCTION
An Automated Teller Machine (ATM) allows customers to perform banking transactions anywhere and at anytime without the need of human teller. By using a debit or ATM card at an ATM, individuals can withdraw cash from checking or savings accounts, make a deposit or transfer money from one account to another or perform other functions. You can also get cash advances using a credit card at an ATM. Individuals should be aware that many banks charge transaction fees – generally ranging from Rs 50-150 per transaction -for using another bank’s ATM.

The ATM is online with the bank, that is, each transaction will be authorized by the bank on-demand and directly debited from the account's owner. The ATM works as follows. First, the client will insert his/her client card in the ATM and then the ATM will ask for a Personal Identification Number (PIN) , if the number is entered incorrectly several times in a row, most ATMs will retain the card as a security precaution to prevent an unauthorized user from working out the PIN by pure guesswork. Once the correct PIN is given, the ATM will ask for the amount of money to be withdrawn. If the amount is available and if the client has enough money on his credit then the said amount of money will be paid. Whether the amount of money is payable or not, i.e. the ATM has enough cash but could be the case the ATM has no change for that amount, will be also checked. Once the money is offered to the client a countdown is started, i.e. the client has a determined amount of time to pick up the money. If this timeout is over, the money will be collected by the ATM and the transaction will be rolled back.

Project Report On Automatic Beverage Vending Machine

Automatic Beverage Vending Machine Report

Download

Description:
INTRODUCTION
An automated beverage vending machine comprises of a micro controller which is programmed to instruct the system to serve the beverage. Machine will activate when the user insert a five rupee coin into coin slot. This coin will be detected by an IR-sensor and send a signal to micro controller. The machine comprises of cylinder controlled by micro controller. A fixed volume beverage is filled in the main container. The beverage is poured in the glass through tap which opens and closes after fixed time period and only activated when container is filled. Hence, the user gets the beverage demanded by him by fully automated technique.

RESOURCES:
AUTOMATIC BEVERAGE VENDING M/C
INTRODUCTION

An automated beverage vending machine comprises of a micro controller which is programmed to instruct the system to serve the beverage. Machine will activate when the user insert a five rupee coin into coin slot. This coin will be detected by an IR-sensor and send a signal to microcontroller. The machine comprises of cylinder controlled by microcontroller. A fixed volume beverage is filled in the main container. The beverage is poured in the glass through tap which opens and closes after fixed time period and only activated when container is filled. Hence, the user gets the beverage demanded by him by fully automated technique.

RESOURCES:

Diptrace
Microcontroller programmer(burner)
Hitech c compiler for pic microcontroller
Solder kit
Multimeter
Breadboard

Project Report On HTML

HTML Report

Download

Description:
INTRODUCTION
OVERVIEW:
This is dynamic website which gives all the information about a book store, helps the user to find books of their choice with little bit of introduction about the book with ease.
The website has been developed in HTML, JSP and HTML is a markup language which is in reality a backbone of any site, every site can’t structured without the knowledge of html.
If we make our web page only with the help of html, than we can’t add many of the effective features in a web page, for making a web page more effective we use various platforms such as JSP.
So here we are using these entire features to make our web pages more effective as well as efficient.
And to make our web pages dynamic we are using JSP here.

Project Report On JAVA

Java Report

Download

Project Report On Java

Download

Java Project Report

Download

Project Report On LINUX

Report On LINUX

Download

LINUX Project Report

Download

Project Report On Microcontroller Based Alarm System

Microcontroller Based Alarm System Report

Download

Description:
MICROCONTROLLER BASED ALARM ANUNCIATOR SYSTEM

Today, all instrumentation systems pertaining to industrial process control as well as domestic applications, involve some type of automatic fault - finding facility. This facility detects the faulty condition of the system and draws the attention of the operator towards it, enabling him to take suitable remedial action to ensure the proper operation of the system.

One such method is annunciation in which activation of a visual or a mechanical indicator (called annunciator) takes place when a remote switch or device has been activated as result of fault in certain part of the system. An audio alarm may also be associated with annunciators.

This microcontroller based annunciator system detects up to eight different faulty conditions and informs the operator about them. It is assumed that each faulty condition results in closing of one of the eight interlock links. Eight flashing Light Emitting Diodes (LEDs), corresponding to each of the eight links, have been used as annunciators.

Each annunciation also results in an audible alarm. Here only the faults persisting for more than 20 milliseconds are considered as critical and faults persisting for less than 20 milliseconds are rejected.

Project Report On MODEMS

MODEMS Report

Download

Description:
Modems:
An Introduction
The middlemen between the computer and the telephone system
Convert analog data suitable for transmission over a phone line to digital data suitable for a computer (modulator/demodulator)
Can be either an external device or an internal device that is installed in an expansion slot inside a computer
A phone line connects to a modem or telephone using either an RJ-11 or older RJ-12 connector
We want connect one computer to another computer by internet then we can use the modem

Modem Types

Telephone modem

Optical Modem (Optical fiber)

Cable modem

DSL Modem

etc

Project Report On Networking

Report On Networking

Download

Description:
INTRODUCTION

Although the history of the Internet is relatively short, its growth has been dynamically explosive. The number of Internet users worldwide has grown from 95 million to 130 million in 1998, and it is projected that there will be 350 million users in the year 2003 (eMarketer, 1998). The Internet is a worldwide collection of networks that links together millions of computers by various means, such as modems, fiber optic lines, routers, and servers. It provides connections to businesses, the government, industries, educational institutions, and individuals.

Each of these organizations has become increasingly dependent on networks and distributed computing and processing systems. Furthermore, because they possess a critical and integral asset of information, inter networking security and what measures to protect this information has become a major area of concern. In this report we will address the key concepts of network security, common network vulnerabilities, network security threats and attacks, security measures and tools, and the development of a network security policy and proper violation response plan.

A breach in network security could cost your company a great deal in lost productivity, lost data, repair work, and loss of confidence among customers, partners, and employees. But these damages are preventable. You just need a solid security strategy and a well-planned implementation. With the explosion of the public Internet and e-commerce, private computers and computer networks are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees, and even human error all represent clear and present dangers to networks. And all computer users, from

The most casual Internet surfers to large enterprises could be affected by network security breaches.

With the rapid explosion of e-commerce and the Internet as a serious business tool, a lot of attention has been given to “information security.” Helping businesses securely manage information has become a multi-billion dollar industry. Companies such as Verisign®, Microsoft®, Cisco®, Oracle® and SUN Microsystems®, to name a few, all spend a significant amount of time and money developing their services with security in mind.

For purposes of this document, rather than describe what security is, we’ll discuss the needs that security should fill. We’ll address the need for physical security, back-ground checks, firewalls, access codes, to-kens and other methods all designed to protect one’s information. In general, the need for security can be summed up as follows

Project Report On ORACLE

Report On ORACLE

Download

ORACLE 9I Database Report

Download

Project Report On SAP

Report On SAP

Download

Description:
The result of change is development and thus new things come into existence. Now a days computer spreads its arms in almost all fields. Earlier the attention was given on hardware development, but when the importance of software is known the more attention is given on software development.

The application software is one of part of this change. The objective of the project “LIBRARY MANAGEMENT” is to represent the procedure of any library by software means. We have tried to present the wonderful Library management system software and its application in simple and easy to understand.

This project is based on C++ for windows. The features, commands and functions of “LIBRARY MANAGEMENT” are completed very simple and clearly. The figures in this report are the actual screen image on monitor & actual printer.

Project Report On SQL

SQL Report

Download

SQL Intermediate Report

Download

Saturday, April 23, 2011

Project Report On Wimax

Wimax Report

Download

Description:
Introduction
Worldwide Interoperability for Microwave Access, or WiMAX for short, is a next generation open standard that seeks to serve users' increasing demands for high data throughput (broadband) services such as streaming media on the internet, live video conferencing, and mobile TV on computers as well as handsets and PDAs. WiMAX is expected to be integrated into the next generation mass market consumer devices and to offer something that does not exist today – speeds similar to cable and metropolitan area coverage while on the move, all for a much lower cost than we are used to today. WiMAX already offers broadband services in many emerging and rural markets which are not supported by wireline-based technologies and started its first deployment in developed countries replacing both commonly used Wi-Fi on one hand and traditional cellular standards such as 3G.

IEEE 802.16 is the standard to state the radio frequency of fixed Broadband Wireless Access. WiMAX is the trade name of “IEEE 802.16 Standard”. IEEE 802.16 was first planned to offer the last mile for Wireless Metropolitan Area Network (WMAN) with the line of sight (LOS) of 30 – 50 km.

Basically the goal of WIMAX is to provide high speed internet access to home and business subscribers without wires. It supports legacy voice systems, voice over IP, TCP/IP, Application with different QOS requirements. 802.16 consist of the access point, base station and subscriber station. During a communication, all the information coming from a subscriber station go to the base station and retransmitted back to subscriber station. Base station can handle multiple of subscriber station. Two types of links are defined in this:-

The downlink: From base station to the subscriber station.
The uplink: From subscriber station to the base station.

Project Report On Visual Basic

Report On Visual Basic

Download

Description:
OBJECTIVE & SCOPE OF PROJECT

The main objective of this project is that to minimize the handwritten work to small as possible and provide user an automated environment in which he/she can work efficiently and also in user friendly environment.

The scope of the project generally lies at the places like schools , colleges & universities where faculties attendance maintenance are major requirement because on basis of this the salary of person can be calculated, this project is on very small basis means to say not on big scale we can implement it on bigger scale in form of maintaining student attendance ,apart from this the same concept can be applied in various business firms (public and private) which are fully automated with computer and the company has to maintain the regularity of employers also at these places it is not possible to maintain large records files which require a separate room for storage so to avoid this we made this software in which database are maintained which cover very less space then the space taken by files etc.


Related Posts Plugin for WordPress, Blogger...