vu final project

vu final project

Tuesday, 11 November 2014

cs619 final project Mobile Hidden Object Games srs, design phase and source code

cs619 final project Mobile Hidden Object Games srs, design phase and source code

cs619 final project Mobile Hidden Object Games srs, design phase and source code


Following are some sample games for you to get the basic idea:
Hidden Object Game | WALL-E Games | Disney Games | Disney UK
House of Treasures - at hidden4fun.com
Egypt Hidden Objects - Mindjolt Games

This is a single player game so only one actor i.e. Player, Following are the required features of this project:

It should have at least 10 stages, and each stage should offer more difficulty.

In start of each stage, the game will display a list of 10 objects to find (this list can be simple text i.e. names of objects, or the shapes of the objects).

The game application should actually have 20 to-be-required required objects at each stage, but the player is required to find 10 objects. So the game will set the required 10 objects randomly every time a stage is started.

When a player touches a required object, it should be removed from required list (or it should be marked). It should also be removed or marked from the picture.

It should be a time based game. Each stage should have a fixed time to complete, or the time can be set according to difficulty level i.e. time limit decreases a few seconds on each next level. If the player is able to find all 10 objects within the specified time, the game will move to next stage, Otherwise the game ends.

It should support 2 hints for each stage. When player touches hints, the application will indicate one of objects that are still not picked up by the player.

The application should be able to save game state when player opts to save the game.The next time game is launched, it will show options to Play New Game or Continue Last Game. On choosing continue option, player should be able to resume the game from last saved state.

Application Type Tools & Technologies
It will be a mobile application, you can pick any modern mobile OS platform (e.g. Android, Apple, Windows Mobile etc) Any modern tool and technology set used for developing mobile games based on the platforms discussed in Application Type.
__________________
Vu final projects Help for Mba and Mcs
We and our Team Providing SRS,MWP,DP1,DP2 As well
project with Full Tutorial and Low Cost.
Cell no: 0313-5189209
skype: trust_aware
email: vustudent7@gmail.com
We will Surely Help you Out With Complete Documentation

cs619 final project Virtual Screen Splitter (VSP) srs, design phase and source code

cs619 final project Virtual Screen Splitter (VSP) srs, design phase and source code

cs619 final project Virtual Screen Splitter (VSP) srs, design phase and source code

(VSP) Scope:
Mostly we perform several tasks on our systems and each task may require separate windows for execution on desktop. A lot of time is consumed switching and resizing windows and face a lot of problem to view all windows at a time.
VSP will allow main screen to be split into two or more sections. It will be helpful for the active program’s window to be resized properly to one part of the screen. Using this utility, User will be able to do a split system desktop into two or more areas so that active application would not cover up “Full” physical screen when maximized. This way user can visualize parallel windows in defined area that user has a separate monitor for working (virtually) also called “multi-monitor features of Windows”.
It allows user to position and size windows to sections/areas of monitors and helps user to efficiently manage many active windows parallel.
The image depicts virtually split of desktop screen into two sections/area:

Which tools and technologies would be better for Virtual Screen Splitter (VSP )? LMS Question
__________________
Vu final projects Help for Mba and Mcs
We and our Team Providing SRS,MWP,DP1,DP2 As well
project with Full Tutorial and Low Cost.
Cell no: 0313-5189209
skype: trust_aware
email: vustudent7@gmail.com
We will Surely Help you Out With Complete Documentation

Sequence Similarity and Identity Calculator srs, design phase and source code

Sequence Similarity and Identity Calculator srs, design phase and source code

This tool will calculate similarity and identity of each sequence in an alignment.
For reference, the following links may be visited.
MatGAT (Matrix Global Alignment Tool) is tool that generates  is tool that generates similarity/identity matrices for DNA or protein sequences
Task: You will develop a tool that may handle very big alignments perhaps of unlimited size.

“LYRICSER” The Sound Mixer srs, design phase and source code

“LYRICSER” The Sound Mixer srs, design phase and source code

“LYRICSER” The Sound Mixer srs, design phase and source code

Lyricser is a desktop application which can be used to play several sound files at the same time with different volumes. Such as Sound file # 1 is playing with very low volume and sound file # 2 is playing with medium volume and so on. This software also provides us the facility to record and save the mixed sound.
User can select and play 5 sound files parallel (Software should be able to play following audio formats mp3, ra and rm, wma).
User can record and save mixed sound at his desire location on hard disk.
Besides 5 sound files which can be played at the same time, user can include any sound/his voice from microphone. Now there are 6 parallel sounds which can be played at the same time. (5 files selected from the hard disk and one input from the microphone).
Separate Volume Controller should be available for each sound file.
Separate Sound Graph should be available with each volume controller for each sound file.
There should be options for the tuning of sound effects with each volume controller for each sound file. (User would be able to optimize the bass, stereo, and other audio effects).
There would be one Master Sound Controller along with sound graph and tuning options, which would control the overall sound out put from the software. This master sound controller would also be used to play the recorded file.
__________________
Vu final projects Help for Mba and Mcs
We and our Team Providing SRS,MWP,DP1,DP2 As well
project with Full Tutorial and Low Cost.
Cell no: 0313-5189209
skype: trust_aware
email: vustudent7@gmail.com
We will Surely Help you Out With Complete Documentation

Bus Ticket Reservation System srs, design phase and source code

Bus Ticket Reservation System srs, design phase and source code

Introduction:
A bus travelling company wants to automate its ticket reservation system to bring a change in the trend of manual ticket reservation system. This system will bring improvements in the managements of bus services.

The problems with manual system is that the passengers have to stand up in a long queue to buy tickets or asking for some information. In manual system all the records are maintained in documents format which needs special place and protection to keep the saved record.

A system is required to makes the reservation system easier. This system will provide various facilities like contain record of reservation, facility to check the ticket availability, cancellation and change ticket, search for the most possible prices, Schedules of bus departure and arrival on all terminals and search and choose his/her seat position and ticket payment procedure. This website will be available online twenty four hour and seven days per a week.

The company also provides cargo services in different cities. Customers can get information about cargo services tariff, cargo services schedules and consignment tracking and hotel room reservation during stay on long tour for VIP customers.

Actors:
1. Admin
2. Call Operators
3. Manager
4. Bus Staff (Driver, Security guard , Doctor , Bus hostess)
5. Customers(users)
6. visitors

Functional Requirements:
1. System should provide facility for all actors for log into the site.
2. System should provide facility for send email/sms to all actors if they forgot password.
3. System should provide facility for register new visitors by himself.
4. System should provide facility for all actors to change his password.
5. System should provide facility for all customers to change his profile.
6. System should provide facility for only admin to add, delete and edit news and events.
7. System should provide facility for admin to reset user’s passwords.
8. System should provide facility for only admin to block, view, edit to all customers.
9. System should provide facility for only admin to add, block, view, edit to all employees.
10. System should provide facility for only admin to change all fares of tickets.
11. System should provide facility for only admin to change all fares of cargo.
12. System should provide facility for only admin to change all fares of waiting Rooms.
13. System should provide facility for only admin to add new terminal (add new city in route).
14. System should provide facility for only admin to generate staff salary slips.
15. System should provide facility for only admin to view about the credit card details of customers.
16. System should provide facility for only call operator to booking the ticket and booking cargo consignments but not confirms. Create customers account for login into the site (auto generated after booking of the ticket).
17. System should provide facility for manager to confirm the booking after payment receives.
18. System should provide facility when ticket confirms an email and sms send to the customer.
19. System should provide facility for manager he creates all the tickets slips.
20. System should provide facility for staff to check their duties time and place of duty. Each bus has total 4 member of the staff (Driver, Security guard, Doctor, Bus hostess) system provide facility for each staff member has to enter their employee id number and check his\her current scheduled.
21. System should provide facility to only customers for booking the ticket and booking cargo consignments but not confirms.
22. System should provide facility to customers to edit profile and change password.
23. System should provide facility to customers to register in site.
24. System should provide facility to customers to search reservation.
25. System should provide facility to customers to track consignments.
26. System should provide facility to generate the pdf for confirm ticket and confirm cargo reservation.
27. System should provide facility to save all the reservations of each customer.
28. provide 5% discount to all regular customers (2nd time reservation include in regular customer)
29. company provide 10% discount to family package (if buy more than 5 tickets)
30. Each bus contains 2 extra seats for emergency cases extra seats has extra reservation charges, 30 % extra charges than regular ticket rate.
31. Query the buses for two weeks (Only two weeks advance reservation is available).
32. No reservation before two days can be done.
33. Cancel reservation 50% deducted from the whole amount. (Cancellation interface closed before 3 hours of the confirm ticket date and time).
34. Change reservation 20% deduction from the whole amount. (Cancellation interface closed before 3 hours of the confirm cargo date and time).
35. System should provide facility to stay in room during the journey for the VIP customers and the paying customers
36. System should provide facility for book table in restaurant during the journey for the vip customers.
37. payment is through credit card and if customer has no credit card than customer send money through easy paisa when a money transfer sms is receive by the company with customer id number and phone no than the ticket is confirm .
38. Money is taken out from customers account after a verification call.



Tools: You can use any programming language to develop this website.

Supervisor Name: Sarfraz Awan

Email ID: sawan@vu.edu.pk
__________________
Vu final projects Help for Mba and Mcs
We and our Team Providing SRS,MWP,DP1,DP2 As well
project with Full Tutorial and Low Cost.
Cell no: 0313-5189209
skype: trust_aware
email: vustudent7@gmail.com
We will Surely Help you Out With Complete Documentation

Mute Me Here srs, design phase and source code

Mute Me Here srs, design phase and source code

Mute Me Here srs, design phase and source code

We face a problem of mobile ringing tone when we are at some place where a ringing mobile causes embarrassment for us. For example: while offering prayer in a mosque, attending a meeting, inside a library, inside a seminar hall etc. This application will provide a solution to this, using smart phone’s GPS, Google (or other) Maps feature as per mobile phone’s OS and development frameworks. It will actually require the user to define areas on the map, at which the smart phone shall be muted. The user should be able to use mute options (profile selection, vibration setting, sound setting, notification settings etc). This way as soon as a user walks into a building whose coordinates are defined in the application, the user does not have to bother about turning off the phone or setting silent option. In addition to location based muting, it will also facilitate time based muting. Following are the main project features:

This is a single user mobile application so there shall be only one actor i.e. User, Following are the required features of this project:

Location Based Muting
– Application will require user to define one or more locations at which the mobile phone shall be muted.

– Phone should be muted when user moves into any of the pre-defined locations and it should be automatically un-muted when the user walks out of that location. For this purpose, application must store the last used settings before muting and un-muting to apply or restore.

– User should be able to define mute settings. Either full profile selection from default profiles of the phone, or define settings separately i.e. phone settings for volume, vibration, LED or backlight notification (if available in the phone set).

Time Based Muting
– Application will allow user to define time based muting, instead of location based muting. The time based muting shall mute the phone based on pre-defined time spans, further setting/working will be similar to what discussed in Location Based Muting section.

Application Type: It will be a native mobile application. You can pick any modern mobile OS platform (e.g. Android, Apple, Windows Mobile etc) for smart phones.

Tools & Technologies: Any modern tool and technology set, used for developing mobile applications based on the platforms discussed in Application Type.

Supervisor Name: Usman Waheed

Email ID: usman.waheed@vu.edu.pk
__________________
Vu final projects Help for Mba and Mcs
We and our Team Providing SRS,MWP,DP1,DP2 As well
project with Full Tutorial and Low Cost.
Cell no: 0313-5189209
skype: trust_aware
email: vustudent7@gmail.com
We will Surely Help you Out With Complete Documentation

Authentication Technique with OTP srs, design phase and source code

One time password (OTP) is just what the name gives you an idea about a password that is only applicable for one login. The advantage of OTPs is that it proposes much higher security than static password also called conventional way of authentication. OTPs is protected against password sniffing attacks, if an hacker use software to collect your data traffic, video records when you type on your keyboard, or use social engineering, it doesn't matter since the password that the attacker gets hold on will not be valid to use. An OTP can be generated using different methods and is often used in combination with a device that is synchronized with an authentication server.

Time-Based OTPs In the time-based method, a device with an internal clock generates passwords that are depending on the current time. For example, every minute a new password is generated in the device, and the same password is generated at the authentication server. When the user wants to login to a service or system, the current OTP that is displayed on the device is used.

The user's mobile phone will work as the authentication device, in which the user have to enter a 4-digit PIN code to generate an OTP that can be used for login. This is done by any mobile supported application running on the phone.
The OTP that is generated on the mobile phone is based on three components which will be hashed together with MD5 or any well known encryption algorithm.

Functional Requirements:
1. 4-digit PIN code that the user enters.

2. A secret random number that was created during device-initialization (Init-secret) that only exists on the user's mobile device.

3. The OTP algorithm simultaneously executes the code at mobile as well as Server and generates one time password that will be valid defined session /time stamp.

4. Make log file (Data base) manage all record of specific user id.

5. After the login application operates any other operation.

Application Type:

It will be a native mobile application; you can use any modern mobile OS platform (e.g. Android, Apple, Windows Mobile etc) for mobile application and PHP/Dot net frame for server side languages.


The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.

md5 Hash Generator
MD5 - Wikipedia, the free encyclopedia

Algorithm [edit]


Figure 1. One MD5 operation. MD5 consists of 64 of these operations, grouped in four rounds of 16 operations. F is a nonlinear function; one function is used in each round. Mi denotes a 32-bit block of the message input, and Ki denotes a 32-bit constant, different for each operation. left shifts denotes a left bit rotation by s places; s varies for each operation. Addition denotes addition modulo 232.

MD5 processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks (sixteen 32-bit words); the message is padded so that its length is divisible by 512. The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits fewer than a multiple of 512. The remaining bits are filled up with 64 bits representing the length of the original message, modulo 264.

The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C, and D. These are initialized to certain fixed constants. The main algorithm then uses each 512-bit message block in turn to modify the state. The processing of a message block consists of four similar stages, termed rounds; each round is composed of 16 similar operations based on a non-linear function F, modular addition, and left rotation. Figure 1 illustrates one operation within a round. There are four possible functions F; a different one is used in each round:
F(B,C,D) = (B\wedge{C}) \vee (\neg{B} \wedge{D})
G(B,C,D) = (B\wedge{D}) \vee (C \wedge \neg{D})
H(B,C,D) = B \oplus C \oplus D
I(B,C,D) = C \oplus (B \vee \neg{D})
\oplus, \wedge, \vee, \neg denote the XOR, AND, OR and NOT operations respectively.

Scratch the card and insert 14 digit number for card loading is normal and regular activity for mobile users. In this project user will just take picture for mobile card and it will be automatically recharged.

This MD5 hash generator is useful for encoding passwords, credit cards numbers and other sensitive date into MySQL, Postgress or other databases. PHP programmers, ASP programmers and anyone developing on MySQL, SQL, Postgress or similar should find this online tool an especially handy resource.

What is an MD5 hash?
An MD5 hash is created by taking a string of an any length and encoding it into a 128-bit fingerprint. Encoding the same string using the MD5 algorithm will always result in the same 128-bit hash output. MD5 hashes are commonly used with smaller strings when storing passwords, credit card numbers or other sensitive data in databases such as the popular MySQL. This tool provides a quick and easy way to encode an MD5 hash from a simple string of up to 256 characters in length.

MD5 hashes are also used to ensure the data integrity of files. Because the MD5 hash algorithm always produces the same output for the same given input, users can compare a hash of the source file with a newly created hash of the destination file to check that it is intact and unmodified.

An MD5 hash is NOT encryption. It is simply a fingerprint of the given input. However, it is a one-way transaction and as such it is almost impossible to reverse engineer an MD5 hash to retrieve the original string.

Time-Based OTPs In the time-based method, a device with an internal clock generates passwords that are depending on the current time. For example, every minute a new password is generated in the device, and the same password is generated at the authentication server. When the user wants to login to a service or system, the current OTP that is displayed on the device is used.

Supervisor Name: Tanweer Arshad

Email ID: as2@vu.edu.pk
__________________
Vu final projects Help for Mba and Mcs
We and our Team Providing SRS,MWP,DP1,DP2 As well
project with Full Tutorial and Low Cost.
Cell no: 0313-5189209
skype: trust_aware
email: vustudent7@gmail.com
We will Surely Help you Out With Complete Documentation