Amfas Tech | Technology, Blogging & Internet Marketing: Projects

10 Mini Projects in C Language with Source Code

The following are the list of 10 mini projects built in C language which are readily coded for you. All you have to do is prepare your documentation according to the modification you do on the code of these projects.

1. Cricket Score Board Project:
How to Execute – Extract the project files and run ScoreSheet.exe file to execute the project.
Download Link

2. Customer Billing System Project:
How to Execute – Load the CustomerBillingSystem.c in to C editor and execute the program in routine way.
Download Link

3. Pacman Game Project
How to Execute – Extract the project files into a separate folder and run Pacman Game in C.exe file to execute the program.
Download Link

4. Typing Tutor Project
How to Execute – Extract the project files into a separate folder and run TT.exe file to execute the program.
Download Link

5. Hospital Management System Project
How to Execute – Extract the project files in to a folder and run Hospital Management Project.exe file to execute the project. You can even load the Hospital Management project.c file into C editor and execute the program the routine way.
Download Link

6. Calendar Application Project
How to Execute – Extract the project files in to a folder and run calendar.exe file to execute the project. You can even load the calendar.c file into C editor and execute the program the routine way.
Download Link

7. Employee Record System Project
How to Execute – Extract the project files in to a folder and run Employee Record System.exe file to execute the project. You can even load the Employee Record System.c file into C editor and execute the program the routine way.
Download Link

8. Cyber Management System Project
How to Execute – Extract the project files and run the client side and server side main.exe files to execute the project.
Download Link

9. Medical Store management System Project
How to Execute – Extract the project files in to a folder and run Medical Store Management.exe file to execute the project. You can even load the Medical Store Management.c file into C editor and execute the program the routine way.
Download Link

10. School Billing System Project
How to Execute – Extract the project files in to a folder and run School Billing System.exe file to execute the project. You can even load the School Billing System.c file into C editor and execute the program the routine way.
Download Link

Hack some code and customize them as per your requirements.
Continue Reading

Asp.Net Project on Tourism with SQL DataBase

Description: A sample project which explains about developing an Asp.Net Application in layered architecture. This application has all coding standards in place. This project is developed only for freshers and junior developers. It has Object Oriented Programming which helps Freshers and Junior developers to easily understand how project will be developed any software company.

Note: It is not an advanced project which means it doesn’t have Business Rules, Security, Roles etc, this application will helps to understand how to develop an application using classes and reusable data access objects etc.


Download Source Code & Documentation
Continue Reading

Dot Net Project On Ad Release Management | Source Code Download Available

Background:

Mega Mart wanted to revive its brand image ,so it hired an ad agency for it.The ad agency came up with brilliant ideas for marketing.They created ads of all types like audio, video, print media etc.The task of managing these ads was huge and they wanted a software developed to manage the process better.

Application has mainly six functions:

  • Entering User Id and password in the Login screen. 
  • Viewing Advertisement pricing details. 
  • Viewing Strategy report. 
  • Entering Advertisement pricing details. 
  • Budget Allocation by the manager. 
  • All the data should be saved to database generating unique records. 
  • Display message to the user.

Ad Release Management-Video Process:

  • There are two roles in the Ad Agency i.e. staff and manager. 
  • The staff is entitled to view his own advertisement details and can enter new Ad details. 
  • The Manager is entitled to view the strategy report, which shows the details of all Ads entered by the staff and is also responsible to create new budget for the forth coming period. 
  • The Application has three main pages 
  • Login Page 
  • Staff Report Page 
  • Manager Report Page
Continue Reading

Intranet Chatting Java Mini Project | Abstract & Source Code Download

Purpose of the project

This Project Entitled as „INTRANET CHATTING‟ is used basically for chatting purpose with the remote clients or users on Internet or local networks. Here in this project a java client / server combination is used to chat with remote users. When a Client wants to chat with a user on a remote host, he sends a request to the Server with a identification name like chat-id, the server responds to the request by identifying the client-id which is already registered in the server domain and when matched his request is granted and the client can begin to chat with the remote users present on the internet or local network.

The power of Internet is such that it integrates together LANs located across diverse software and hardware forms into a single large communication network that spans the globe. The client needs to have a client software such as Netscape Navigator or Internet Explorer to retrieve information as well as chat on the www. WWW is referred to as Netsurfing. And it supports chatting, text, video and audio.

The benefit of using “INTRANET CHATTING” over other chatting tools is that, with the help of java, the programmer can create applet applications which can be use the internet as a server. Applets are machine independent and so java programs can run on any computer on the internet.

The term client/server is used in the context of networking, what it actually means. It is important to understand the terms client/server because the INTRANET CHATTTING project is supported completely by client/server model. A server is anything that has some resource that can be shared. There are compute servers, which provide computing power, web servers, which store web pages. A client is simply any other entity that wants to gain access to a particular server. The interaction between client\server is like an interaction between an electrical socket and a lamp. The server is a permanently available resource while client is free to “unplug” after it has been served. The program's premier feature is its whiteboard drawing utility. You can draw freehand, do circles, squares, lines, text, or paste image files to the canvas. This is ideal when users want to "sketch" concepts for one another. Users can interact publicly with everyone else on the server, or they can chat/draw privately using java Chat's "whisper mode". Users can create and manage chat rooms, which can be either "public" or "private". The server will also store and manage answering machine-style messages for users who aren't online, and instant messages can be sent to those who are. Additionally, users who aren't watching their screens can be paged with sound.

Continue Reading

An IEEE PHP Project: Efficient Anonymous Message Submission

ABSTRACT

In online surveys, many people are not willing to provide true answers due to privacy concerns. Thus, anonymity is important for online message collection. Existing solutions let each member blindly shuffle the submitted messages by using the IND-CCA2 secure cryptosystem. In the end, all messages are randomly shuffled and no one knows the message order. However, the heavy computational overhead and linear communication rounds make it only useful for small groups. In this paper, we propose an efficient anonymous message submission protocol aimed at a practical group size. Our protocol is based on a simplified secret sharing scheme and a symmetric key cryptosystem. We propose a novel method to let all members secretly aggregate their messages into a message vector such that a member knows nothing about other members’ message positions. We provide a theoretical proof showing that our protocol is anonymous under malicious attacks. We then conduct a thorough analysis of our protocol, showing that our protocol is computationally more efficient than existing solutions and results in a constant communication rounds with a high probability.

EXISTING SYSTEM
Existing solutions let each member blindly shuffle the submitted messages by using the IND-CCA2 secure cryptosystem. In the end, all messages are randomly shuffled and no one knows the message order. However, the heavy computational overhead and linear communication rounds make it only useful for small groups.

PROPOSED SYSTEM
We propose an efficient anonymous message submission protocol aimed at a practical group size. Our protocol is based on a simplified secret sharing scheme and a symmetric key cryptosystem. We propose a novel method to let all members secretly aggregate their messages into a message vector such that a member knows nothing about other members’ message positions. We provide a theoretical proof showing that our protocol is anonymous under malicious attacks. We then conduct a thorough analysis of our protocol, showing that our protocol is computationally more efficient than existing solutions and results in a constant communication rounds with a high probability. We propose security sharing scheme using some protocol.

Continue Reading

An IEEE PHP Project: Question Answering System for an Effective Collaborative Learning

ABSTRACT:


The increasing advances of Internet Technologies in all application domains have changed life styles and interactions. With the rapid development of E-Learning, collaborative learning is an important for teaching, learning methods and strategies. Interaction between the students also student with the teacher is important for student to gain knowledge. In this paper, we introduce an effective question answering Q&A system for collaborative learning, which can act not just like a virtual teacher, but also virtual discussion for student. With the proposed system, brings a new Q&A system, student can attach their question when they want collaborate using collaborative learning capitalize on one another’s resources and skills. Students can ask their questions to the group when they want to collaborate with others, asking one another for information, evaluating one another’s ideas, then each of the answer will compare with encyclopedia data base.

 Question Answering System for an Effective Collaborative Learning
Download Full Abstract
Download Full Base Paper
Continue Reading

An IEEE Project on Secure Computing: Detecting Anomalous Insiders in Collaborative Information Systems

ABSTRACT

Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed CADS consists of two components: relational pattern extraction, which derives community structures and anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities.

To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, Meta CADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent.

EXISTING SYSTEM

In the existing experiment, the performance of the supervised classification models is significantly worse than the unsupervised models. The supervised models consistently have a lower true positive rate at all operating points. In the existing model is not correctly characterizing the intruders which access a larger number of records. Third, with respect to AUC, we observe the same trend as earlier regarding the dominance of the unsupervised models as a function of the mix rate.

PROPOSED SYSTEM

In this project, we introduce a framework to detect anomalous insiders from the access logs of a CIS by leveraging the relational nature of system users as well as the meta information of the subjects accessed. The framework is called the community anomaly detection system, or CADS, and builds upon the work. To detect anomalous insiders in a CIS, we proposed CADS, a community anomaly detection system that utilizes a relational framework. To predict which users are anomalous, CADS calculates the deviation of users based on their nearest neighbor networks.

Our model is based on the observation that “normal” users tend to form communities, unlike illicit insiders. To evaluate the performance of our model, we conducted a series of experiments that compared our framework with the state-of-the-art anomaly detection methods for CIS systems. In the experiments, we mixed simulated users with the real users of a real electronic health record system. Our results illustrated that the community-based models exhibited better performance at detecting simulated insider threats.

Continue Reading

An IEEE Java Project: FADE- Secure Overlay Cloud Storage with File Assured Deletion

ABSTRACT:

We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key elements, a gossip protocol that meets our design goals: fairness of resource allocation with respect to hosted sites, efficient adaptation to load changes and scalability in terms of both the number of machines and sites. We formalize the resource allocation problem as that of dynamically maximizing the cloud utility under CPU and memory constraints. While we can show that an optimal solution without considering memory constraints is straightforward (but not useful), we provide an efficient heuristic solution for the complete problem instead. We evaluate the protocol through simulation and find its performance to be well aligned with our design goals.

EXISTING SYSTEM:

In Existing system the outsource data backup to third-party cloud storage services will cost more for data management and security concerns arise in terms of ensuring the privacy and integrity of outsourced data.

Vanish:

Divide the data key into many key shares.

Weakness:

Time based no fine-grained control.


PROPOSED SYSTEM:

In proposed system we present FADE, a secure overlay cloud storage system that ensures file assured deletion and works seamlessly atop today’s cloud storage services. FADE decouples the management of encrypted data and encryption keys, such that encrypted data remains on third-party (untrusted) cloud storage providers, while encryption keys are independently maintained by a key manager service, whose trustworthiness can be enforced using a quorum scheme. FADE generalizes time-based file assured deletion (i.e., files are assuredly deleted upon time expiration) into a more fine-grained approach called policy based file assured deletion, in which files are associated with more flexible file access policies (e.g., time expiration, read/write permissions of authorized users) and are assuredly deleted when the associated file access policies are revoked and become obsolete.

Design Of Fade:

1.Work atop todays cloud as an overlay.
2.Achieve protection from cloud clients perspective,no changes on the cloud provider
side.

Security Of Fade:

1.Fine-grained file assured deletion:Files are permanently inaccessible based on
policies.

Continue Reading

A Dot Net Project on ‘Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points’

ABSTRACT

 

Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. There for, this project work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method.

 

Download Full Abstract & Source Code

Continue Reading

A Dot Net Project on Time Sheet Monitoring

Abstract

The Project Time Sheet Monitor System is the web based application which deals exclusively the Time Sheet of  the Developer , Manager , Administration of the particular company. This project even deals with Expense sheet also , but presently we deal only with the Time Sheets of the Developer worked on a particular project for a week. It basically list outs the Developers , Projects and the Manager ‘s working for the Company and for which projects they are working for. It even ease the task of the company to review the work efforts of each employee for each work and even reveal the productive work done by them. The company can even assess the project status by looking at the Time Sheet globally , as the developer can type his daily time sheet sitting at his place and logging into this site through net. Once the user ( may be a Developer / Administrator / Manager ) logs on to the net and browse the site and write the Time sheet daily or once in a week , that would be reflected to the database once in a week and that would be reviewed by his manager sitting any where and estimate the productive work done by him for the complete week. The company will be able to view the entire work done by the employees sitting anywhere on the net. Hence this project is very useful for every software companies, Once the user enter to into the site and logs on with his username and password and enters his time sheet for that day or he may enter the whole time sheet for a week , once the user enters for a week then only the data will be entered into the database through ebiz server , till then the data will be stored as an xml document on the server. Hence this is the mechanism involved in the project. It is very useful to the companies to maintain the information of the status of every projects and Developers.

 

Download Source Code

Continue Reading

Dot Net Project on ShoppingMart with Source Code

Continue Reading

Java Project on ATM Machine Working with Source Code

This project will demonstrate you how an ATM machine works actually. We will upload base paper and abstract soon.

Continue Reading

A Dot net Project on Enterprise Organization Portal

Abstract

System with adaptability to any organization to monitor the work done by people with respect to time and also assigning work Captures daily work done by employees Provides communication module. Summary reports on work done by employees. Attendance report based on the entered work details. Online work log entry and work assignment. Online leave application and sanctioning. Address book to store the contact numbers and personal information Scheduler to keep mark notes on a particular day. Feedback which ensures the management to look up the comments By the employ Uploading and downloading facility Information about all the existing branches of the organization. The newsletters regarding the day to day affairs of the organization. The proposed Enterprise Organization System consists of a login screen from which the users and administrator could logon in to the system. In this System, the users are given different roles. Each role is associated with some services. The various roles are teaching faculty, programmers, lab assistants, testers, System analysts, in charge of sub centers, accountant, counselor etc. Admin is the head of all branches and is responsible for user management and the database administration. 

 

The Enterprise Organization System process starts with the creation of users and mapping their roles from the administrator login. The system will maintain the check-in time and checkout time daily and will allow the users to enter their work log daily and has a provision to enter the yesterdays work log details also(exemption given to  enter backlogs of previous day).

 

The attendance report will be generated based upon the work log entered and the holidays list that was given and based upon a constraint that the first 15 leaves or absence will be considered as leaves only. Exceeding of that 15 will be treated as absent and the salary will be deducted based upon that.

 

Reports to view the work done by the users day wise, weekly, month wise based on the work log entered by the users facilitated. Messaging facility is also there through which users can interact with other users. Notice board facility is also provided in order to put some files to download the contents like ppts, salary statements. Address book facility to add the contact details of the friends of the user. Scheduler to keep track notes on a particular day schedule. Meetings, feedback details can also be added.

 

Download Full Abstract & Source Code

Continue Reading

A Dot Net Project on Compressed Sensing Enabled Video Streaming for Wireless Multimedia Sensor Networks

Abstract

This article1 presents the design of a networked system for joint compression, rate control and error correction of video over resource-constrained embedded devices based on the theory of compressed sensing. The objective of this work is to design a cross-layer system that jointly controls the video encoding rate, the transmission rate, and the channel coding rate to maximize the received video quality. First, compressed sensing based video encoding for transmission over wireless multimedia sensor networks (WMSNs) is studied. It is shown that compressed sensing can overcome many of the current problems of video over WMSNs, primarily encoder complexity and low resiliency to channel errors. A rate controller is then developed with the objective of maintaining fairness among video streams while maximizing the received video quality. It is shown that the rate of compressed sensed video can be predictably controlled by varying only the compressed sensing sampling rate. It is then shown that the developed rate controller can be interpreted as the iterative solution to a convex optimization problem representing the optimization of the rate allocation across the network. The error resiliency properties of compressed sensed images and videos are then studied, and an optimal error detection and correction scheme is presented for video transmission over losing channels.

 

Download Full Abstract & Source Code

Continue Reading

A Project on Multi Banking Account System | Abstract & Source Code Free Download

Abstract

The Multi Banking System Interface is targeted to the future banking solution for the users who is having multiple bank accounts in multiple banks. This interface integrates all existing banks and provides business solutions for both retail and corporate.

 

This system acts as a standard interface between the clients and all the banks. By using this portal any client who maintain accounts in various banks can directly log on to Multi Banking System Interface and make any kind of transactions. In the backend, system will take care of the entire obligation required in order to carry on transaction smoothly.

Scope:

The objective of this application to make the Customers of various Banks can do their account accessibility and transactions using this solution.  They need not to interact with various applications or web sites of each bank.  The Admin will add new Bank details and can update the existing details of the bank.  The Admin will accept/reject the registration of a Customer to use this application.

 

The Bank Admin makes access this site to see the all Customer transactions, account Transfer status, etc.  He/she can accept or reject the fund transfer of the Customer.  Should able to provide Response for the queries related to the Customers.

 

The Customers should make request for multiple bank account access to the Administrator.  He/she can view the Account related information.  The customer should able to transfer the amount from one bank to another bank account using this system by providing the Secondary authentication details.  The customer also facilitated to generate report for own bank details for a respective period.  The Customer should able to send Queries to the Bank Admin.

 

Download Full Abstract & Source Code

Continue Reading

A Project on Desi Gallery | Download Abstract & Source Code

INTRODUCTION

PURPOSE OF THE PROJECT

Purpose of a project is to provide an environment for sharing photos bundled in the form of gallery with your loved ones or with the rest of the world. The application should have a controlling environment from where the administrator can manage galleries.  The application can be generalized as a product, which can be used for other activities such as hosting personal portfolio’s, client portfolio’s, etc.

 

PROBLEMS IN THE EXISTING SYSTEM

The current system is a manual system where in the sharing is done manually by printing multiple copies of the same pictures and posting the copies to different people, in which the cost of printing and posting will be added burden on the person. In case the application is used for portfolio hosting an unavailability of application such as Desi gallery with cost heavily for a person interested in sharing his portfolio.  As a free resource for sharing the pictures the person printing the photos can easily host the pictures for customers for sharing them as a service to customer. Providing one such service will attract more customers and benefit the organization implementing Desi gallery.

 

SOLUTION OF THESE PROBLEMS

Desi gallery is a unique solution for managing galleries online.  Easy user interfaces and hosting of images online is a feature, which makes the uploading the content to web environment a difficult issue. Managing the cache to speed up the slide show feature for the clients speeds up the viewing abilities of the viewers. The printing functionality is supported by other website where in the person can order for the interested prints which will be delivered to the customer

 

Download Abstract & Source Code

Continue Reading

Dot Net project on Automatic Reconfiguration for Large-Scale Reliable Storage Systems

Abstract

Byzantine-fault-tolerant replication enhances the availability and reliability of Internet services that store critical state and preserve it despite attacks or software errors. However, existing Byzantine-fault-tolerant storage systems either assume a static set of replicas, or have limitations in how they handle reconfigurations (e.g., in terms of the scalability of the solutions or the consistency levels they provide). This can be problematic in long-lived, large-scale systems where system membership is likely to change during the system lifetime. In this paper, we present a complete solution for dynamically changing system membership in a large-scale Byzantine-fault-tolerant system. We present a service that tracks system membership and periodically notifies other system nodes of membership changes. The membership service runs mostly automatically, to avoid human configuration errors; is itself Byzantine fault- tolerant and reconfigurable; and provides applications with a sequence of consistent views of the system membership. We demonstrate the utility of this membership service by using it in a novel distributed hash table called dBQS that provides atomic semantics even across changes in replica sets. dBQS is interesting in its own right because its storage algorithms extend existing Byzantine quorum protocols to handle changes in the replica set, and because it differs from previous DHTs by providing Byzantine fault tolerance and offering strong semantics. We implemented the membership service and dBQS. Our results show that the approach works well, in practice: the membership service is able to manage a large system and the cost to change the system membership is low.

 

Download Full Abstract & Source Code

Continue Reading

15 Java Engineering Projects with Source Code & Documentations | Part 3

Continuation of 15[4-7] Java Engineering Projects with Source Code & Documentations | Part 2
8. Online Exam Project
Features:
  • This is an online examination project in which students can take the exam of any one of the listed subjects.
  • During the exam, any activity of violating rules is being checked question to question and time to time.
  • After the completion of the exam, all the answers would be corrected comparing the correct answers in the database.
  • The results will be declared and reported separately to each who take the exam.

9. Online Library System
Features:
  • Add, remove or view members
  • Add, remove or view books
  • Can lend books
  • Calculation of returning time
  • Generate reports
  • Authenticated users only can access

10. Online Shopping
Features:
  • Registration required
  • Login to see available products
  • Can add/remove products into cart
  • Cart is updated when anything new added
  • Can view list of products in cart
  • Checkout safely

11. Mobile Information System
image

Sorry about this project. We could only find PPT about this project. Hope it will help you!


Continue to 15[12-15] Java Engineering Projects with Source Code & Documentations | Part 4
Continue Reading

15 Java Engineering Projects with Source Code & Documentations | Part 2

Continuation of 15[1-3] Java Engineering Projects with Source Code & Documentations | Part 1

4. AvailDoctors.com Project
availdoctors.com
Appointment form
Doctor's Registration Form


5. Project on Internet Banking

Project on Internet Banking


6. Java Mail Filter Project

Features:
  • Header Mail Filter
  • Mail Filter
  • MessageID Mail Filter
  • Null Mail Filter
  • Recipient Mail Filter
  • Sender Mail Filter
  • Size Mail Filter
  • Subject Mail Filter

7. Online Courses

Features:
  • Student/Professors registration
  • Search
  • Guestbook
  • Chat
  • Counter
  • Courses
  • Creation of lessons
  • Forum

Continue to 15[8-11] Java Engineering Projects with Source Code & Documentations | Part 3
Continue Reading

15 Java Engineering Projects with Source Code & Documentations | Part 1

Here are the 15 engineering projects on Java found in FaaDoO Engineers site. As these projects are simple and small, you can consider them doing in mini projects.

1. Airline Booking System
  • The theme of this project is that passengers can book the flights online according to their available dates and timings.
  • The reservation dates can be modified, canceled with the dismissal of some amount.
  • Registered passengers can login and check their status.
  • Online payment for the ticket booking is available for various types of payments.
  • Invoice can be generated after registration is successful.

2. Bug Tracking System

imageimage


3. College Management System
Create different database tables for different data of the college.

How to create tables?
The following are the syntaxes to create tables for different databases of a college.

User Registration table:
create table userregistration(uname varchar(20),pwd varchar(20),repwd varchar(20),address varchar(30),dob date,contact number(15));

Faculty table:
create table faculty(facultyname varchar(30),branch varchar(30),year number(3),semester number(
2),experience number(2),subject varchar(30));
To insert data into the Faculty table,

insert into faculty values('swetha','cse',1,1,3,'c and ds');
insert into faculty values('vidya rani','cse',2,1,3,'computer organisation');
insert into faculty values('murali','cse',2,2,3,'dbms');
insert into faculty values('ramesh chandra','cse',3,1,3,'distributed systems');
insert into faculty values('ravi kumar','cse',3,2,3,'computer graphics');
insert into faculty values('dinakar','cse',4,1,3,'computer networks');
insert into faculty values('ekambaram naidu','cse',4,2,3,'software engineering');
insert into faculty values('murali','ece',1,1,3,'c and ds');
insert into faculty values('bhargavi','ece',1,1,3,'micro processors');
insert into faculty values('bhargav ram','eee',1,1,3,'network theory');
insert into faculty values('sundari','mech',1,1,3,'maths');
Results table:
create table results(hallticketno number primary key,subject varchar(25),internalmarks number(2
),externalmarks number(3));
To insert data in to the results table,
insert into results values(101,'maths',20,70);
insert into results values(102,'stld',18,70);
insert into results values(103,'ldic',17,70);
insert into results values(104,'co',16,70);
insert into results values(105,'java',19,70);
insert into results values(106,'daa',18,70);
insert into results values(107,'mp',17,70);
insert into results values(108,'edc',16,70);
insert into results values(109,'se',20,70);
Subjects table:
create table subject(subname varchar(30),branch varchar(30),year number(3),semester number(2),p
racticals varchar(20));
To insert data into Subjects table,
insert into subject values('maths','cse',1,1,'c lab');
insert into subject values('java','cse',2,1,'oops lab');
insert into subject values('dbms','cse',2,2,'sql lab');
insert into subject values('uml','cse',3,1,'uml lab');
insert into subject values('cn','cse',3,2,'cn lab');
insert into subject values('multi media','cse',4,1,'mmwd lab');
insert into subject values('cn','ece',3,2,'cn lab');
insert into subject values('cn','eee',3,2,'cn lab');

Library table:
create table library(hallticketno number(12),bookid number(5),bookname varchar(25),bookauthor
varchar(30),duedate date);
Inserting data into the Library table,
insert into library values(101,400,'complete reference java','herbert schild',15-mar-2007);
insert into library values(102,401,'c and data structures','balaguruswamy',10-mar-2007);
insert into library values(103,402,'computer organisation','william stallings',5-feb-2007);
insert into library values(104,403,'operating systems','william stallings',1-mar-2007);

Exam table:
create table examination(subject varchar(30),branch varchar(25),year number(2),semester number(
2),examdate date);
Inserting data into Exam table,
insert into examination values('se','cse',4,1,15-mar-2007);

Continue to 15[4-7] Java Engineering Projects with Source Code & Documentations | Part 2
Continue Reading