Ad Agency Information maintained in computerized
System
The main aim of this project is to provide advertisement details like
advertisement cost in various channels. Depending upon the budget the various
channels can allot different advertisements. Here the total front end is developed
using Asp.Net and backend is developed using SQL server.
If an agency does not communicate or relay its client’s goals and creative
wishes properly problems can occur. Most Full-Service Agencies work on a
combination of fee-based and commission based compensation. The fee is paid by
the entity for which the marketing is being done. How ever an agency may have
better negotiating powers than your company and save you more money in the long
run anyways. There are far more advantages to having the right advertising agency
than not
An advertising agency or ad agency is a “service business” dedicated to creating,
planning and handling Advertising (and sometimes other forms of promotion for its
clients. An ad agency is independent from the client and provides an outside point of
view to the effort of selling the client's products or services. An agency can also
handle overall marketing and branding strategies and Sales Promotion for its clients.
FRONT END:PHP
BACK END:WAMP SERVER
Ad DispenserServermaintained for systematic
The main aim of this project is to provide advertisement details like
advertisement cost in various channels. Depending upon the budget the various
channels can allot different advertisements. Here the total front end is developed
using Asp.Net and backend is developed using SQL server.
If an agency does not communicate or relay its client’s goals
and creative wishes properly problems can occur. Most Full-Service Agencies work
on a combination of fee-based and commission based compensation. The fee is paid
by the entity for which the marketing is being done. How ever an agency may have
better negotiating powers than your company and save you more money in the long
run anyways. There are far more advantages to having the right advertising agency
than not
An advertising agency or ad agency is a “service business” dedicated to
creating, planning and handling Advertising (and sometimes other forms of
promotion for its clients. An ad agency is independent from the client and provides
an outside point of view to the effort of selling the client's products or services. An
agency can also handle overall marketing and branding strategies and Sales
Promotion for its clients.
FRONT END: ASP.NET
BACK END: SQL SERVER
Agent-BasedInformation maintained in computerized
System
The main aim of this project is to provide advertisement details like
advertisement cost in various channels. Depending upon the budget the various
channels can allot different advertisements. Here the total front end is developed
using Asp.Net and backend is developed using SQL server.
If an agency does not communicate or relay its client’s goals
and creative wishes properly problems can occur. Most Full-Service Agencies work
on a combination of fee-based and commission based compensation. The fee is paid
by the entity for which the marketing is being done. How ever an agency may have
better negotiating powers than your company and save you more money in the long
run anyways. There are far more advantages to having the right advertising agency
than not
An advertising agency or ad agency is a “service business” dedicated to
creating, planning and handling Advertising (and sometimes other forms of
promotion for its clients. An ad agency is independent from the client and provides
an outside point of view to the effort of selling the client's products or services. An
agency can also handle overall marketing and branding strategies and Sales
Promotion for its clients.
FRONT END: VB
BACK END: SQL SERVER
Online Airline Reservation System
The main purpose of this vision document is to list the requirements
of the Airline Reservation System project. This document also helps us to collect
and analyze the ideas gathered for the project. This vision document will be
subject to change, if more requirements are added to the project. This document
is mainly prepared to set stage for the design phase of the project. The document
being prepared is the first version of vision document for the Airline Reservation
System project.
The Airline Reservation System project is an implementation of a
general Airline Ticketing website like Orbitz, which helps the customers to
search the availability and prices of various airline tickets, along with the
different packages available with the reservations. This project also covers
various features like online registration of the users, modifying the details of the
website by the management staff or administrator of the website, by adding,
deleting or modifying the customer details, flights or packages information. In
general, this website would be designed to perform like any other airline ticketing
website available online
FRONT END: ASP.NET
BACK END: SQL SERVER
Defect Bug Tracking System
Bug Tracking System is the system which enables to detect the Defects. It
not merely detects the Defects but provides the complete information regarding
Defects detected. Bug Tracking System ensures the user of it who needs to know
about a provide information regarding the identified Defect. Using this no Defect
will be unfixed in the developed application.
The developer develops the project as per customer requirements. In the testing
phase the tester will identify the Defects. Whenever the tester encounter ‘n’
number of Defects he adds the Defect id and information in the database.The tester
reports to both project manager and developer. The Defect details in the database
table are accessible to both project manager and developer.
When a customer puts request or orders for a product to be developed. The project
manager is responsible for adding users to Bus Tracking System and assigning
projects to the users. The project manager assigns projects to the developers. The
developer develops the projects as per customer requirements. The project
manager itself assigns the developed applications to the “Testers” for testing. The
testers test the application and identify the Defects in the application.
When the testers encounter ‘n’ no. of Defects, he generates a unique id number for
each individual Defect. The Defect information along with its id are mailed to the
project manager and developer. This is “Defect Report”. These are stored in the
database. This is useful for further reference .Defect information includes the
Defect id, Defect name, Defect priority, project name, Defect location, Defect type.
This whole process continues until all the Defects are got fixed in the application.
The Defect report is mailed to the project manager and the developer as soon as the
Defect is identified. This makes that no error will go unfixed because of poor
communication. It makes ensure that anyone who needs to know about a Defect
can learn of it soon after it is reported.
Defect Tracking System plays a vital role in the testing phase. But it supports
assigning projects for the developer, tester by the project manager. The Defect
Tracking System maintains the different users separately i.e., it provides separate
environments for project manager, developer and tester.
FRONT END: ASP.NET
BACK END: SQL SERVER
Online Cyber Space Crime BranchSystem
The aim of this project is to develop an online crime report and
managing system which is easily accessible to the public. The police department
and the administrative department
This system registers the complaints from people through online and it will also
helpful to police department in catching criminals, in system and person can give
any complaint at any time.
In general people in India are afraid to give a complaint in police station because
they are filled with a false fear about the police department. An online complaint
registration system will solve the fear of the public and which also helps police
department catching criminals and taking appropriate action
An online solution is very useful as the solution is inherently distributive .this
distributive characteristic of the online solution helps in getting the different police
stations to share information and get in contact with one another
FRONT END: PHP
BACK END: WAMP SERVER
News PaperProclamationMonitoring System
The prime objective of "News Paper Proclamation Monitoring System" is to
develop fully fledged software, which fulfills the requirements of the marketing sections of the
newspaper. The task is to bring under one umbrella the various calculations and functions of the
marketing sections. The project keenly concentrated on the calculations regarding the booking of
Advertisement in different publications of the News Paper.
Advertisement plays an initial role in economic security of newspaper organizations. The
software has the facility to input the data through, easy to use input forms which facilitate the
easy entry of the data. The major outputs are the final reports generated on various reports are
monthly reports, bills for customer etc. The software guarantees flexible handing by giving all
details about marketing.
The project has been planned to be having the view of distributed architecture, with centralized
storage of the database. The application for the storage of the data has been planned. Using the
constructs of MS-SQL Server and all the user interfaces has been designed using the ASP.Net
technologies. The database connectivity is planned using the "SQL Connection" methodology.
The standards of security and data protective mechanism have been given a big choice for proper
usage. The application takes care of different modules and their associated reports, which are
produced as per the applicable strategies and standards that are put forwarded by the
administrative staff.
The entire project has been developed keeping in view of the distributed client server computing
technology, in mind. The specification has been normalized up to 3NF to eliminate all the
anomalies that may arise due to the database transaction that are executed by the general users
and the organizational administration. The user interfaces are browser specific to give distributed
accessibility for the overall system. The internal database has been selected as MS-SQLserver
2005.The basic constructs of table spaces, clusters and indexes have been exploited to provide
higher consistency and reliability for the data storage. The MS-SQL server 2005 was a choice as
it provides the constructs of high-level reliability and security. The total front end was dominated
using the ASP.Net technologies. At all proper levels high care was taken to check that the system
manages the data consistency with proper business rules or validations. The database
connectivity was planned using the latest "SQL Connection" technology provided by Microsoft
Corporation. The authentication and authorization was crosschecked at all the relevant stages.
The user level accessibility has been restricted into two zones namely
FRONT END: ASP.NET
BACK END: SQL SERVER
Critical Path Method for ProjectScheduler
Project scheduling inevitably involves uncertainty. The basic inputs
(i.e. time, cost and resources for each activity) are not deterministic and are
affected by various sources of uncertainty. Moreover, there is a causal relationship
between these uncertainty sources and project parameters; this causality is not
modeled in current state-of-the-art project planning techniques (such assimilation
techniques).
This paper introduces an approach, using Bayesian network modeling that
addresses bothuncertainty and causality in projects scheduling. Bayesian networks
have been widely used in a range of decision-supportapplications, but the
application to project management is novel.
The model presented empowers the traditional Critical Path Method (CPM) to
handle uncertainty and also provides explanatory analysis to elicit, represent, and
manage different sources of uncertainty in project planning.
FRONT END: ASP.NET
BACK END: SQL SERVER
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
With the character of low maintenance, cloud computing provides an
economical and efficient solution for sharing group resource among cloud users.
Unfortunately, sharing data in a multi-owner manner while preserving data and
identity privacy from an untrusted cloud is still a challenging issue, due to the
frequent change of the membership. In this paper, we propose a secure multiowner
data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging
group signature and dynamic broadcast encryption techniques, any cloud user can
anonymously share data with others.
Meanwhile, the storage overhead and encryption computation cost of our scheme
are independent with the number of revoked users. In addition, we analyze the
security of our scheme with rigorous proofs, and demonstrate the efficiency of our
scheme in experiments.
FRONT END: ASP.NET
BACK END: SQL SERVER
ONLINE MOBILE PHONE SHOP SYSTEM
The project ONLINE MOBILE PHONE SHOP is to develop an Internet based
sale and purchase system for mobile. As mobile market is increasing very
sharply and will increase with boom in near future. Visualizing the huge
opportunity this is an effort to internationalize the business through Internet. By
developing of this portal and keeping the site searchable on Google hence
increasing the customer base from a local market to all around the globe
My ongoing project is a web application because nowadays Internet is a
prominent tool of marketing mantra. With the advent of the Internet
technologies, world has become a global village. Every year, millions of people
around the world use the Internet to interact in more ways then ever before till
date. People, who surf on Internet, are thinking about the online purchase
because it is very easy and comfortable to order online than going to market and
purchase their required goods. So considering a big hike in the revenue in this
booming sector and one of the successful businesses through Internet one should
be proud to have such a technical deal.
FRONT END: PHP
BACK END: WAMP SERVER
Computerizes Monitoring Data Maintenance And
Payment Administration System
Employee payroll system project s implemented in VB platform. Main aim
of the project is to develop a software application for organization through which
they can manage financial information of employees from salary to tax. Using this
application organization we manage employee salary, tax payment, loan details
check for every month etc… Details are maintained in database for future use.
Here are list of few feature that are included in employee payroll
system project employee data, payroll record, rates, union membership docs, taxes,
detections, net pay, gross pay, working hour details, payroll leader, pension plan,
pay slip.
In existing system still many organization use manual method for
managing employee salary. Payments are given to hand which is not a effective
method. This method will be not provided accurate information on tax and pay
related information for employees when they apply for bank loans. In order to
solve this problem we develop a payroll system through which is different aspect
of employee information is managed through a single application.
Feature of system are maintaining employee information records
including time sheet management and other feature like generating salary report
and leave report. The system itself would update whatever we recurred. In normal
manual system the possibilities for error warnings, help etc… Whatever we
recurred
Front end : VB
Backend : MS Access
IMAGE ENCRYPTION DECRYPTION
The Project entitled “IMAGE ENCRYPTION DECRYPTION” is to be developed for digital
image hiding by using the Encryption Decryption.
This project presents a digital image hiding technology by using the Encryption Decryption.
Firstly, apply Arnold transform to original image; secondly, apply Encryption Decryption to the original
image and the open image, gaining their Encryption Decryption coefficients. Thirdly, interpolate their
Encryption Decryption coefficient. Finally, reconstruct the image by using Inverse Encryption
Decryption, and thus get the result image. Simulation results show that this approach is easy to use and
safety.
The technique makes use of Encryption Decryption which represents the latest research result on
multi-resolution analysis. By combining the advantages of the two methods, image edge information is
captured more accurately than conventional spectral methods such as wavelet. Encryption Decryption was
originally proposed for image demising and has shown promising performance.
The digital Encryption Decryption is implemented using the fast discrete Encryption Decryption.
Basically, it is computed in the spectral domain. Given an image, both the image and the Encryption
Decryption are transformed into Fourier domain, and then the convolution of the Encryption Decryption
with the image in spatial domain becomes the product in Fourier domain. The wrapping is done by
periodic tiling of the spectrum using the wedge, and then collecting the rectangular coefficient area in the
centre. Through this periodic tiling, the rectangular region collects the wedges corresponding portions
from the surrounding periodic wedges.
Front end : ASP.NET
Backend : SQL
Result Alerts System Using Mails and SMS
The project Entitled as “Result Alerts System Using Mails and SMS” is developed as a web
application using ASP.NET as Front End and SQL Server 2005 as Back End.
The entire process of the result publishing process is based on the online process, which
is not informed by the universities directly to the students. So some of the students in rural area
are do know the result details.
To overcome this system, this project can specify the website for result alert system using
mails and SMS with automation of result publishing. This system deals e three main users by
providing username and password for each. Admin, Students, Colleges.
Admin have to maintain the whole process, Students have to register their details with
full personal details, educational details, course details, this system will generate username and
password in favor of the registered students, to login and view the results. Short Message Service
is represented as advanced in this concept to know registered students result in their mobiles.
By using the username and password the users can login to the system and view their
results, the entire process is suggested based on the university procedure basis. So, the University
can send results to their mail and mobile number through the websites.
Front End: ASP.NET
Back End: SQL Server 2005
RISK ANALYSIS FOR LOAN APPROVAL
This project entitle “RISK ANALYSIS FOR LOAN APPROVAL” is to maintain the loan
approval for the customer from bank. This system maintains the customer details and exist
transaction done in the bank and also maintain the executive details who make arrange for the
loan to the particular customer. This system is mainly providing every detail which has been
required for the customer to get a loan from the bank.
This system maintain the customer details which contain the existing loan or bank
account details which has been feed by the bank employee from the bank system. The executive
details have been maintained by the system to know which executive has been attended the loan
for the customer who approaches the bank. The executive will feed the loan application details
with the security details which has been submitted by the customer to the bank and it has been
send to the branch manager who making approval of the loan authority.
The bank branch manager view the loan application an security details which has been
submitted by the customer and make approval with some criteria. In this section the manager has
been consider the customer who make regular payment and did his transaction with good
condition and his security valuation is less compare with the loan require. The manager
approvals with the some condition which has been follow from the senior in the bank.
FRONT END: ASP.NET
BACK END: SQL SERVER
ONLINE PRINTING PRESS MANAGEMENT
The Project Entitled as “ONLINE PRINTING PRESS MANAGEMENT” is developed
using VB.NET as Front End and SQL SERVER as Back End. This system can be specifying the
details of purchasing books, sold books, vendors and customers. Using this system the level of
the purchase order has been increased. The Owner or the book shop maintainer has done the
operation day to day by entering the outgoing and incoming of books. The Purchase details of
the books are specified in the systematic procedure of the day to day operation like same as the
sold book item also. Vendor details are important for each and every book shop because the
wholesale order can be make an agreement for every book shops.
Maintainer of the bookshop is responsible for the books and also the details of wanting
books. Selling cost module can specify the cost difference between purchasing and sold off the
books. Report Module can be access the overall project specification in the book store.
The management has the responsibility for the purchasing procedure in the company. The
wholesale order of the books and notebooks are made all over the responsibilities from the
vendors. Rack maintenance of the book shop can be maintained by the series of book authors.
Data have been maintained for several years and there is no chance of missing. Reports have
been represented in the crystal form and these can use for re-purchasing in future.
FRONT END: ASP.NET
BACK END: SQL SERVER
ONLINE HOTEL MANAGEMENT SYSTEM
The Project entitled “ONLINE HOTEL MANAGEMENT SYSTEM” is mainly made
for management of hotel information. The entire process is computerized and also makes the
system to generate useful reports which helps in the business decisions.
This system is mainly used for managing and maintaining the records of customers and
room in the hotel. The rooms have different categories such as A.C., non –AC., dormitory etc.
The charges for the rooms and their records will be maintained accordingly. The user details are
stored in to the database for viewing the reports.
This system has been made in a user friendly interface, so that normal persons can add,
delete the entries of customers and handle all the transactions easily. The proposed system helps
to make use of computers with the help of internet so that this can overcome flaws in the existing
system.
The billing system also made easy by using this system in the hotel room system. The
Hotel Management System serves a very important task that it gives the entire information and
their expertise area of work in short time and error free one, which in turns help the management
to utilizing the system properly.
The “ONLINE HOTEL MANAGEMENT SYSTEM” is developed using ASP.NET as
front end and SQL SERVER as its backend.
Efficient LocationTraining ProtocolsforHeterogeneous Sensorand Actor
Networks
In this work, we consider a large-scale geographic area populated by tiny sensors and
some more powerful devices called actors, authorized to organize the sensors in their vicinity
into short-lived, actor-centric sensor networks. The tiny sensors run on miniature no rechargeable
batteries, are anonymous, and are unaware of their location. The sensors differ in their ability to
dynamically alter their sleep times.
Indeed, the periodic sensors have sleep periods of predefined lengths, established at
fabrication time; by contrast, the free sensors can dynamically alter their sleep periods, under
program control. The main contribution of this work is to propose an energy-efficient location
training protocol for heterogeneous actor-centric sensor networks where the sensors acquire
coarse-grain location awareness with respect to the actor in their vicinity.
Our theoretical analysis, confirmed by experimental evaluation, shows that the proposed
protocol outperforms the best previously known location training protocols in terms of the
number of sleep/awake transitions, overall sensor awake time, and energy consumption.
FRONT END: JAVA
BACK END: SQL SERVER
Enabling Public Verifiability and Data Dynamics for Storage Security
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It
moves the application software and databases to the centralized large data centers, where the
management of the data and services may not be fully trustworthy. This unique paradigm brings
about many new security challenges, which have not been well understood.
This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In
particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud
client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA
eliminates the involvement of client through the auditing of whether his data stored in the cloud
is indeed intact, which can be important in achieving economies of scale for Cloud Computing.
The support for data dynamics via the most general forms of data operation, such as block
modification, insertion and deletion, is also a significant step toward practicality, since services
in Cloud Computing are not limited to archive or backup data only.
While prior works on ensuring remote data integrity often lacks the support of either public
verifiability or dynamic data operations, this paper achieves both. We first identify the
difficulties and potential security problems of direct extensions with fully dynamic data updates
from prior works and then show how to construct an elegant verification scheme for seamless
integration of these two salient features in our protocol design. In particular, to achieve efficient
data dynamics, we improve the Proof of Irretrievability model
cite{Shacham:ASIACRYPT:2008} by manipulating the classic Markel Hash Tree (MHT)
construction for block tag authentication. Extensive security and performance analysis show that
the proposed scheme is highly efficient and provably secure
FRONT END: JAVA
BACK END: SQL SERVER
Mobility ManagementApproaches for Mobile IP Networks
In wireless networks, efficient management of mobility is a crucial issue to
support mobile users. The mobile Internet protocol (MIP) has been proposed to support global
mobility in IP networks. Several mobility management strategies have been proposed which aim
reducing the signaling traffic related to the Mobile Terminals (MTs) registration with the Home
Agents (HAs) whenever their Care-of-Addresses (CoAs) change.
They use different foreign agents (FAs) and Gateway FAs (GFAs) hierarchies to concentrate the
registration processes. For high-mobility MTs, the Hierarchical MIP (HMIP) and Dynamic
HMIP (DHMIP) strategies localize the registration in FAs and GFAs, yielding to high-mobility
signaling. The Multicast HMIP strategy limits the registration processes in the GFAs. For high-
mobility MTs, it provides lowest mobility signaling delay compared to the HMIP and DHMIP
approaches.
However, it is resource consuming strategy unless for frequent MT mobility. Hence, we propose
an analytic model to evaluate the mean signaling delay and the mean bandwidth per call
according to the type of MT mobility. In our analysis, the MHMIP outperforms the DHMIP and
MIP strategies in almost all the studied cases. The main contribution of this paper is the analytic
model that allows the mobility management approaches performance evaluation.
FRONT END: ASP.NET
BACK END: SQL SERVER
Modeling and Detectionof Camouflaging Worm
Active worms pose major security threats to the Internet. This is due to the
ability of active worms to propagate in an automated fashion as they continuously compromise
computers on the Internet. Active worms evolve during their propagation and thus pose great
challenges to defend against them. In this paper, we investigate a new class of active worms,
referred to as Camouflaging Worm (C-Worm in short).
The C-Worm is different from traditional worms because of its ability to intelligently
manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation
from existing worm detection systems based on analyzing the propagation traffic generated by
worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison
between its traffic and non-worm traffic (background traffic).
We observe that these two types of traffic are barely distinguishable in the time domain.
However, their distinction is clear in the frequency domain, due to the recurring manipulative
nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based
scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution
of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish
the C-Worm traffic from background traffic.
Using a comprehensive set of detection metrics and real-world traces as background traffic, we
conduct extensive performance evaluations on our proposed spectrum-based detection scheme.
The performance data clearly demonstrates that our scheme can effectively detect the C-Worm
propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively
detecting not only the C-Worm, but traditional worms as well.
FRONT END: JAVA
BACK END: SQL SERVER
Multiple Routing Configurations for FastIP Network Recovery
As the Internet takes an increasingly central role in our communications
infrastructure; the slow convergence of routing protocols after a network failure becomes a
growing problem. To assure fast recovery from link and node failures in IP networks, we
present a new recovery scheme called Multiple Routing Configurations (MRC). Our
proposed scheme guarantees recovery in all single failure scenarios, using a single
mechanism to handle both link and node failures, and without knowing the root cause of the
failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop
forwarding.
MRCis based on keeping additional routing information in the routers, and allows packet
forwarding to continue on an alternative output link immediately after the detection of a failure.
It can be implemented with only minor changes to existing solutions. Inthis paper we present
MRC, and analyze its performance with respect to scalability, backup path lengths, and
load distribution after a failure.
We also show how an estimate of the traffic demands in the network can be used to
improve the distribution of the recovered traffic, and thus reduce the chances of congestion when
MRC is used.Keywords: Networking, Rout
FRONT END: JAVA
BACK END: SQL SERVER
Data Delivery Properties of Human ContactNetworks
PocketSwitched Networks take advantage of social contacts to
opportunistically create data paths over time. This work employs empirical traces
to examine the effect of the human contact process ondata delivery in such
networks. The contactoccurrence distribution is found to be highly uneven:
contacts between a few node pairs occur too frequently, leading to inadequate
mixing in the network, while the majority of contacts occurrarely, but are essential
for global connectivity.
This distribution of contacts leads to a significant variation in the fraction of node
pairs that can be connected over time windows of similar duration. Good time
windows tend to have a large clique of nodes that can all reach each other. It is
shown that the clustering coefficient of the contact graph over a time window is a
good predictor of achievable connectivity.
We then examine all successfulpaths found by flooding and show that though
delivery times vary widely, randomly sampling a small number of paths between
each sourceand destination is sufficient to yield a delivery time distribution close
to that of flooding over all paths. This result suggests that the rate at which the
network can deliver data is remarkably robustto path failures.
FRONT END: JAVA
BACK END: SQL SERVER

More Related Content

PPTX
Online Advertisement Project Presentation
DOC
Software Quality Assurance Engineer_Lenin_Resume
DOC
Anil Raja Mateti CV
DOCX
Abeeha_Profile
PDF
Speed It App
DOC
RAMAKANT
PPT
Products
DOC
Shravan 3+
Online Advertisement Project Presentation
Software Quality Assurance Engineer_Lenin_Resume
Anil Raja Mateti CV
Abeeha_Profile
Speed It App
RAMAKANT
Products
Shravan 3+

What's hot (6)

PDF
CV_PurnimaBalla_WCS-Consultant_7Yrs
DOC
Naveen Kumar Bokku
DOCX
Pawan_Kumar_111
DOCX
Manjeet
DOCX
3+Manual-selnium-loadRunnerPerformance Testing_Karthikeyaun (1)
PPTX
SmartVision Android App
CV_PurnimaBalla_WCS-Consultant_7Yrs
Naveen Kumar Bokku
Pawan_Kumar_111
Manjeet
3+Manual-selnium-loadRunnerPerformance Testing_Karthikeyaun (1)
SmartVision Android App
Ad

Similar to Ad agency information maintained in computerized (20)

PPTX
Online Advertisement Agency Management System By Tuhin Roy using ASP.NET
DOC
250755494-advertising-agency-management-system-1-doc.doc
DOC
Project Proposel Documentation
PDF
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
DOC
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
PDF
pxc3886084
PPT
E-CLASSIFIEDS
PPTX
My Saminar On Php
PDF
Mca titles
PDF
Pir onlineclassifieds
PDF
Advantages And Disadvantages Of Cyber-Crime In The Hotel
PDF
Real estate
DOCX
Project Deliverable 2 Business Requirements1Project Deliverab.docx
DOCX
UNIT 1 DB2 FINALThe objectives of the retail store include com.docx
PDF
Mca titles
PDF
Mca titles
PDF
Mca titles
PDF
Mca titles
PDF
Mca titles
PDF
Mca titles
Online Advertisement Agency Management System By Tuhin Roy using ASP.NET
250755494-advertising-agency-management-system-1-doc.doc
Project Proposel Documentation
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
CUSTOMER CARE ADMINISTRATION-developer-2000 and oracle 9i
pxc3886084
E-CLASSIFIEDS
My Saminar On Php
Mca titles
Pir onlineclassifieds
Advantages And Disadvantages Of Cyber-Crime In The Hotel
Real estate
Project Deliverable 2 Business Requirements1Project Deliverab.docx
UNIT 1 DB2 FINALThe objectives of the retail store include com.docx
Mca titles
Mca titles
Mca titles
Mca titles
Mca titles
Mca titles
Ad

Ad agency information maintained in computerized

  • 1. Ad Agency Information maintained in computerized System The main aim of this project is to provide advertisement details like advertisement cost in various channels. Depending upon the budget the various channels can allot different advertisements. Here the total front end is developed using Asp.Net and backend is developed using SQL server. If an agency does not communicate or relay its client’s goals and creative wishes properly problems can occur. Most Full-Service Agencies work on a combination of fee-based and commission based compensation. The fee is paid by the entity for which the marketing is being done. How ever an agency may have better negotiating powers than your company and save you more money in the long run anyways. There are far more advantages to having the right advertising agency than not An advertising agency or ad agency is a “service business” dedicated to creating, planning and handling Advertising (and sometimes other forms of promotion for its clients. An ad agency is independent from the client and provides an outside point of view to the effort of selling the client's products or services. An agency can also handle overall marketing and branding strategies and Sales Promotion for its clients. FRONT END:PHP BACK END:WAMP SERVER
  • 2. Ad DispenserServermaintained for systematic The main aim of this project is to provide advertisement details like advertisement cost in various channels. Depending upon the budget the various channels can allot different advertisements. Here the total front end is developed using Asp.Net and backend is developed using SQL server. If an agency does not communicate or relay its client’s goals and creative wishes properly problems can occur. Most Full-Service Agencies work on a combination of fee-based and commission based compensation. The fee is paid by the entity for which the marketing is being done. How ever an agency may have better negotiating powers than your company and save you more money in the long run anyways. There are far more advantages to having the right advertising agency than not An advertising agency or ad agency is a “service business” dedicated to creating, planning and handling Advertising (and sometimes other forms of promotion for its clients. An ad agency is independent from the client and provides an outside point of view to the effort of selling the client's products or services. An agency can also handle overall marketing and branding strategies and Sales Promotion for its clients. FRONT END: ASP.NET BACK END: SQL SERVER
  • 3. Agent-BasedInformation maintained in computerized System The main aim of this project is to provide advertisement details like advertisement cost in various channels. Depending upon the budget the various channels can allot different advertisements. Here the total front end is developed using Asp.Net and backend is developed using SQL server. If an agency does not communicate or relay its client’s goals and creative wishes properly problems can occur. Most Full-Service Agencies work on a combination of fee-based and commission based compensation. The fee is paid by the entity for which the marketing is being done. How ever an agency may have better negotiating powers than your company and save you more money in the long run anyways. There are far more advantages to having the right advertising agency than not An advertising agency or ad agency is a “service business” dedicated to creating, planning and handling Advertising (and sometimes other forms of promotion for its clients. An ad agency is independent from the client and provides an outside point of view to the effort of selling the client's products or services. An agency can also handle overall marketing and branding strategies and Sales Promotion for its clients. FRONT END: VB BACK END: SQL SERVER
  • 4. Online Airline Reservation System The main purpose of this vision document is to list the requirements of the Airline Reservation System project. This document also helps us to collect and analyze the ideas gathered for the project. This vision document will be subject to change, if more requirements are added to the project. This document is mainly prepared to set stage for the design phase of the project. The document being prepared is the first version of vision document for the Airline Reservation System project. The Airline Reservation System project is an implementation of a general Airline Ticketing website like Orbitz, which helps the customers to search the availability and prices of various airline tickets, along with the different packages available with the reservations. This project also covers various features like online registration of the users, modifying the details of the website by the management staff or administrator of the website, by adding, deleting or modifying the customer details, flights or packages information. In general, this website would be designed to perform like any other airline ticketing website available online FRONT END: ASP.NET BACK END: SQL SERVER
  • 5. Defect Bug Tracking System Bug Tracking System is the system which enables to detect the Defects. It not merely detects the Defects but provides the complete information regarding Defects detected. Bug Tracking System ensures the user of it who needs to know about a provide information regarding the identified Defect. Using this no Defect will be unfixed in the developed application. The developer develops the project as per customer requirements. In the testing phase the tester will identify the Defects. Whenever the tester encounter ‘n’ number of Defects he adds the Defect id and information in the database.The tester reports to both project manager and developer. The Defect details in the database table are accessible to both project manager and developer. When a customer puts request or orders for a product to be developed. The project manager is responsible for adding users to Bus Tracking System and assigning projects to the users. The project manager assigns projects to the developers. The developer develops the projects as per customer requirements. The project manager itself assigns the developed applications to the “Testers” for testing. The testers test the application and identify the Defects in the application. When the testers encounter ‘n’ no. of Defects, he generates a unique id number for each individual Defect. The Defect information along with its id are mailed to the project manager and developer. This is “Defect Report”. These are stored in the database. This is useful for further reference .Defect information includes the Defect id, Defect name, Defect priority, project name, Defect location, Defect type. This whole process continues until all the Defects are got fixed in the application. The Defect report is mailed to the project manager and the developer as soon as the Defect is identified. This makes that no error will go unfixed because of poor communication. It makes ensure that anyone who needs to know about a Defect can learn of it soon after it is reported. Defect Tracking System plays a vital role in the testing phase. But it supports assigning projects for the developer, tester by the project manager. The Defect Tracking System maintains the different users separately i.e., it provides separate environments for project manager, developer and tester. FRONT END: ASP.NET BACK END: SQL SERVER
  • 6. Online Cyber Space Crime BranchSystem The aim of this project is to develop an online crime report and managing system which is easily accessible to the public. The police department and the administrative department This system registers the complaints from people through online and it will also helpful to police department in catching criminals, in system and person can give any complaint at any time. In general people in India are afraid to give a complaint in police station because they are filled with a false fear about the police department. An online complaint registration system will solve the fear of the public and which also helps police department catching criminals and taking appropriate action An online solution is very useful as the solution is inherently distributive .this distributive characteristic of the online solution helps in getting the different police stations to share information and get in contact with one another FRONT END: PHP BACK END: WAMP SERVER
  • 7. News PaperProclamationMonitoring System The prime objective of "News Paper Proclamation Monitoring System" is to develop fully fledged software, which fulfills the requirements of the marketing sections of the newspaper. The task is to bring under one umbrella the various calculations and functions of the marketing sections. The project keenly concentrated on the calculations regarding the booking of Advertisement in different publications of the News Paper. Advertisement plays an initial role in economic security of newspaper organizations. The software has the facility to input the data through, easy to use input forms which facilitate the easy entry of the data. The major outputs are the final reports generated on various reports are monthly reports, bills for customer etc. The software guarantees flexible handing by giving all details about marketing. The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of MS-SQL Server and all the user interfaces has been designed using the ASP.Net technologies. The database connectivity is planned using the "SQL Connection" methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports, which are produced as per the applicable strategies and standards that are put forwarded by the administrative staff. The entire project has been developed keeping in view of the distributed client server computing technology, in mind. The specification has been normalized up to 3NF to eliminate all the anomalies that may arise due to the database transaction that are executed by the general users and the organizational administration. The user interfaces are browser specific to give distributed accessibility for the overall system. The internal database has been selected as MS-SQLserver 2005.The basic constructs of table spaces, clusters and indexes have been exploited to provide higher consistency and reliability for the data storage. The MS-SQL server 2005 was a choice as it provides the constructs of high-level reliability and security. The total front end was dominated using the ASP.Net technologies. At all proper levels high care was taken to check that the system manages the data consistency with proper business rules or validations. The database connectivity was planned using the latest "SQL Connection" technology provided by Microsoft Corporation. The authentication and authorization was crosschecked at all the relevant stages. The user level accessibility has been restricted into two zones namely FRONT END: ASP.NET BACK END: SQL SERVER
  • 8. Critical Path Method for ProjectScheduler Project scheduling inevitably involves uncertainty. The basic inputs (i.e. time, cost and resources for each activity) are not deterministic and are affected by various sources of uncertainty. Moreover, there is a causal relationship between these uncertainty sources and project parameters; this causality is not modeled in current state-of-the-art project planning techniques (such assimilation techniques). This paper introduces an approach, using Bayesian network modeling that addresses bothuncertainty and causality in projects scheduling. Bayesian networks have been widely used in a range of decision-supportapplications, but the application to project management is novel. The model presented empowers the traditional Critical Path Method (CPM) to handle uncertainty and also provides explanatory analysis to elicit, represent, and manage different sources of uncertainty in project planning. FRONT END: ASP.NET BACK END: SQL SERVER
  • 9. Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multiowner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments. FRONT END: ASP.NET BACK END: SQL SERVER
  • 10. ONLINE MOBILE PHONE SHOP SYSTEM The project ONLINE MOBILE PHONE SHOP is to develop an Internet based sale and purchase system for mobile. As mobile market is increasing very sharply and will increase with boom in near future. Visualizing the huge opportunity this is an effort to internationalize the business through Internet. By developing of this portal and keeping the site searchable on Google hence increasing the customer base from a local market to all around the globe My ongoing project is a web application because nowadays Internet is a prominent tool of marketing mantra. With the advent of the Internet technologies, world has become a global village. Every year, millions of people around the world use the Internet to interact in more ways then ever before till date. People, who surf on Internet, are thinking about the online purchase because it is very easy and comfortable to order online than going to market and purchase their required goods. So considering a big hike in the revenue in this booming sector and one of the successful businesses through Internet one should be proud to have such a technical deal. FRONT END: PHP BACK END: WAMP SERVER
  • 11. Computerizes Monitoring Data Maintenance And Payment Administration System Employee payroll system project s implemented in VB platform. Main aim of the project is to develop a software application for organization through which they can manage financial information of employees from salary to tax. Using this application organization we manage employee salary, tax payment, loan details check for every month etc… Details are maintained in database for future use. Here are list of few feature that are included in employee payroll system project employee data, payroll record, rates, union membership docs, taxes, detections, net pay, gross pay, working hour details, payroll leader, pension plan, pay slip. In existing system still many organization use manual method for managing employee salary. Payments are given to hand which is not a effective method. This method will be not provided accurate information on tax and pay related information for employees when they apply for bank loans. In order to solve this problem we develop a payroll system through which is different aspect of employee information is managed through a single application. Feature of system are maintaining employee information records including time sheet management and other feature like generating salary report and leave report. The system itself would update whatever we recurred. In normal manual system the possibilities for error warnings, help etc… Whatever we recurred Front end : VB Backend : MS Access
  • 12. IMAGE ENCRYPTION DECRYPTION The Project entitled “IMAGE ENCRYPTION DECRYPTION” is to be developed for digital image hiding by using the Encryption Decryption. This project presents a digital image hiding technology by using the Encryption Decryption. Firstly, apply Arnold transform to original image; secondly, apply Encryption Decryption to the original image and the open image, gaining their Encryption Decryption coefficients. Thirdly, interpolate their Encryption Decryption coefficient. Finally, reconstruct the image by using Inverse Encryption Decryption, and thus get the result image. Simulation results show that this approach is easy to use and safety. The technique makes use of Encryption Decryption which represents the latest research result on multi-resolution analysis. By combining the advantages of the two methods, image edge information is captured more accurately than conventional spectral methods such as wavelet. Encryption Decryption was originally proposed for image demising and has shown promising performance. The digital Encryption Decryption is implemented using the fast discrete Encryption Decryption. Basically, it is computed in the spectral domain. Given an image, both the image and the Encryption Decryption are transformed into Fourier domain, and then the convolution of the Encryption Decryption with the image in spatial domain becomes the product in Fourier domain. The wrapping is done by periodic tiling of the spectrum using the wedge, and then collecting the rectangular coefficient area in the centre. Through this periodic tiling, the rectangular region collects the wedges corresponding portions from the surrounding periodic wedges. Front end : ASP.NET Backend : SQL
  • 13. Result Alerts System Using Mails and SMS The project Entitled as “Result Alerts System Using Mails and SMS” is developed as a web application using ASP.NET as Front End and SQL Server 2005 as Back End. The entire process of the result publishing process is based on the online process, which is not informed by the universities directly to the students. So some of the students in rural area are do know the result details. To overcome this system, this project can specify the website for result alert system using mails and SMS with automation of result publishing. This system deals e three main users by providing username and password for each. Admin, Students, Colleges. Admin have to maintain the whole process, Students have to register their details with full personal details, educational details, course details, this system will generate username and password in favor of the registered students, to login and view the results. Short Message Service is represented as advanced in this concept to know registered students result in their mobiles. By using the username and password the users can login to the system and view their results, the entire process is suggested based on the university procedure basis. So, the University can send results to their mail and mobile number through the websites. Front End: ASP.NET Back End: SQL Server 2005
  • 14. RISK ANALYSIS FOR LOAN APPROVAL This project entitle “RISK ANALYSIS FOR LOAN APPROVAL” is to maintain the loan approval for the customer from bank. This system maintains the customer details and exist transaction done in the bank and also maintain the executive details who make arrange for the loan to the particular customer. This system is mainly providing every detail which has been required for the customer to get a loan from the bank. This system maintain the customer details which contain the existing loan or bank account details which has been feed by the bank employee from the bank system. The executive details have been maintained by the system to know which executive has been attended the loan for the customer who approaches the bank. The executive will feed the loan application details with the security details which has been submitted by the customer to the bank and it has been send to the branch manager who making approval of the loan authority. The bank branch manager view the loan application an security details which has been submitted by the customer and make approval with some criteria. In this section the manager has been consider the customer who make regular payment and did his transaction with good condition and his security valuation is less compare with the loan require. The manager approvals with the some condition which has been follow from the senior in the bank. FRONT END: ASP.NET BACK END: SQL SERVER
  • 15. ONLINE PRINTING PRESS MANAGEMENT The Project Entitled as “ONLINE PRINTING PRESS MANAGEMENT” is developed using VB.NET as Front End and SQL SERVER as Back End. This system can be specifying the details of purchasing books, sold books, vendors and customers. Using this system the level of the purchase order has been increased. The Owner or the book shop maintainer has done the operation day to day by entering the outgoing and incoming of books. The Purchase details of the books are specified in the systematic procedure of the day to day operation like same as the sold book item also. Vendor details are important for each and every book shop because the wholesale order can be make an agreement for every book shops. Maintainer of the bookshop is responsible for the books and also the details of wanting books. Selling cost module can specify the cost difference between purchasing and sold off the books. Report Module can be access the overall project specification in the book store. The management has the responsibility for the purchasing procedure in the company. The wholesale order of the books and notebooks are made all over the responsibilities from the vendors. Rack maintenance of the book shop can be maintained by the series of book authors. Data have been maintained for several years and there is no chance of missing. Reports have been represented in the crystal form and these can use for re-purchasing in future. FRONT END: ASP.NET BACK END: SQL SERVER
  • 16. ONLINE HOTEL MANAGEMENT SYSTEM The Project entitled “ONLINE HOTEL MANAGEMENT SYSTEM” is mainly made for management of hotel information. The entire process is computerized and also makes the system to generate useful reports which helps in the business decisions. This system is mainly used for managing and maintaining the records of customers and room in the hotel. The rooms have different categories such as A.C., non –AC., dormitory etc. The charges for the rooms and their records will be maintained accordingly. The user details are stored in to the database for viewing the reports. This system has been made in a user friendly interface, so that normal persons can add, delete the entries of customers and handle all the transactions easily. The proposed system helps to make use of computers with the help of internet so that this can overcome flaws in the existing system. The billing system also made easy by using this system in the hotel room system. The Hotel Management System serves a very important task that it gives the entire information and their expertise area of work in short time and error free one, which in turns help the management to utilizing the system properly. The “ONLINE HOTEL MANAGEMENT SYSTEM” is developed using ASP.NET as front end and SQL SERVER as its backend.
  • 17. Efficient LocationTraining ProtocolsforHeterogeneous Sensorand Actor Networks In this work, we consider a large-scale geographic area populated by tiny sensors and some more powerful devices called actors, authorized to organize the sensors in their vicinity into short-lived, actor-centric sensor networks. The tiny sensors run on miniature no rechargeable batteries, are anonymous, and are unaware of their location. The sensors differ in their ability to dynamically alter their sleep times. Indeed, the periodic sensors have sleep periods of predefined lengths, established at fabrication time; by contrast, the free sensors can dynamically alter their sleep periods, under program control. The main contribution of this work is to propose an energy-efficient location training protocol for heterogeneous actor-centric sensor networks where the sensors acquire coarse-grain location awareness with respect to the actor in their vicinity. Our theoretical analysis, confirmed by experimental evaluation, shows that the proposed protocol outperforms the best previously known location training protocols in terms of the number of sleep/awake transitions, overall sensor awake time, and energy consumption. FRONT END: JAVA BACK END: SQL SERVER
  • 18. Enabling Public Verifiability and Data Dynamics for Storage Security Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Irretrievability model cite{Shacham:ASIACRYPT:2008} by manipulating the classic Markel Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure FRONT END: JAVA BACK END: SQL SERVER
  • 19. Mobility ManagementApproaches for Mobile IP Networks In wireless networks, efficient management of mobility is a crucial issue to support mobile users. The mobile Internet protocol (MIP) has been proposed to support global mobility in IP networks. Several mobility management strategies have been proposed which aim reducing the signaling traffic related to the Mobile Terminals (MTs) registration with the Home Agents (HAs) whenever their Care-of-Addresses (CoAs) change. They use different foreign agents (FAs) and Gateway FAs (GFAs) hierarchies to concentrate the registration processes. For high-mobility MTs, the Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies localize the registration in FAs and GFAs, yielding to high-mobility signaling. The Multicast HMIP strategy limits the registration processes in the GFAs. For high- mobility MTs, it provides lowest mobility signaling delay compared to the HMIP and DHMIP approaches. However, it is resource consuming strategy unless for frequent MT mobility. Hence, we propose an analytic model to evaluate the mean signaling delay and the mean bandwidth per call according to the type of MT mobility. In our analysis, the MHMIP outperforms the DHMIP and MIP strategies in almost all the studied cases. The main contribution of this paper is the analytic model that allows the mobility management approaches performance evaluation. FRONT END: ASP.NET BACK END: SQL SERVER
  • 20. Modeling and Detectionof Camouflaging Worm Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic. Using a comprehensive set of detection metrics and real-world traces as background traffic, we conduct extensive performance evaluations on our proposed spectrum-based detection scheme. The performance data clearly demonstrates that our scheme can effectively detect the C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively detecting not only the C-Worm, but traditional worms as well. FRONT END: JAVA BACK END: SQL SERVER
  • 21. Multiple Routing Configurations for FastIP Network Recovery As the Internet takes an increasingly central role in our communications infrastructure; the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, we present a new recovery scheme called Multiple Routing Configurations (MRC). Our proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRCis based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. Inthis paper we present MRC, and analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure. We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.Keywords: Networking, Rout FRONT END: JAVA BACK END: SQL SERVER
  • 22. Data Delivery Properties of Human ContactNetworks PocketSwitched Networks take advantage of social contacts to opportunistically create data paths over time. This work employs empirical traces to examine the effect of the human contact process ondata delivery in such networks. The contactoccurrence distribution is found to be highly uneven: contacts between a few node pairs occur too frequently, leading to inadequate mixing in the network, while the majority of contacts occurrarely, but are essential for global connectivity. This distribution of contacts leads to a significant variation in the fraction of node pairs that can be connected over time windows of similar duration. Good time windows tend to have a large clique of nodes that can all reach each other. It is shown that the clustering coefficient of the contact graph over a time window is a good predictor of achievable connectivity. We then examine all successfulpaths found by flooding and show that though delivery times vary widely, randomly sampling a small number of paths between each sourceand destination is sufficient to yield a delivery time distribution close to that of flooding over all paths. This result suggests that the rate at which the network can deliver data is remarkably robustto path failures. FRONT END: JAVA BACK END: SQL SERVER