Welcome to the MS Project Archive, this collection of abstracts provide insight into the capabilities of a KSI Alum. The accomplishment and pride our students are swept with when completing the MS thesis project is beyond compare. During the time of a student’s thesis presentation: the student, faculty, staff, and administration are united under the progress of their work. We congratulate each KSI alum in completing this milestone.

 

 

Knowledge Systems Institute

Selected MS Project Thesis Abstracts

E-Approval System
Pharmacy Management System
The Voice-Activated Stolen Vehicle Management System
Project Reporting System
On the Topological Design of Network System: Performance and Cost Perspective
Mobile Application of Test System
Web-based Incentive Solution
Focused Web Crawler for Searching Mailcious Web Pages
Consultant WEBSMS System
A Mobile Inventory Management System
Community Mobile Application
E-Product Marketing System
Mobile Hotel Management System
The Smart Grocery shopping System Designed in ASP.NET
The Survey and Performance Analysis of modern Wireless Telecommunication Networks
Koha Library Management System
MOBILE PERSONAL ASSISTANT
P2P Solution for Videoconferencing
Events Management System
Psychological Portraiture in Traditional Art and Digital Art: A Study Exploring the Intrinsic Qualities and Dynamics of Each Media
myCompanion
A Study and Implementation Plan of CPOE for Healthcare Institutions
Bluetooth Enabled Restaurant
PC Remote Controller
Automatic Postage Stamp System
Nature Capture System
Dualis
Torrent Times
Quality Assurance Mentor
The Efficiency and Implementability of Bioinformatics Algorithms
Online Real Estate Managment
Smart Communication: An Intranet Based Collaboration Tool
KSI Library Management System Utilizing RFID
Defect Tracking System (DTS)
Patient Health Care Information Systems
Business Objects
Secured Personal Directory System Using Web
The Chronobot Administrator System
The Chronobot Job Placement System-User Interface
Health Level Seven Integration Design
Applying Sequential Space Relativity for Image Recognition
Online Banking
Online Web Hunt
Designing A Networked Java Action Game For A Cell Phone
Building An Options Trading Analysis Tool Using ASP.Net
The Implementation of Jedtector ? A Tool for Incremental Change In JAVA Code
Implementation of Voice over IP in Peer to Peer Environment
The Design of Computational Java Bean Component Package for Protein Sequence Analysis
The Design and Implementation of JavaHelp System for Java Client Application Service
E-Commerce Application Using SQL-Server 2000 And ASP
Digital Video Transmission over Wireless Channels
A Cross Platform Web Service Implementation using SOAP
Software Agent
A Comparative Study and Implementation of Network Security
Data Mining in a Library System
A Small Office Database Management System using Java Servlet
An Online Health Consulting and Shopping Center implemented by Java Server Pages
JAVA Security on the Internet
An E-commerce Implementation Using JAVA Servlet,JSP and MySQL
A Survey and Implementation of E-Commerce in Supply Chain Management
A Visual Editor for Multimedia Application Development
A Survey of Encryption Algorithms
COMPUTER SIMULATION OF Queueing SYSTEMS: CSQS
Network Security
Designing a Personal Information MANAGER with VB 6.0
TSJ: A WEB-BASED TEACHING SYSTEM USING JAVA
A Survey And Performance Comparison of Dynamic HTMLs
AN ONLINE-BANKING SYSTEM USING JAVA AND CORBA
An Implementation of Microsoft Transaction Server
An Implementation of A Spatial Query Language for Multiple Data Sources
The Implementation of a Web Database using the Approach of Java Database Connectivity: JDBC
A Rule-Based System Verification Tool Using a Matrix Approach
A Client/server Networking Application using JAVA: JWBCB
A TCP/IP NETWORK APPLICATION IMPLEMENTED WITH VISUAL BASIC
DYNAMIC HTML IN INTERNET EXPLORER 4
A Network Application using VBWB
3D Simulation System with Dynamic Object Design
A Loan Pricing Model
A Survey of Distance Learning
Thin Clients For The Internet: Network Computer vs. NetPC
The Implementation of Web-Databases by the Approach of Java Database Connectivity: JDBC
Network Application Design Using TCP/IP Protocol in Windows
Customer Service On The Internet
Design And Implementation Of A Text-Based Object-Oriented Base
Full Text Indexing Technology Applying To Web Pages
Network Application Design Using TCP/IP Protocol In Windows
The Design Of A Library On-Line Search Application

 


E-Approval System

Sarah Anjum
Graduation Date: December 2014

Abstract

The E-Approval System (EAS) was developed due to the global nature of many organizations. The key persons involved in the decision-making process in many businesses often are based in different parts of the world. The approval process must flow seamlessly to ensure decisions are made efficiently and work is approved in a timely manner. However, it is easy to lose documents or simply forget about a request with all the decisions that must be made. Automating an organization's approval processes can save time and money while reducing chances of human error. Compliance with regulatory standards can be facilitated if approval processes are automated. In the EAS, we have three levels of approvers, along with an admin and users who can send documents for approval. A document is encrypted and sent over the network to the admin who will decide which level of approvers will receive the document. The approver will be notified once he/she receives the document. Then the approver can download the file, and after verifying it, will have to enter his/her digital signature to accept or reject the document. Once he/she has made a decision, the admin who was keeping track of the document's status will be notified whether the document has been accepted or rejected. The admin finally approves or rejects the document and then the user is notified about the final decision. The (EAS) was developed using Java Programming languages and database maintenance uses MySql.

Back to Top


Pharmacy Management System

Talath Shams
Graduation Date: December 2014

Abstract

Pharmacy management system is a web-based application, which is used by pharmacies to manage all pharmacy related activities. Pharmacy management system provides activities like managing stock details, sales and purchase. The functional components of the project are managing stock details, where stock details can be added, edited or deleted. Billing transaction information can be viewed by providing bill number and also getting all the pharmaceutical medication details attached with the bill. Medicine returns can also be taken care with this system. Administrator is one of the user role defined in this application, where he/she can see various statistics about the stock and purchase details. Store users have access to enter stock details and billing information (statistics are restricted for this user). In this thesis project, a prototype solution will be implemented with ASP.NET web technology and SQL server as relational database to save all application related entries and following by rapid application development approach. The basic purpose of this research is to provide effective and efficient pharmacy management facility for both higher and lower management, which has been successfully fulfilled. It is not possible to develop a system that serves all the requirements of all users. User requirements keep changing as the system is being used. Hence, as the requirement evolves, the system can be upgraded as per the requirements and specifications. Key technologies used in this project: ASP.NET, C#.NET, SQL Server.

Back to Top


The Voice-Activated Stolen Vehicle Management System

karn Mukesh Pandya
Graduation Date: December 2014

Abstract

The Voice-Activated Stolen Vehicle Management System (SVMS) is a web-based mobile application for the police department and general public. This application will basically help in finding the actual owner of the recovered stolen vehicle in a timely manner. This will be achieved by creating a centralized application for the police department to query the details of the vehicle recovered. This application will allow users to gather the details of the stolen vehicle along with the owner and FIR details. Thus when someone queries for this vehicle, when found based on the VIN number, they get the information about the actual owner as well as the Police Station in which the complaint was launched. This application will also have a voice search option where a user can search the vehicle using voice i.e. by saying the VIN number. The same application can also be used by the general public when buying a used vehicle to check if it is stolen property. Lastly, this application can also be used to check the details of any suspicious unattended vehicles, thus encouraging public participation in recovering stolen vehicles. The application will be able to run on various android powered mobile devices. The client side of the application will be developed using Android Software Development Kit in eclipse IDE. Server side coding will be done in PHP, HTML, CSS with MySQL as the Database.

Back to Top


Project Reporting System

Niha Sultana
Graduation Date: December 2014

Abstract

The Project Reporting System (PRS) is a web-based time tracking and manpower allocation system that employees will use this program to allocate budget and forecast resource and record actual time spent on each project. Every employee will have a unique login to enter into the system and the function to enter the time spent on each project they are supporting. All the employees should enter work hours on a weekly basis every week. The PRS system gets locked on the last Friday of each month and changes cannot be made prior on the entries. It is designed to reduce project costs and to help complete projects on time and on a fixed budget. In this project, there will be three (3) users: Administrator, Reporting Manager and Employee. As this is a web application project that uses the .NET framework technology along with Microsoft Visual Studio .Net-2008. AJAX Tool kit, Web Services and MS SQL Server. The project is planned to have the view of distributed computing. Constructs of MS-SQL Server will be used and all the user interfaces will be designed using the ASP.Net technologies. The database connectivity is planned using the "SQL Connection" methodology. This application is designed to analyse the whole structure of project reporting based on one project to multiple projects in every corporate computing systems by using three main modules Admin,Manager and Employee who will be having individual access.

Back to Top


On the Topological Design of Network System: Performance and Cost Perspective

Ruqayyah Habeeb
Graduation Date: August 2014

Abstract

The following report examines the components and structures of different network topologies with aims of understanding their strengths, limitations, cost and flexibility. Different network topologies are analyzed within the contents of architecture, flexibility, cost of implementation and performance. The report is subdivided into two parts; the first part analyses the general topology characteristics of Mesh, Star, Bus, Ring and Tree topologies while the second part illustrates the process of implementing a small office network using Star topology. A cost-performance analysis is conducted through quantification of topology structures and the Star network selected as the best due to flexibility, speed, low cost of maintenance and ease of expansion. The project cost for implementing a five-node Star topology is $15,757.00. One of the major limitations found is the labor cost due to the level of expertise required.

Back to Top


Mobile Application of Test System

Qingyan Deng
Graduation Date: August 2014

Abstract

The thesis introduces the Mobile Application of Test System (MATS) developed on Android mobile devices. It explains the development background of the MATS and points out that the MATS could help users, particularly for students, to train and practice on their own mobile devices select professional knowledge tests and exercises. Thereafter, it discusses the key technologies which being used in developing the MATS's development, e.g. Android system architecture, Android activity lifecycle method, Eclipse platform, Java JDK. The main functionalities of the MATS seven modules are presented. In the chapters, the author analyzes the system design architecture, such as components and activity diagrams and describes the data structure of the SQLite database. The thesis describes how the MATS offers the random questions and answers options to users. It also displays how to use each function in the seven modules. The two simulated test modules bring users the experience of a real test by offering counting down timer and test score. The collection of questions which users answer incorrectly during practicing also is a MATS special feature. At the end, the author proposes the possible future enhancements to the MATS.

Back to Top


Web-based Incentive Solution

Mohammed Abdul Muqeeth Siddiqui
Graduation Date: May 2014

Abstract

Web-based Incentive Solution provides an incentive solution for organizations that wants to inspire their employees. Companies rely on rewards programs to retain and motivate employees and sales partners, incorporating a fonnalized recognition program helps strengthen their relationship with the company. This system can be used to create a new site especially for an organizations which enables their employees to earn points for worthy performance, actions and behaviour which can be redeemed at a participating merchant store for merchandise, gift certificates or other items. This web application caters to three users: Program Admin, Partner, Employee. This web application offers all the services required by the Program Admin including: adding new employee/partner details, providing gifts and points to the employees, preserving anniversary points of the employees, display employee status of the points and etc. This project discussess all the aspects of the Partner including generating voucher details, add/update new items and keeping track of the orders received from an employee. From an employee perspective, this project offers services like placing an order with voucher details, checking the status of the order, checking the total points earned and etc.

Back to Top


Focused Web Crawler for Searching Mailcious Web Pages

Anuraj Saxena
Graduation Date: May 2014

Abstract

Computer systems connected to the internet are confronted with a plethora of security threats ranging from computer worms, viruses to Bot networks'. For any worm, virus or a bot agent to be planted in a computer system, web attacks are now-a- days a preferred medium. Drive by download attacks, from malicious web sites, which use malicious JavaScript to attack through the browser, are on the rise. Detection of malicious web content on the internet to avoid compromise of the host PC is an area of active research being promoted by all companies and agencies world- wide.
To search for malicious web pages, typically the first step is to use a crawler to collect URLs which are live on the Internet. Then, fast pre-filtering techniques are employed to reduce the amount of pages needed to be examined by more precise, but slower, analysis tools (such as honey clients) [5][7][8]. While effective, these techniques require a substantial amount of resources. A key reason is that the crawler encounters many pages on the web that are benign, that is, the "toxicity" of the stream of URLs being analyzed is low. This issue can be overcome by having a focused crawler which can seek more malicious sites and avoid benign sites.
Problem statement: In this thesis work, I have developed a focused web crawler which can crawl and search malicious web site in an efficient manner. The focused web crawler designed in this thesis has the following
capabilities- It can crawl more malicious sites in a unit time compared to a generic crawler, it can handle cloaking, entanglement in malicious sites, and AJAX2 content. This crawler has been developed on the Java platform. It has used the JSoup library for parsing of web pages, Rhino Engine for JavaScript emulation in a Sandbox, HTML Unit Engine for Browser emulation in a Sandbox and WEKA library for Data Mining analysis results. The crawler was tested on the internet and the results obtained were analyzed to check the efficacy of this focused crawler.

Back to Top


Consultant WEBSMS System

Ajaz Ahmad Mohammed
Graduation Date: May 2014

Abstract

Consultant WEBSMS System is a web-based application which helps the consulting company to easily communicate with their consultant. It allows the consulting company to send messages to a consultant mobile phone. Messages can be sent free of cost to any mobile phone in any part of the country. This application helps management consulting company to track their timesheet and remind the consultant on a weekly basis to send their timesheet with this application. The problem associated with traditional spreadsheet application is that as the business grows the problems escalate and the management ends up wasting billable time across the organization consultants take longer to fill in their time, admin staff have to consolidate and re-enter the data, the finance team is forever sending out new spreadsheet versions with the latest job codes, and management has to do their own spreadsheet analysis to get the data they need in the right format.
There are functions to download and upload files such as Timesheet, Pay checks, W2's and other related files also. One of the other important facilities of this website is the discussion forum, where consultants can share ideas as well as set appointments to meet other consultants who are interested in the same topic. There is an option to send alerts like different packages to Consultants.

Back to Top


A Mobile Inventory Management System

Peng Xu
Graduation Date: May 2014

Abstract

The Mobile Inventory Management System provides a stable mobile platform for a small business to manage their inventory. It can be easily used by company staff through mobile devices. Additionally, the system manages suppliers' information, buyers' information and product information. This System was developed using JAVA language with Eclipse IDE in junction of Android Developer Tools and Microsoft SQL Server as the backend database system for implementation. It runs on android devices.
The project provides an efficient platform for a manager to retrieve and update basic information such as suppliers' data and customers' data, as well as use the special barcode scanner function to get a commodity's ID number much faster and more accurately. It updates and shares the current inventory list in real time, manages user accounts. In the case of an inventory shortage, the system will notify the manager for reloading automatically. The company can use this system in order to improve productivity and reduce manpower need.

Back to Top


Community Mobile Application

Rarikrishna Kaitheri Manikkoth
Graduation Date: December 2013

Abstract

This thesis is intended to build a community mobile app that provides individuals information about their communities in an easy to understand, graphic manner on their smart phones. Community members can create and manage their profiles through the functionality provided by this mobile app.
This app makes provides ease for individuals with limited digital or English proficiency to view through touch screens without extensive instructions and by reducing the number of clicks. It delivers contract and seasonal job alerts in English, gives a quick way to browse through all events that take place in their community and members can search via keywords for the various community details such as; events, attractions, properties, etc., during their spare time.
This app assists individuals to browse through apartment rentals, houses for rent, property in th e community to buy or sell, attractions in the community, landmarks, upcoming events that are t aking place and also helps to find restaurants in one specific community. The mobile app is implemented using Java frame work with PHP for Android phones.

Back to Top


E-Product Marketing System

Viquar Mohammed Taufeeq
Graduation Date: December 2013

Abstract

E-Product Marketing System is an intranet application that uses an internet protocol technology to share information, operational systems or computing services within an organization. Campaigning is used by several organizations to reach and influence people. There are different campaigns for different products. Compananies make the strategy of running some product marketing campaigns for its new products to be sold to the prospective customers. Before the campaign starts, the estimations are made on sales to be achieved and budget allocations are set for each campaign by the company. When the definite data is captured, the actual amount is calculated. The difference between the actual and the estimated amount provides the company with an insight into their estimation, and helps them in making strategic decisions about budgets. In order to develop this complete information system regarding a campaign, it is necessary to collect the entire data which captures the functionality described above. The proposed system is developed using .NET technology. Moreover, ASP.NET is used for designing user interface forms, and business logic is developed using C# language. SQL server is used for storing relational database entities.
The basic purpose of this research was to provide effective and efficient campaign management facility for both higher and lower management, which has been successfully fulfilled. It is not possible to develop a system that serves all the requirements of all users. User requirements keep changing as the system is being used. Hence, as the requirement evolves, the system can be upgraded as per the requirements and specifications. Key technologies used in this project: ASP.NET, C#,.NET, SQL Server.

Back to Top


Mobile Hotel Management System

Lisha Ma
Graduation Date: August 2013

Abstract

The Mobile Hotel Management System is developed for the large-scale hotels to improve the quality of service, management level and reduce cost. The system provides a mobile platform for the staff to query room information, room reservations, check-in and check-out, report repairs that are needed, room service or some other issues by using the mobile devices.
The advantages of the system are:
1) To provide an effective and efficient way for hotel managers, service staff, receptionist, etc to share and manage the flow of information through the mobile devices in order to improve the service quality.
2) Make it easy for the customers to make reservations and receive service within a short period of time
3) Make it easy for the maintenance technicians to receive their report and provide updates on the status of repairs.
4) Make it easy for the human resource manager to query and update the employee list.
The proposed system will be developed in Eclipse IDE for JAVA EE with the Android Developer Tools (ADT) plugin, it will use JAVA language to implement all of the features in the system and use the SQLite to do the database maintenance.

Back to Top


The Smart Grocery shopping System Designed in ASP.NET

Kathy Y. Lin
Graduation Date: May 2013

Abstract

In this current economy, saving money is all the rage. Americans love bargains, they brave the crowds on Black Friday to get what they want. Unfortunately, it has never been an easy task for grocery shoppers. Grocery manufacturers issue coupons and stores offer incentives to provide the shopper money saving opportunities. Coupons must be clipped from the newspaper inserts or printed from online sources. Oftentimes, you find the coupons are disorganized, out of date or just plain missing when you need them. There is also difficulty and confusion in matching a coupon to the best sale to maximize your savings. Many items said to be "on sale" tend not to be as cost effective as buying them at a competitive store. While you can spend hours matching coupons with the sales manually with some success, a web based application can ease this task and achieve better results.
This research project is to create a dynamic grocery coupon organizer application using the power, flexibility and scalability of ASP.NET web development tool supplemented by VB.NET, HTML, CSS and SQL relational database technologies.

Back to Top


The Survey and Performance Analysis of modern Wireless Telecommunication Networks

Faraz Ahmed
Graduation Date: August 2012

Abstract

This project concerns with a descriptive information of the wireless technology from 2G to 4G (which means the start of digital and onwards). It gives an insight to the back end of the technology and talks about network architecture and its sub-system elements, its specifications and services they provide to the end users. However, the focus of this report lies not only on the network elements itself but also on the interfaces between them. Also, this dissertation is meant to provide a brief, but complete description of all systems and protocol architectures that can serve as an essential, conceptual document that can be used as a base for extending and relating the mobility-specific functions of all networks with that of the up-coming generation technology like Wimax and LTE - Long Term Evolution.

Back to Top


Koha Library Management System

Afshan Anjum Nayeem
Graduation Date: May 2013

Abstract

The focus of the thesis is on Library Management System for KSI. Koha is an open source Web Based Integrated Library System. It contains various modules including Cataloging, Circulation, Online Public Access Catalog (OPAC), acquisitions and patrons. Koha also supports MARC21 (Machine-Readable Cataloging) and UNIMARC for professional cataloging. All modules, style and appearance are fully customizable. Koha has two interfaces - one for the library staff and the other is web OPAC for public access.
Koha is written in Perl programming language. It has client-server architecture. Though Koha software can be installed on any operating system, Debian Linux is recommended. Any web browser like Mozilla, Firefox or Internet Explorer can be used to access Koha. Koha runs on the LAMP platform i.e. Linux, Apache, MySQL and Perl. Z39.50 communication protocol is used for search and retrieval of data.
The main objective of the thesis is to implement and configure Koha for the KSI library. Implementation of Koha includes configuration of Linux, Apache, MySQL, Zebra, YAZ and Perl packages. Various tools required for installing the Koha software stack include - APT Package Manager for Linux packages, Make Utility for Perl modules and CPAN Shell. Koha system has to be configured to maintain information about items in the library. MARC Frameworks, Authority Control and Authorized values are configured in the Cataloging Module. Library items loaned to the users and mapping of library's circulation rules and policies are configured in the Circulation Module. Patron access controls are set in OPAC preferences. Data from the current library database has to be extracted and imported into the new system using Koha's import tools.

Back to Top


MOBILE PERSONAL ASSISTANT

Dheeraj Bhushan
Graduation Date: May 2013

Abstract

The mobile devices or the next generation smart phones are becoming the de-facto computing platform for the masses. With performance now available at a reasonable cost these mobile giants are the devices that will serve as the primary means of interaction between most computer users of tomorrow and their online life. The rapid transformation fromarge desktops, to laptops, to notebooks and then to netbooks, is a testament to this inevitability. However, there is a real gap in needs of the mobile netizens of today and the assistance software available. The primary applications such as email, IM , chat and voice are abundant, however the needs now are vastly different; with people plugged into the Internet in so many ways there has not been a real attempt at assimilating this information in one place to add value across means of interaction. Truly though, before the advent of the very powerful mobile devices of today, this would have been an endeavor in futility; however the devices of today boast processing power many times above laptops of 10 years ago. The mobile devices of today operate at several Ghz of CPU frequency coupled with several Gigabytes of storage. These devices are however largely underused. This project is aimed at creating a repository of information for the netizen of their mobile capability to provide assistance with On-line interaction. The device of choice at this point is Google Android for several reasons. First and foremost the programming language is Java, this makes the Android a long-term leader as compared to the Objective-C base iPhone devices. Although the iPhone is presently the leader of the pack, history tells us that the leaders of technology rarely maintain their position for too long. Irrespective of position, the choice of Android has several benefits. Besides lower barrier for entry, the Android platform is designed for long-term application life from ground up. The ability to use part of a class within and across applications is the first step in that direction. Moreover, the certificate policy requirement for releasing applications with certificate expiration after October 31, 2033; although an indirect indication, is a strong pointer to what Google aspires for their platform Finally, there are several devices that will be coming into the market with the Android platform under the hood presently the count stands at 10 for the year 2009 and the number of devices in 2010 is already over 20. Therefore the first attempt at this application will be made on Google Android as the targeted platform.

Back to Top


P2P Solution for Videoconferencing

Wen Shi
Graduation Date: December 2012

Abstract

Typical videoconferencing usually uses a Multipoint Control Unit (MCU) or a central control computer to negotiate among several remote points. All the video and audio data are transferred through this central point. This kind of structure brings additional hardware costs as well as a bottleneck according to the capacity of the central point. In this project, we are seeking a method to get rid of the MCU part by adopting 'peer-to-peer' connection architecture. Treating the whole Internet as a cluster, we are going to shield physical differences of a hybrid environment and implement basic functions for videoconferencing by pure software.

Back to Top


Events Management System

Sangeetha Sathish
Graduation Date: May 2012

Abstract

This project is aimed at developing an Events Management System that can be accessed by the supply chain group in an organization. The ?Events Management ?is an intranet based application. This system can be used to track the items for the customers in the sales team lead. An event notification form was developed for the supply chain to submit the information. There are features such as email notifications and also the automated alert notifications when the items are altered by the sales team lead. There are contributing permission levels given to the sales team lead and documents shared among employees using this intranet site. The automated email remainder was developed prior to the deadline. There are registered people in the system and the amount of sales where calculated on a regular basis. The system is proposed to be implemented using share point 2010 and wss 3.0, which is built upon component asp.net and sql server database. This is a web-controlled intranet based application can be developed for the interaction between the client and the server system. This web application uses a share point technology along with Asp.net 3.5 and Sql Server 2005.

Back to Top


Psychological Portraiture in Traditional Art and Digital Art: A Study Exploring the Intrinsic Qualities and Dynamics of Each Media

Angela Redmond
Graduation Date: May 2012

Abstract

Within this project, I am examining the use and effect of psychological portraiture in traditional and digital art. A psychological portrait is defined as an image that reveals inner aspects of its subject. This can be portrayed by framing the portrait in such a certain composition that certain features are revealed and others are concealed, as well as incorporating extreme angles and dramatic lighting. This technique is often displayed within paintings, drawings, and photography, but also within digital media such as feature films and abstract video pieces. Psychological portraiture evokes emotion and curiosity in the viewer. Within this project, I am exploring the use of psychological portraiture in Traditional Art as well as Digital Art, and deciphering which particular qualities are best expressed in each media.

Back to Top


myCompanion

Praveen Kumar R. Paidi
Graduation Date: May 2012

Abstract

Currently available Internet applications provide generic information about a given place. They primarily lack personalized information, which is the most important factor for revisiting that place.
Every time people visit a place, they recollect that they have been to that place before but may not remember their past experience at that location, namely restaurants, retail stores, etc. Also when visiting a new place, they would like to know any available information to become more familiar with that place. This can be achieved by automatically identifying the user's location, finding all the information about that location, and presenting it to the user in a simplified and easy-to-use format.
The purpose of this project is to design an Android mobile application that uses GPS and Wi-Fi location services available in the platform to precisely identify the location, retrieve user experience information, and present it to the user. When visiting a new location, the application searches online for information such as type of location, available services, general reviews, and comments. These are then processed and presented to the user in a precise and simple format.
The application will be developed using Android SDK and Eclipse IDE with an Android emulator and development tools plug-in.
Using this application, a person can comfortably visit any location, new and old alike, with profound information about that location.

Back to Top


A Study and Implementation Plan of CPOE for Healthcare Institutions

Hany A. Hamad
Graduation Date: May 2012

Abstract

Patient safety has become a focus for hospital administrators and policymakers. Medication errors in particular have received the most attention because of their high prevalence, slignificant harm to patients, and high costs to hospitals. While the hospital medication process is prone to errors at all stages, the greatest percentage of preventable adverse drug events occur during physician ordering, rendering that phase the prime target for error- reducing strategies. Healthcare institutions have installed computerized physician order entry (CPOE) systems from multiple vendors such as GE, McKesson and Siemens to address the problems inherent in manual order writing. All CPOE systems share a common functionality at their core, but this paper will only focus on some benefits of having a CPOE in place and then give an overview of implementation planning in the healthcare institution.

Back to Top


Bluetooth Enabled Restaurant

Student Name: Syed Adil
Graduation Date: December 2011

Abstract

The project entitled Bluetooth Enabled Restaurant is based on implementing a catalog based service on Bluetooth in a restaurant. It gives Bluetooth experience to the customers who visit the restaurant. A person, with his Bluetooth enabled mobile device can place the order for food items and later pay for the order from his device itself, eliminating the need of waiters. The application even has a song dedication module as an entertainment feature where in the customer can play the songs of his choice from the available list of songs adding his personal message. The form interface needed to connect to the Master through the mobile has been developed in the Symbian OS, an Operating System for Mobile Phones, provides a flavor of C++ called Symbian C++ whose programs are complied and executed using the Compliers-WINS, ARMI and THUMB. The project is based on Point to Point communication over sockets where transfer of List of Items or Songs takes place between the master and the slave that is the mobile device.

Back to Top


PC Remote Controller

Student Name: Mohammed Imran
Graduation Date: August 2011

Abstract

The project entitled PC REMOTE CONTROLLER is based on implementing controlling of devices using Bluetooth. It gives Bluetooth experience to the user who controls his personal devices. A person, with his Bluetooth enabled mobile device can control some of the applications of his PC like Windows Media Player, Change Background Screens & also various closing operations. There is a listener program on the System side written in VB.NET to execute the given commands given by the mobile phone which resides on COM PORT. The form interface needed to connect to the Master through the mobile has been developed in the Symbian OS, an Operating System for Mobile Phones, provides a flavor of C++ called Symbian C++ whose programs are complied and executed using the Compliers-WINS, ARMI, THUMB. The forms for the Mobile Phone are first emulated on an emulator called EPOC, proprietary software of Nokia, later this is loaded into the Mobile Phone. The project is based on Point to Point communication over sockets where transfer of List of menu items takes place between the mobile & PC. An attempt has been made to play the desired song in Windows Media Player of the Computer System, which is activated by a program developed in VB.NET, which uses the information provided by the Mobile Phone. The commands have been sent from the Mobile Phone to the Computer System using an API called BTSocket and BTSerialService provided by the Symbian C++.

Back to Top


Automatic Postage Stamp System

Student Name: Nooruddin Mohammed
Graduation Date: August 2011

Abstract

This project deals with the online posting of objects without going to the post office. Updating the mechanism of postage with technology and reducing the overhead of going manually to the post office there comes an AUTOMATIC POSTAGE STAMP SYSTEM" (APSS) into picture. With APSS everyone can do the online postage from their organization and it will be the responsibility of post office to collect the postage object from you. The APSS application take the type and weight of the object to be sent, along with the source and destination address. Based on these three values it calculates the amount of money required to send the object. The main objective development in the field of internet and distributed networking along with distributed databases has shown a lot of changes in the department of banking, telecommunication, electricity etc. But there are not much changes found in the department of post offices for posting of articles. In this study we are determining a way to change the efficiency of the postal department. The day-to-day new technology in the market, which is supporting the 3-tier architecture framework, can make a change in the mechanism of posting objects between two locations. The two technologies, which are supporting distributed computing, are Sun's J2EE and Microsoft dot net. Using one of these technologies along with the backend database we can get our goal done. The software will be developed in Java as the user-interface using JSP, web-logic sever and Oracle as the backend.

Back to Top


Nature Capture System

Student Name: Liwei Jiang
Graduation Date: May 2011

Abstract

The Nature Capture System is developed for digitally capturing environmental objects, storing and retrieving associated metadata over the internet. It helps users to capture, share, store and retrieve data that are related to specific environmental objects. The system provides a platform to share and increase systematic knowledge of the objects which belong to the biological kingdoms of fungi. Natural objects will be captured by users through external devices, such as digital cameras, and uploaded into either the application database or system servers over the internet.

Back to Top


Dualis

Student Name: Yu-Chian Wang
Graduation Date: May 2011

Abstract

Animation techniques are used in film, video and art production for diverse goals. Animation is used to add realistic qualities to scenes and special effects, it can create magical qualities, or it can determine an entire stylistic vision. No matter the end purpose of the animation technique, the ultimate purpose is to create illusion. This research will investigate the many processes of creating animation and Visual effects (Visual F/X or VFX) including traditional 2D, stop-motion, 3D modeling, computer generated imagery (CGI), and present a history of such techniques, citing specific examples. Specifically, the process of mixed animation technique will be explored through discussion of examples and investigation of types of mixed animation technique, especially where dream sequences and portrayal of alternate worlds is involved. Finally, I will present my own art work with an original musical composition by Martin Simon, a piece of animation which explores diverse techniques within the work itself, and uses the contrasting styles to explore and define my creative and narrative process.

Back to Top


Torrent Times

Student Name: Wen Liu
Graduation Date: August 2010

Abstract

Torrent Times is a project about human's instincts. The focal point in this project is human emotion and desire. I want my audience to get into this project and chose their own way to play with it. I want to leave this project open enough, so there will be more possibilities which will be created or found by the user. From the very beginning of human culture, we were already there. Now we are still here in the same place, but different time. Time flows really fast, it never waits for anyone or anything. We will be ashes. We will die. But it doesn't matter. It is just like raining, everything flows with the rain drops and we flow with time. Torrent Times is a representation of rapid changes. With our emotions and desires, we have changed our life and history. But in this project I am not emphasizing history or life. I am reaching for different emotions and desires of different people. (Everyone loves different things, the emotion is love, but the desires are different. For instance, I love to play basketball, so my desire is the game of basketball. My brother loves to read books, so his desire is to read books. We have the same emotion which is love, but we have totally different desires.) The important factor in this project is the relationship between emotion and desire. But if I put emotion and desire separately they can still create many possibilities. We are controlled by our emotion and desire. What if we are out of control of our emotion and desire? What will happen? "Torrent Times" contains video, audio and computer graphic transformation techniques. With the written text, "Torrent Times" will show you my own definition about human instincts.

Back to Top


Quality Assurance Mentor

Student Name: Masarath Durraj Mohammed
Graduation Date: August 2010

Abstract

The main requirements of this project are to provide an interaction medium for the customers and the employees of the organization which is undergoing the assessment for a Quality Assurance certification. The main modules of this project involve the customer and employee. The customer module deals with collecting the information from the customer who is interested in getting certified with some Quality Assurance certificate. The customer here will disclose matters related to the enterprise. The Employee module includes the work done by the auditors, surveillance team during the visit to the company under assessment. The reports submitted to the company will be used to analyze the company's track record its product quality etc before issuing the certification.

Back to Top


The Efficiency and Implementability of Bioinformatics Algorithms

Student Name: Mohammadali Towhidlou
Graduation Date: May 2010

Abstract

This thesis is intended to introduce biological and algorithmic ideas that, when combined, link issues in biology to computer science and mathematics and therefore proves valuable to scientists in deriving conclusions. It demonstrates that relatively few design techniques can be used to solve a large number of practical problems in biology, and presents the ability to implement bioinformatics algorithms intuitively. This seeks to demonstrate the mechanics of algorithms in the context of the mechanics of input and output using mathematical and logical equations that are always accurate and efficient, and never fail if they are designed correctly. In this study, will deal with serious bioinformatics problems and show how efficiently applying those algorithmic ideas to these biological issues can help us find correct solutions in a timely manner.

Back to Top


Online Real Estate Managment

Student Name: Wajid Ali Imran Mohammed
Graduation Date: August 2009

Abstract

Real estate business is a boom nowadays. The market in real estate is giving an individual an immense opportunity to develop his business successfully. This project is aimed at developing an online real estate agent system that is of beneficial to either a real estate agent or a prospective. The "Online Real Estate Management" is an internet based application. This system can be used to store and search the property portfolios. The system will be implemented over a network, comparing hosts at different levels of hierarchy. The data will be stored on the servers and controlled access will be provided to the users. Moreover, the data transmission should be a secured one. Only authorized users will be allowed to access data on the server. The system is proposed to be implemented using ASP .NET. The database will be stored in the SQL server. Web Controlled based applications can be developed for the interaction between the Client and the Server systems. This is a web application project that uses the .NET framework technology, along with the SQL Server 2000 Database. The Operating system supported is the Win2K or later with .Net framework technology. The Minimum hard disk storage capacity is 5 GB, with Pentium IV or higher processor. The RAM supported is 256MB.

Back to Top


Smart Communication: An Intranet Based Collaboration Tool

Student Name: Nazim Khaja
Graduation Date: May 2009

Abstract

The objective of implementing this project is to increase productivity and helps in faster and better decision-making. There is a need for a system that would assist team members in communicating and collaborating with each other. Further goals of the project include avoid duplicated effort, avoid delays in performing revision and encourage creativity and issue solving. Communication is a process that allows organisms to exchange information by several methods. Communication requires that all parties understand a common language that is exchanged with each other. Exchange requires feedback. The word communication is also used in the context where little or no feedback is expected such as broadcasting, or where the feedback may be delayed as the sender or receiver use different methods. Technologies, timing and means for feedback. There are auditory means, such as speaking, singing and sometimes tone of voice, and nonverbal, physical means, such as body language, sign language, Para language, touch, eye contact, or the use of writing. The users of this system are not naive users; they use computers to perform tasks, such as monitoring a server or maintaining a database. Team members would be encouraged to use the system. Since the project will be implemented with employees with knowledge of computers, it's easier for the members to use the product. It would also be possible to track the usage of the system by team members.

Back to Top


KSI Library Management System Utilizing RFID

Student Name: Javier Vazquez Navarrete
Graduation Date: May 2009

Abstract

RFID (Radio Frequency Identification) is the latest technology to be used in library management systems to date. Unlike EM (Electro-Mechanical) and RF (Radio Frequency) systems which have been used in libraries for decades, RFID-based systems move beyond traditional systems and are more efficient in the management of materials throughout the library. This thesis project presents the functioning of a RFID library management system consisting of a radio frequency module (the reader) connected to local computer with a Web-Based library manager database application installed. The KSI library RFID system will be designed to take on the appearance and functionality of the current KSI library system to simplify and speed the process of identification and management of each library item. Libraries commonly deal with the large amounts of transactions that are reported every day in strict records that must keep in some sort of database to ensure the integrity and availability of the library catalog. For years, this process was done by hand, whereby borrowed or returned books would be counted daily and records would have to be updated manually. The RFID system allows items to be identified with an RFID transponder that would wirelessly read the tag on an item. The RFID system will be configured with a communication interface to the reader among various other components. It will receive the unique information from a passive library tag; the tag will be read only from 3 to 5 inches of distance from the antenna. The data or information will be processed against its own local database, after which the librarian can start another transaction. In this project the library's staff will practice with the RFID technology to manage fast and efficiently the library materials. The patron will perceive and experience the process of check in-out as a quick automated operation. The implementation of this RFID project named "KSI Library Management System Utilizing RFID" will give the KSI library the opportunity to explore, and eventually consider if this solution is viable according to future expectative of management Library Catalog. The RFID technology is the future for libraries.

Back to Top


Defect Tracking System (DTS)

Student Name: Pavan Goverdhana
Graduation Date: December 2008

Abstract

This project is aimed at developing an online defect tracking system useful for applications developed in an organization. The Defect Tracking System (DTS) is a web based application that can be accessed throughout the organization. This system can be used for logging defects against an application/module, assigning defects to individuals and tracking the defects to resolution. There are features like email notifications, user maintenance, user access control, report generators etc in this system. The entire project has been developed keeping in view of the distributed client server computing technology, in mind. The specification has been normalized up to 3NF to eliminate all the anomalies that may arise due to the database transaction that are executed by the general users and the organizational administration. The user interfaces are browser specific to give distributed accessibility for the overall system. The internal database has been selected as MS-SQL server 200.The basic constructs of table spaces, clusters and indexes have been exploited to provide higher consistency and reliability for the data storage. The MS-SQL server 200 was a choice as it provides the constructs of high-level reliability and security. The total front end was dominated using the ASP.Net technologies. At all proper levels high care was taken to check that the system manages the data consistency with proper business rules or validations. The database connectivity was planned using the latest "SQL Connection" technology provided by Microsoft Corporation. The authentication and authorization was crosschecked at all the relevant stages. The user level accessibility has been restricted into two zones .

Back to Top


Patient Health Care Information Systems

Student Name: Shailaja Akula
Graduation Date: December 2008

Abstract

The Patient Health Care Information System (PHCIS) is a web-based system which can be considered as the heart of almost all Health Care organizations, Hospitals etc., relating to Patients and their health conditions, Health Insurance and Coverage, Doctors and Treatments at any Health Care Organization. PHCIS helps the management of the Hospital to maintain an intelligent database about the patient health care details. This project will go a long way in helping the Health care Community to grow further. The PHCIS deals with all the administrative tasks of the health Care organization like Inpatient and Outpatient Info, Hospital Visits, Treatments, Health Insurance and coverage etc., to meet the needs of Doctors and staff in managing their Patient information. The system is intended to be designed using Business Objects, ASP.NET, C#.NET and MS SOL Server 2005. The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of MS-SOL Server 2005 and all the user interfaces has been designed using the ASP.Net technologies. The database connectivity is planned using the "SOL Connection" methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports, which are produced as per the applicable strategies and standards that are put forwarded by the administrative staff. The Project also includes BUSINESS OBJECTS 6.5 to build the PHCIS Universe and generate associated reports to analyze and enhance the process of PHCIS as required.

Back to Top


Business Objects

Student Name: Pavan Kumar Devarasetti
Graduation Date: December 2008

Abstract

Any organization needs how it is growing, what are its positives and negatives. In order do that they need reports of all above mentioned things and Speed up the organization to new levels of performance. Business Objects is the ftrst and only business intelligence (BI) platform to deliver a complete set of market-leading, end-to-end BI capabilities: best-in-class enterprise performance management (EPM), dashboards and visualization, reporting, query and analysis, and enterprise information management (ElM). Business Objects introduces significant innovations that deliver BI in new ways to a broad set of users. A Business Objects implementation is a project that you will never fmish and is one in which the best you can do is to provide a starting point for users to make more informed decisions and discover opportunities. With so much product capability, you must stay focused on the business value of business intelligence. Your challenge will be to understand how the history of business intelligence in your company influences your users' attitudes, understanding, and receptiveness towards Business Objects Main aim of this project is to do a case study on Business Intelligence tool and to build reports for the island resort company from the scratch. This involves 3 stages 1. Building a data base 2. Building a universe (using the front end Business objects Designer module) 3. Finally producing the reports for the company as required.

Back to Top


Secured Personal Directory System Using Web

Student Name: Bharath Kumar Katukuri
Graduation Date: December 2008

Abstract

The purpose of this thesis is to design a Secured Personal Directory System which can assist the users in adding and updating their personal contact information on Web, so that user can get the details at any time by connecting to the specified URL. The application allows users: ~ To add information such as Contact Names, Address Location, Telephone Numbers, Email Address and so on using a secured Username and Password. ~ To modify the information they have entered, the function to Have Scheduling, Event reminders, Group Notice etc. ~ Easy retrieval of information by using Directory Criteria. The Secured Personal Directory System will a Web based, User Friendly, Powerful and simple to use graphical user interface application which will be developed following a Tier based design and Usage of components approach using ASP.NET Web based technology. SQL Server 2005 will be used as database back end and stored procedures are used for database retrieval and updates.

Back to Top


Yellow + Blue = Life

Student Name: Mei Miao Lu
Graduation Date: December 2008

Abstract

As a student in Digital Art Program at KSI/ Knowledge Systems Institute, I believe that any single life on earth is a gift from God. Human beings are the most precious gift of God, and while we live in a technologically enhanced environment we cannot live without a variety of natural resources. We convert natural resources into products and use them in many different ways. The expression and interpretation of these concerns are the focus of my artistic experiments. The ideas of "Go Green" and "ECO-friendly" have become popular topics nowadays. The reasons are extreme population growth and global warming. Our life has been changed in many ways since the rapid growth of human society. Therefore, the balance between human beings and Nature has been lost. My thesis "Yellow+ Blue= Life" consists of the video work and computer graphic art imagery, along with the written text. The written text includes three main chapters. "Media Arts in East Asia and in the World" involves a short art history of East Asia, which will focus on four countries in East Asia. These are China, Japan, Korea, and Taiwan. "Background" talks about some artworks that are related to my subject of ECO-Friendliness. "Project :Yellow+ Blue= Life" talks about my video work and computer graphic art imagery and the Colors, which are the primary colors of pigments and light. A computer graphical transformation from shadow to light or from colors to colors will embody my thoughts and wishes for our environment.

Back to Top


The Chronobot Administrator System

Student Name: Hsuan Wei Peng
Graduation Date: December 2008

Abstract

The Chronobot System is a very useful system for storing and borrowing time. The system allows the Chronobot members to exchange time and knowledge. Members can borrow time from some one else and return time to the same person or a different perrsion. This system is developed by using JavaServer Pages (JSP), Apache Tomcat and Microsoft SQL Server. Those are very popular and powerful tools for building various kinds of web-based systems. The Chronobot System has already included many functions, such as to create an auction, and place bids at an auction. Those functions are useful for members to exchange time and knowledge. However, this system needs a very important role, which is the administrator. Administrators would be able to manage the Chronobot System. They would be able to manage all auctions which are provided by a member, and can manage any bidding room; they will also be able to manage any member in this system. This project is to develop the administrator's functions for the Chronobot System. Those functions are developed by using Java and have a web page interface to maintain and manage the system. These functions are based on the Chronobot System. This project will make the Chronobot System easier to maintain.

Back to Top


The Chronobot Job Placement System-User Interface

Student Name: Tu-Lun Pan
Graduation Date: 7/2007

Abstract

The purpose ofthis project is to develop a job posting and searching website that provides a job placement service for job seekers and employers. The job placement service acts as an intermediary between job seekers and employers to help them find the right job and the right person for the job. The service gives job seekers access to job postings and information about the labor market and employment data. It also allows them to post their resumes. As for the employers, the service allows them to post job openings and obtain information that will assist them on job postings. The website is implemented on top ofthe Chronobot System with JavaServer Pages (JSP) technology, which enables web developers and designers to rapidly develop and easily maintain, information-rich, dynamic web pages that leverage existing business systems.

Back to Top


Health Level Seven Integration Design

Student Name: Zhiyang Zheng
Graduation Date: May 2007

Abstract

Healthcare is a very wide concept which mainly refers to the prevention, treatment, and management of illness and the preservation of mental and physical well-being through the services offered by the medical and allied health professions. Nowadays, it is amazing to see how Information Technology progressively contributes in the healthcare industry. The Computer and Information System plays an increasingly important role in the information managements on almost all the medical activities. There are many of sub-systems within the Healthcare Information System (HCIS). Together they help people manage data like demographics, billings, diagnoses and laboratory results of patients. They share data but work separately. Thus, a big challenge is how to integrate different sub-systems to offer a secure and efficient data environment. This thesis is about to provide a solution for communication between two separated subsystems within the Healthcare Information System (HCIS), the HIS (Hospital Information System) and EMR (Electronic Medical Report) system by using HL 7 messages, a standard of data format. HL 7, which stands for Health Level 7, makes it possible to use the same language no matter what vendor provides the system. In addition, a data interface is responsible to control the transferring among systems. The author will demonstrate an interface design and implementation of a middleware to handle the transform in HL 7 standard.

Back to Top


Applying Sequential Space Relativity for Image Recognition

Student Name: Roby Chhokar
Graduation Date: May 2006

Abstract

In this research we attempt to perform image recognition using some of the known properties that humans possess. In particular, we use the property of the eye performing saccades on an image. We correlated space and time as the essence ofthis type ofbehavior. We described space as the amount of space the current image portion in the visual was taking during a saccade, and time was described as the sequence of saccades. From intuition, we introduced the notion of relativity from one saccade to another, and used this idea to build a sequence. A system was developed to implement this theory that consisted of 100 training images, and 400 distorted images to test the system's recognition ability. The distorted images were created from the training images and had either been: rotated/mirrored; scaled (larger or smaller); partially removed; or noise-added. The system presented a 95% accuracy rate for partial images, 62% for scaled images, 60% for noise-added images, and 55% for flipped images. We found that the theory's applicability may be promising for industrial applications, if it can exhibit sequence path changes and saccadic distance changes dynamically during Recognition.

Back to Top


Online Banking

Student Name: Abdulmubeen Mohammed
Graduation Date: December 2006

Abstract

The main purpose of this proposed system is to provide a customer of bank with value added service like making available the Banking activities through Internet. The services are like to enable registered account details, to transfer amount from one account to another account and making request for bank statements, cheque books and bill payments. Customers can view their transaction. The registered user will also be able to modify any personal details such as address etc. It will reduce the amount of time spent by the employees and by sitting at remote place also you can do the transactions globally. The online banking is time saving and accurate.

Back to Top


Online Web Hunt

Student Name: Muhammas Qaisar Masood
Graduation Date: December 2006

Abstract

Online Web Hunt is a virtual space for users to meet online, job seekers and employers alike. A database is used to collect the minute details about job seekers and employers. Web Hunt serves to collect multiple resumes from the job seekers. Web Hunt aims to provide potential employers with detailed information about job seekers. The online system is to support various functions so that users have different levels of control over data. Both job seekers and employers are potential clients to the Web site. Users will be required to register themselves prior to their access to the site regardless of his or her status as a job seeker or a potential employer. An individual job seeker's profile will contain information such as professional experience, education, skills, affiliations, and so forth. File submission will be supported for all job seekers to upload their resumes. Also, it will be important to set up a search engine for data search purposes which meets the critical needs of potential employers when they look for suitable candidates. In this thesis project, a prototype solution will be implemented with ASP.NET Web technology following the rapid application development approach.

Back to Top


Designing A Networked Java Action Game For A Cell Phone

Student Name: Naudina Punch
Graduation Date: December 2005

Abstract

Technology has become an ever-present factor of our lives. Those of us living in the Western Society cannot get by without it. During the last century the radio and television have become indispensable tools of modem living. But, as we have entered upon the twenty-first century we fmd another little mechanism, much less obtrusive yet far more dominant. It is the cell phone. This minute apparatus is with us everywhere we go. Since the situation is inescapable, we may as well fmd whatever means possible to maximize its usefulness. A number of wise innovators have found the cell phone to be a ready tool of innovation. It has been used to provide ordinary telephone services, as a clock, for banking transactions, sending and receiving text messages, as an instrument for playing games, et cetra. There seems to be no limit to the versatility of this little mobile instrument. This thesis shows another feature that can be added to the cell phone. A two player networked game. This will provide much more fun than is presently possible, where only one player can perform at a time. No matter how interesting a game may be, there is intrinsically much more happiness when it can be shared with another party, instead of one having to play all alone. In this game two persons may engage each other regardless of where they may be physically located at a particular moment. A phone may not be a great game device by comparison to modem consoles or computers, but people have their phones with them almost all the time. Give them good games to play when away from home, and they will play. This game is done on the Java 2 Platform, Micro Edition (J2ME) which provides a flexible and robust environment for small devices such as cell phones.

Back to Top


Building An Options Trading Analysis Tool Using ASP.Net

Student Name: Pien Chen Tsai
Graduation Date: December 2005

Abstract

The world of financial markets is changing more quickly than ever. A host of new products and financial instruments has been introduced and better understood against a backdrop of the digital age of investment that seems to make revolutionary advances daily. The well-understood financial instruments make investment decisions easier and more profitable. Successful investment requires knowledge about how the investment works, comfort with the specialized language unique to that investment, and an understanding of the risks involved. Although it is held as a general opinion that options are appropriate only for highrolling speculators willing to take extraordinary risks, this thesis will discuss a simple technique or trading strategy for using stock options that retail investors can apply to their own stock portfolio. Options can be used to hedge stock investment positions, or even as a form of insurance against the risk of loss in a stock investment. In other words, stock options can be used as an effective tool to manage or reduce risks of owning stocks. Options provide far more opportunities and protection than investing solely in stocks. Therefore, this thesis project is also intended to develop a decision support tool using ASP.NET, which is designed to help return on investment (ROI) analysis for retail investors to take advantage of stock options trading strategies in order to enhance portfolio performance and further mitigate stock price risks involved in equity investment.

Back to Top


The Implementation of Jedtector ? A Tool for Incremental Change In JAVA Code

Student Name: Xiang Zhou
Graduation Date: May 2004

Abstract

During software evolution, programmers add new functionalities and release new versions of software. This can be a complicated and tedious work, particularly for large applications. This paper introduces a tool named JavaDetector that helps programmers to make incremental changes in Java applications easy and efficient. In particular, the tool supports the following functions: 1) extracting dependency information from source code; 2) querying, accessing, processing and updating the incremental changes in Java program; 3) helping programmers implement the concept location; 4) detecting change occurrence, analyzing impact, and recovering inconsistence in the whole system. The usefulness of the tool has been proved by a case study of a change in the open source application, called JHotDraw.

Back to Top


Implementation of Voice over IP in Peer to Peer Environment

Student Name: Ching-Yusn Tseng
Graduation Date: December 2004

Abstract

The purpose of the communication over IP networks is it offers endless opportunities to improve business information flow, provide new methods to achieve goals, and reduce transaction and deployment costs. That means there is no expensive equipment to buy, no meeting rooms to book and no separate phone lines or connections to coordinate. A simple headset or microphone and Network connection, user can speak with other meeting participants without paying long distance call charges. The contents for this project are: 1. Do the theory study of voice over IP. 2. Do the survey of growing marketing product for voice over IP. 3. Implement peer to peer system. Real-time Net-Voice system is a PC-to-PC/ Client-to-Client speech sounds with microphone over IP networks transmission. Microsoft Multimedia Audio function records the voice and then compresses it and then sends it to the connected TCP sockets. Application access the Transmission Control ProtocoV Internet Protocol {TCP/IP) stack through the Windows Socket (Winsock) interface. Winsock is used to discover and use the communications capabilities of underlying transport protocols. It enables programmers to create advanced Internet, intranet, and other network-capable applications to transmit application data across the wire, independent of the network protocol being used.

Back to Top


The Design of Computational Java Bean Component Package for Protein Sequence Analysis

Student Name: Andy Lo (Bio-informatics concentration)
Graduation Date: September 2003

Abstract

Based on the complexity of genome information analysis, this thesis represents a custom design component package for analysising the genome sequence data and unit. This thesis will represent the software component design pattern and implementation for supporting the design processes of bioinformatics components. By following this custom package which is designed to be a collection of reusable components under SUN Java platform, this thesis is prepared in an attempt to help the bioinformatics software developers easily inherit this protein sequence alignment functionality as well as enhance their software design in any demanding fields of biotechnology.

Back to Top


The Design and Implementation of JavaHelp System for Java Client Application Service

Student Name: Andy Lo (Software Engineering concentration)
Graduation Date: September 2003

Abstract

This thesis is intended to explore the major technical challenges facing developers and authors of online help systems who need to integrate online help features into proprietary software programs in a local or network setting, which involves adoption of proven strategies of help system design and help documentation analysis. It discusses the help system development process using the architecture of reusable JavaHelp components from Sun Microsystems. It also explains the programming details of building a sample help system as well as implementation of JavaHelp to integrate online help features into a proprietary software program.

Back to Top


E-Commerce Application Using SQL-Server 2000 And ASP

Student Name: Kaplesh Zala
Graduation Date: June 2003

Abstract

Delivering the high levels of reliability and availability required of business-to-consumer Web sites requires not only great technology, but also great operational processes. Building a scalable, highly available application is a necessary process in becoming functional as an e-commerce entity. Here the author has tried developing the most basic modules required in an online business, using Microsoft SQL-server, ASP and IIS Web server. All of the key processes and tools are covered in this store from retail storefront to back end management. The real scenario of this store is presented in the chapter 5 and source code is included in appendix. The author is going to develop a real world application using this model for the company that employs him.

Back to Top


Digital Video Transmission over Wireless Channels

Student Name: P Wang
Graduation Date: June 2003

Abstract

Wireless technology has become the most exciting area in telecommunication and networking. The rapid growth of mobile telephone use, various satellite services, and now the wireless Internet are generating tremendous changes in telecommunications and networking. Wireless is convenient and often less expensive to deploy than fixed service, but wireless is not perfect. There are limitations, political and technical difficulties that may ultimately prevent wireless technologies from reaching their full potential. Regardless of the design of the transmission system, there will be errors, resulting in the change of one or more bits in a transmitted frame. In this thesis, we focus on different characteristics of wireless channels and their applications to video transmission framework. Channel coding and interleaving techniques have long been recognized as an effective technique for combating the deleterious effects of noise, interference, jamming, fading, and other channel impairments. The basic idea of channel coding is to introduce controlled redundancy into the transmitted signals that is exploited at the receiver to correct channel induced errors by means of forward error correction. Channel coding can also be used for error detection in schemes that employ automatic repeat request (ARQ) strategies. ARQ strategies must have a feedback channel to relay the retransmission requests from the receiver back to the transmitter when errors are detected. ARQ schemes require buffering at the transmitter and/or receiver and, therefore, are suitable for data applications but are not suitable for delay sensitive voice applications. Problem of video transmission over wireless channels has been addressed in literature. In this thesis, we will present a review of these techniques. However, we will mainly focus on different characteristics of wireless channels and their implications on video transmission framework. Therefore, before discussing specific tools in chapter 7, we first present the characteristics of wireless channels in chapter 5 and chapter 6. In chapter 8, we present the performance of the protocol, based on a network simulation. In chapter 9, we present conclusions and future work.

Back to Top


A Cross Platform Web Service Implementation using SOAP

Student Name: Richard Huang
Graduation Date: January 2003

Abstract

SOAP's place in the web services technology stack is as a standardized packaging protocol for the messages shared by the applications. It uses Extensible Markup Language (XML) as the mechanism for information exchange. Since Web protocols are installed and are available for application by all major operating system platforms, HTTP and XML provide an already at-hand solution to the problem of how programs run under different operating systems in a network. SOAP specifies exactly how to encode an HTTP header and an XML file so that a program in one computer can call a program in another computer and pass its information. It also specifies how the called program can return a response. SOAP is XML. That is, SOAP is an application of the XML specification. It relies heavily on XML standards like XML Schema and XML Namespaces for its definition and function. XML messaging is where applications exchange information using XML documents. It provides a flexible way for applications to communicate, and forms the basis of SOAP. All SOAP messages are encoded using XML. In this thesis, web services, SOAP, WSDL and UDDI are discussed. A web service which queries stock quotes from Yahoo! Finance using SOAP under different server platforms (JAVA and ASP) is implemented and compared in this project.

Back to Top


Software Agent

Student Name: Daniel Li
Graduation Date: December 2002

Abstract

"Agent" and "agent software" have become popular words in computer software. The reason why this area gains the popularity is because it is based upon AI (Artificial Intelligence) but works only in its specific field, like a narrowly focused AI program. Agent software has been developed for many different uses in a variety of areas because of its extraordinary ability of adapting to the specific field of interest. This project first presents an overview of the software agent, which starts from the introduction of the definition of the software agent, its terminology, its formal frameworks and its other basics. Afterwards, the concepts and specifications of 'smart' agent framework are brought into context to describe how the software agent works behind the scene. This includes action, operation, autonomous behavior and communication of agents. The way that a software agent generates its goals of achievement and to evaluation of its progress is also very important in keeping agent working in the right path. Next, we discuss the new generation of intelligent software agents to take a brief look at how an intelligent software agent can complete its tasks and what it can do in the present time. The Growing Book project is a very typical software agent application that helps distance learning students obtain the correct course material. With the correct input of a username and password, the students will have all the class material available for them in a short time on their local computer. This saves a lot of work for students and it also greatly decreases the chance that students may download the wrong material. On the other hand, this agent protects the class material file server from access by outsiders. A scenario of the Growing Book software agent is included in the Appendix A.

Back to Top


A Comparative Study and Implementation of Network Security

Student Name: Chien-Wen Lo
Graduation Date: December 2002

Abstract

Companies without controlled doors cannot ensure the security and safety of their employees, nor can they prevent piracy and theft. Networks without controlled access cannot guarantee the security or privacy of stored data, nor can they keep network resources from being exploited by hackers. This study adopts several different firewall programs and uses Windows 2000 Server as the platform to test, and ultimately compare in detail, two different facets of each program, functionality and performance. Network security is always the most important issue of the company. From this study, recommendations will be provided through the testing of the firewall programs. When a company starts to use a firewall or other security measures, the performance of the network will be reduced. Trade-offs between security of the network and ease of access must be resolved. However, the solution to the negative aspects of firewalls is another issue to be dealt with in the future.

Back to Top


Data Mining in a Library

Student Name: Kun-Lin Tsai
Graduation Date: April 2002

Abstract

This system is designed for librarians to help them manage the library easily. Data Mining is an inductive data analysis method. It involves different kinds of technologies, solutions and techniques. Because of its pattern-recognition feature, it can be applied to a large database. Data mining software can relate one field to the other fields in the database. It can be used to analyze the on-line users' behavior and to predict the future potential users. Now, we can apply data mining to library systems using artificial intelligence technology. This system will focus on using interactive feedback. For KSI students who use the library frequently, it can help students to find information, and build a more useful KSI library system. This project will provide many kinds of statistic results and enhance our current library system to reach this goal. The Application Program Interface (API) of the system was designed by using Java Servlet technology and combining it with the database of Microsoft SQL Server 2000.

Back to Top


A Small Office Database Management System using Java Servlet

Student Name: Yan Li
Graduation Date: April 2002

Abstract

This thesis describes how to use Java to operate the database through network and how to set tables in database and how to configure the Java servlet engine. Through such processes, we may understand how to set up remote database for some small businesses, how to retrieve and output data. We may also understand how to install the Java servlet engine in its server environment as well as how to use browser to communicate with Web server.

Back to Top


An Online Health Consulting and Shopping Center implemented by Java Server Pages

Student Name: Hsien-Min Yeh
Graduation Date: January 2002

Abstract

Electronic commerce (e-commerce) has been sweeping the globe. For a long time, information technology was mainly passive; users went online and downloaded data. Today, information technology offers interactive and communication functions, which makes e-commerce more than a fad. Now, it has become a part of the way people live their lives. Dynamic Web sites contain Web pages that display constantly changing content; a technique that is an important foundation of e-commerce. There are two ways to achieve dynamic content generation: programmatic content generation, and template-based content generation. Java servlets falls into the first category, while JavaServer Pages (JSP) belongs to the second category. JSP is a simple but powerful technology used to generate dynamic HTML on the server side. They are a direct extension of Java servlets and provide a way to separate content generation from content presentation. In this project, Tomcat was adopted to be the JSP engine and this thesis designs an online health consulting and shopping center that can provide users personal dietary assessment, nutritional news, professional knowledge of nutrition, special diets for patients, the posting of questions and shopping for nutritional supply products. On the other hand, the project connects to a Microsoft Access database using a type 1 JDBC-ODBC Bridge, plus ODBC driver. In this way, staff can easily manage different kind of information in the database of this health center. In short, JSP is more convenient to write by using conventional HTML writing tools and easier to modify because only the dynamic parts need to be changed when updating a web page. Furthermore, JSP with Java is more flexible because they are platform independent.

Back to Top


JAVA Security on the Internet

Student Name: Lifeng Zhang
Graduation Date: January 2002

Abstract

Whenever someone uses a Java-enabled browser like Netscape Navigator or Microsoft Internet Explorer to surf the Web, he becomes a java user. All Java users are taking security risks, because most java code is automatically downloaded across the network and runs on the user's machine. The hostile Java programs could trash their machine. Fortunately, the creators of Java made a good effort to protect users from these hazards. Security for the Java Platform has multiple layers. First of all, the Java language is strongly typed and does not include any unsafe constructs, such as array accesses without index checking. Second, mechanisms (for example, class loaders) are in place to ensure a sufficient degree of separation between multiple Java programs. Third, access to crucial system resources is mediated by the Java virtual machine. A security manager is installed to deny all requests for unauthorized access. The Java 2 and the latest version incorporate a security architecture that support policy-driven, fine-grained, flexible, and extensible access control. This thesis is meant to introduce basic concepts of Java and about risks, and to provide a general overview of Java security in distributed program environments and give references for more detailed information.

Back to Top


An E-commerce Implementation Using JAVA Servlet,JSP and MySQL

Student Name: Tung-Lin Tsai
Graduation Date: December 2001

Abstract

E-commerce has changed the global business-model and economic structure completely. The Internet's development has created a global electronic marketplace that goes beyond the limitation of time and space. Server-side Java and database are a perfect combination for an E-commerce web site development. An example for that is a JavaServer Page (JSP), Servlet engine such as the Apache Jakarta project's Tomcat, and a database like MySQL. All of them are freely available and have an open source. Java Servlet and JSP technology provide an attractive alternative compared to other types of dynamic Web scripting/programming. These attractive things are platform independence, enhanced performance, separation of logic from display, ease of administration, extensibility into the enterprise and most importantly, the ease of use. MySQL database is fast in retrieving data and very reliable. Many ISPs (Internet Service Providers) offer MySQL at little or no extra charge. This project will attempt to build a small to midsize E-commerce web sites by using Java Servlet and JSP technology and combining them with MySQL database.

Back to Top


A Survey and Implementation of E-Commerce in Supply Chain Management

Student Name: Hui-Chun Lee
Graduation Date: December 2001

Abstract

With the growth of the Internet, more and more companies are dedicated to e-business. Supply chain management has been deemed as one of the useful tools for businesses to promote their competitiveness, and to build up their trust relationship with up and down stream businesses. In order to link the whole value chain, information technology (IT) application has already been essential for enterprises. This study adopts a database-oriented approach and uses a server side program, Java Servlets, to manage a web-based inventory management system. The idea is to make information readily and easily available to people who are interested in the data. Once a company integrates the all-internal systems, it can further combine its up and down stream businesses. In conclusion, enterprises must converge enterprise resource planning (ERP), electronic supply chain management (E-SCM), and customer relationship management (CRM) systems to win competitive advantage. Usually, it may take couple of years to build an integrated ERP system and E-SCM system. Information technology provides a more efficient way to build the system.

Back to Top



A Visual Editor for Multimedia Application Development

Student Name: Angela Guercio
Graduation Date: August 2000

This report describes TAOEDIT, a Visual Editor to create and edit Teleaction Objects or TAOs, which are multimedia objects that can be composed together to develop a multimedia application. TAOEDIT is a powerful tool. It can be used to create TAO, convert TAO into TAOML (a markup language for TAOs), and generate XML description of TAO.
Back to Top


A Survey of Encryption Algorithms

Student Name: Julie A. Cronin
Graduation Date: December 1999

This paper introduces major topics of cryptography such as basic terminology and encryption methods. It then discusses the two types of encryption algorithms available, which are symmetric and public-key. These two types are compared based on how keys are distributed and implementation. Next, the only known algorithm that is considered perfectly secure, a one-time pad, is discussed and why it is rarely used in spite of its strong security. A chapter devoted to key management follows this. A separate section is devoted to key management, because even if an algorithm is considered tightly secure it becomes weak if the key used with the algorithm is improperly managed. The third chapter is devoted to the Data Encryption Standard(DES), because it is considered one of the strongest algorithms currently available to the public, and marks the beginning of widespread interest in cryptography. Finally, conclusions are made about which type of algorithms are strong and what implementations they are best suited for. A reiteration on the management of keys is included in this final section.
Back to Top


COMPUTER SIMULATION OF Queueing SYSTEMS: CSQS

Student Name: Tongyou Ji
Graduation Date: August 20,1999

Simulation generally involves some kind of model or simplified representation. During the course of a simulation, the model mimics important elements of what is being simulated. A simulation model may be a physical model, a mental conception, a mathematical model, a computer model, or some combination of all of these. Computer simulation is currently used in a wide range of applications, since physical models are often relatively expensive to build and unwieldy to move. Queuing systems are used to characterize a broad class of processes sharing a common mathematical structure but which may include many diverse physical realizations. All these processes are stochastic processes with three characteristics, which can be used to describe the system: an input process, a service mechanism, and a queue discipline. The presence of uncertainty is the thing which makes these systems challenging to analyze and design, since randomness in one or more of these three characteristics is the rule rather than the exception. Furthermore, the distributions used to describe these events may be nonstationary, which adds further complication to their study.
Back to Top


Network Security

Student Name: Eric L. Schmitt
Graduation Date: August 1999

Network Security begins with a brief look at how to design and implement effective security measures, which begins with a well-planned Security Policy. We open with an assessment of what equipment, data, and software the company has, what the company is trying to protect, what is at risk and what the threats are against those items at risk. This discussion includes who should be involved in the development of company policy and a brief look into possible policy items covering passwords, access, the Internet, firewalls, computer viruses, and encryption. We continue with an overview of backups, destruction of media, response to intrusions/policy violations/incidents, and a recovery plan. Next we provide a brief overview of some threats and a few possible solutions to those threats. Which includes viruses, Trojans, some email issues, denial of service, passwords, sniffers, spoofing, and the role of Telnet in attacks. We are given a brief look at Internet/World Wide Web languages and their security problems. This is followed by a similar discussion about operating systems/network software. The importance of logging and auditing is briefly covered, as are firewalls and the services they provide. Moving on we will look at using encryption for email, communications, and data storage. We will wrap things up with a brief look at some security software packages and training options.
Back to Top


Designing a Personal Information MANAGER with VB 6.0

Student Name: Seut-Ping Lim
Graduation Date: 1999

The purpose of this thesis is to design a Personal Information Manager (PIM) system which can assist people to organize their daily work more easily and simply. The system allows users to store information such as appointments, contacts, notes, tasks and so on. The system also has a holiday list, which allows users to add to or modify it. The system can provide reminders to the users prior to holidays or special occasions and enable them make preparation. Besides the system's obvious functionality, this project is designed to show the appropriate way to develop a graphics user interface. A properly designed user interface can standardize the input and output mechanisms, therefore allowing users to easily manage the entire system. The program was developed by using Visual Basic 6.0, which is simple to use and provides many tools and ActiveX controls to develop an effective application. It also has powerful performance and friendly user interface.
Back to Top


TSJ: A WEB-BASED TEACHING SYSTEM USING JAVA

Student Name: Chien-Ju Lee
Graduation Date: August 1999

The purpose of this thesis is to design a teaching system that helps children to learn elementary biology - such as insect species and their structure, life cycle, habitat, and so on - on the World Wide Web. Java, which was developed by Sun Microsystems, is a simple, robust, object-oriented, platform-independent, multithreaded, dynamic, general-purpose, architecture neutral programming environment. The crucial difference between a Java-based program and a traditional PC application is that Java programs are, by nature, network-aware and truly distributed. As creatures of the Internet, Java programs offer all the benefits of locally executed programs including responsiveness, and the capability to take advantage of local computing resources and even the global Internet. Based on these advantages, this project will be implemented using Java as the main tool. Other Internet Web programming languages, such as Hypertext Markup Language, Standard Common Gateway Interface, and JavaScript, are used as secondary tools. On the Internet, this project will provide a very interesting, creative and active environment through Java for children and their parents.
Back to Top


A Survey And Performance Comparison of Dynamic HTMLs

Student Name: Tzu-Sheng Su
Graduation Date: December 1, 1998

Netscape and Internet Explorer are the most widely used Internet browsers in the world. Last year Netscape and Microsoft Company created a new technology, called Dynamic HTML. Dynamic HTML is the world of point-and-click, drag-and-drop. With Dynamic HTML, one can layer multiple images on top of one another, precisely control the layout of a Web page, and add new interactivity and much more without using Java. This can be accomplished by using existing technologies and features on the Web, including HTML, scripting, and object-oriented programming. Some conflict exists between these two products. One browser's technique cannot work with the other. Netscape Communicator's plug-in cannot work on Internet Explorer, because Internet Explorer uses Active X. They are created in different ways; each one has a different effect. In this thesis, a comparison will be made by designing several programs to demonstrate the difference between these two browsers.
Back to Top


AN ONLINE-BANKING SYSTEM USING JAVA AND CORBA

Student Name: Sheng-Ta Liu
Graduation Date: November 1, 1998

The Common Object Request Broker Architecture (CORBA) is the Object Management Group's answer to the need for interoperability among the rapidly proliferating number of hardware and software products available today. Simply stated, CORBA allows applications to communicate with one another no matter where they are located or who has designed them. Object Management Group (OMG) introduced CORBA 1.1 in 1991. It defined the Interface Definition Language (IDL) and the Application Programming Interfaces (API) that enable client/server object interaction within a specific implementation of an Object Request Broker (ORB). The purpose of this project is to introduce the CORBA architecture, services, and IDL. I have built a system using Java based on CORBA to demonstrate its powerful client/server architecture.
Back to Top


An Implementation of Microsoft Transaction Server

Student Name: YUAN HUANG
Graduation Date: 1998

The project introduces the fundamental principles and programming concepts of Microsoft Transaction Server (MTS). The important new features that are included in Microsoft Transaction Server, how these new features benefit customers, and how to configure and set up the MTS server/client environment are demonstrated in this paper.
Back to Top


An Implementation of A Spatial Query Language for Multiple Data Sources

Student Name: Jie Xue
Graduation Date: 1998

To support the retrieval, fusion and discovery of visual/multimedia information, a spatial query language for multiple data sources is needed. In this paper we describe a spatial query language interpreter which is based upon the a-operator sequence and in practice expressible in an SQL-like syntax. The algorithm for the a-query translator is explored in detail. The implementation of the algorithm including data structures, pseudo-codes and source codes in C is presented. Query examples handled successfully by the a-query implementation are also given out.
Back to Top


The Implementation of a Web Database using the Approach of Java Database Connectivity: JDBC

Student Name: Ching-Ho Hung
Graduation Date: October 1998

Web database publishing is a new way to publish information electronically. A typical Web database publishing system has a Web browser as its user interface, a database server as its information store, and a Web server connecting the two. The basic idea of this project is to use JDBC to search databases directly from an Internet Web browser. The database is kept on an NT server. JDBC is used to interact with Web pages. This project uses a simple interface to help the administrator update the database on the Web server. Some security issues are discussed also. There are four purposes in this project: 1. To study a real time database system 2. To design a Web-Oriented user interface 3. To discuss Web security 4. To practice network communication
Back to Top


A Rule-Based System Verification Tool Using a Matrix Approach

Student Name: Chao-hua Lin
Graduation Date: August, 1998

This project proposes to use matrix formalism for the verification of rule-based systems. The matrix operation is one of the mathematical foundations of Petri Nets. This approach is different from directed hypergraphs and Predicate/Transition net (Pr/T net) in rule-based systems verification. The errors in rule-based systems fall into two parts. One is the syntactic error; the other one is the semantic error. This project will focus on semantic errors. Typical semantic errors in a rule-based system consist of four types. They are redundancy, inconsistency, circularity, and incompleteness. This project presents a tool implemented in JAVA to verify these semantic errors. The program consists of the following phases. First, the program will normalize the rules into Horn clauses and rearrange these normalized rules. Then, it will transform these rules into matrix form and the verify matrix to find semantic errors. This paper also describes how to build a diagnosis system and use a verification tool to verify the rule base. This diagnosis system will diagnose liver diseases using Chinese Traditional Medicine (CTM). In this paper, chapter one outlines the general concepts of expert systems. Chapter two describes the knowledge base verification. Chapter three discusses more details about semantic errors. The different approaches to verify rule-based systems are described in chapter four. Chapter five describes the matrix approach for rule-based systems. Illustrations are shown in Chapter six. Finally, Chapter seven gives the conclusion.
Back to Top


A Client/server Networking Application using JAVA: JWBCB

Student Name: Yu-Lung Lu
Graduation Date: 1998

Java is an object-oriented programming language developed by Sun Microsystems. A useful feature of Java is that its programs can be executed on World Wide Web pages. Java programs enable Web pages t i become more interactive with users. The Java language consists of classes and methods that provide basic variable types, system input and output capabilities, and other functions. It also includes classes to support networking, Internet protocols, and graphical user interface functions. Java's networking capabilities are contained in the java.net package. Stream sockets and datagram sockets are provided by Java. With stream sockets a process creates a connection to another process. When the connection is established, data flows between the processes in the stream. JWBCB (Java Whiteboard and ChatBoard) is the network application, using the client/server model, developed for this thesis. Its implementation deepened the author's understanding of basic Java networking capabilities and client/server networking concepts.
Back to Top


A TCP/IP NETWORK APPLICATION IMPLEMENTED WITH VISUAL BASIC

Student Name: JUN TIAN
Graduation Date: May, l998

This thesis concerns the design of a TCP/IP network application for playing the game of Go on the Internet. It is implemented in Visual Basic 5.0. TCP/IP and Window Socket is used in this project for data commutation on the network. TCP/IP is a dominant protocol for data communications on the Internet. Numerous application services have been developed for transport using the TCP/IP protocol suite. This project, playing Go on the network, introduces the basic concepts of TCP/IP, and demonstrates how to transfer data among processes in client/server models. A software component, A socket derived from Mabry Software, Inc., is used in this project. It is a windows custom control that provides easy access to TCP network services, and can be used in many development environments, such as Visual Basic, Visual C++, MS Access or Visual FoxPro.
Back to Top


DYNAMIC HTML IN INTERNET EXPLORER 4

Student Name: Chin-Chang Wu
Graduation Date: August 5, 1998

Welcome to the dawn of the point-and-click, drag-and-drop, interactive Web, Also to the new future technology - Dynamic HTML. What is Dynamic HT'ML? Dynamic HTML is a combination of technologies, including HTML HyperText Markup Language), scripting, and object-oriented programming combined to create individual Web pages. It is not a new version of HTML, it is not a new scripting language, and it is not a new way of structuring documents. It is a new way of tying all of those pieces together to make pages that cross the traditional static Web page boundary. But in technology, one can just say Dynamic HTML. relieves a Web server's load by shifting the processing demands for animation, data processing, and other interactive features to the client machine. Why Dynamic HTML? Dynamic HTML makes extensive use of new style sheet specifications to give a Web author more control over the exact placement and appearance of elements on the Web page. Therefore, Dynamic HTMI. seems to be the future Hyper Text Markup language for Web page authors. It is necessary to research the implementation of Dynamic HTML within Web pages and to explain how the ActivX controls work in Dynamic HTML.
Back to Top


A Network Application using VBWB

Student Name: Jenn-Iong Chang
Graduation Date: August 5, 1998

Data communications (computer communications) is commonly used in everyday life. What makes it possible? Largely the TCP/IP protocol. In this thesis, we study how TCP/IP works with a socket of an application program and how the Visual Basic socket custom control works with TCP/IP in a Microsoft Windows implementation. In this project, we use Visual Basic to implement a Network Whiteboard application. Whiteboard is an interactive, two-view environment, in which users can create programs by manipulating concrete pictorial data or examples of data structures, or by entering it into a text editor. The users can move back and forth between the visual and text Editors. By providing both a visual and a textual representation, it should be possible to determine those operations which a programmer views as intrinsically visual on one hand and textual on the other.
Back to Top


3D Simulation System with Dynamic Object Design

Student Name: Jin-Ghee Lu
Graduation Date: May 1998

The purpose of this project is to develop a general-purpose graphical simulation system. It provides users an environment to conduct simple 3D simulation. To experiment with a simulation model, users must create a simulation scene, construct or use existing objects, then put them into the scene to run. By adjusting the proper behaviors of the objects, the system can run under different scenarios and accomplish specific results. The three-dimensional graphics techniques in the system implements OpenGL library. OpenGL supplies a lot of graphics commands, which produce very impressive 3D objects. This project also provides a script language for users to design their simulation models. They can use simple object-definition statements to create objects with polygons, boxes and other elements, then incorporate them with certain behaviors for them to move or act. After loading a script file into the system, users can execute the scenario and watch the system perform an animated simulation. Users can also modify the behaviors of the objects until they serve the purpose of the model. Since the composition of an object is object-based, the architecture of the project should be object-oriented. This project is developed under Microsoft Visual C++ 4.0. It uses Visual C++ and Microsoft Foundation Class (MFC) to design the major application architecture and user interface, implements the object classes and functions using C++, and invokes OpenGL commands and C functions to display three-dimensional objects and perform animation and interaction.
Back to Top


A Loan Pricing Model

Student Name: Ling-Te Wang
Graduation Date: April, 1998

Abstract This project is intended to build a framework of a loan pricing model to determine loan interest rate for a commercial bank. The major task of this loan pricing model illustrates a conceptual guideline and methodology in order to process loan transaction more efficiently. The model of this project contains following major procedures: 1. Determining the cost of loan fund to be utilized in a loan transaction. 2. Developing a credit rating calculation and identify the rating category for corporate loan applicants. 3. Distributing the risk premium based on rating category. 4. Charging the overhead experience to reflect the cost of the loan. 5. Allocating the target profit of the loan transaction to achieve a desired return for the bank's management. Although some issues of this model may need further discussion, this model, however, provides a fundamental approach for a bank staff to process loan transactions.

 


A Survey of Distance Learning

Student Name: Vincenzo Devito
Graduation Date: May 1998

Abstract

Distance Education is defined as a planned teaching/learning experience that uses a wide spectrum of technologies to reach learners at a distance and it is designed to teach students who do not have easy access to a traditional classroom. With this kind of technology one can teach to a remote site such as a rural area or it can make corporate training more economical.

With the advent of the new technologies distance learning is a convenient rather than a necessary learning tool. The tools that can be used are: videotape recorders, computers, telephones, videoconferencing, faxes, etc. Schools using distant education include K-12, high schools, colleges and graduate schools. The different forms of distance education are: a. Synchronous -- where students get lessons in real-time, as it happens. b. Asynchronous -- where lessons are stored for later study. Asynchronous has the potential to be used 24 hours a day. There are several benefits to asynchronous education such as: a) Ability to see and replay class presentation on demand b) On-line record of all class presentations, readings, discussions c) On-line submissions, examinations and grade reporting Many schools are using distant education such as National-Louis University, Walden University and hundreds of others listed in Bear's Guide to Earning College degrees non- traditionally, and Thorson's Campus-Free College Degrees, listed in the bibliography.

In this thesis we will see how New York University, Knowledge Systems Institute and Wayne State University have used distance learning.

Back to Top


Thin Clients For The Internet: Network Computer vs. NetPC

Student Name: Miao-Wen Hsieh
Graduation Date: Spring 1998

Abstract

The rapid growth of the Internet has moved the focus of desktop computing toward network computing. Thin clients for the Internet, which include Network Computers and NetPCs, are vital in the new era of network computing. They can solve many of the problems in Client/Server computing and provide an expanded choice for desktop users. First will be outlined the general conception of Network Computers and NetPCs. Then will be indicated the differences between dumb terminals, and thin and fat clients. Next will be described the components of Network Computers and NetPCs, including software, hardware and a comparison. The relation of Java and Network Computers will be discussed in this project. Also the new technologies which are intended to improve Network Computers and NetPCs will be described. Push is a new technology that affects network transmission; therefore, push technology and the relation of push technologies, Network Computers, and NetPCs will be defined in this project. The markets for Network Computers and NetPCs will be reviewed and analyzed including current, potential, and future markets. Finally, the conclusions of this study will be presented.

Back to Top


The Implementation of Web-Databases by the Approach of Java Database Connectivity: JDBC

Student Name: Ching-Ho Hung
Graduation Date: Spring 1998

Abstract

Web database publishing is a new way to publish information electronically. A typical Web database publishing system has a Web browser as its user interface, a database server as its information store, and a Web server connecting the two. The basic idea of this project is to use JDBC to search databases directly from an Internet Web browser. The database is kept on a SUN Web server. JDBC is used to interact with Web pages. This project uses a simple interface to help the Some security issues are discussed also. There are four purposes of this project: 1.To study a real time database system 2.To design a Web-Oriented user interface 3.To discuss Web security 4.To practice network communication

Back to Top


Network Application Design Using TCP/IP Protocol in Windows

Student Name: Chun Wang
Graduation Date: Spring 1998

Abstract

One of the challenges in computer programming is internetworking with TCP/IP, not only because of its popularity, but also because of its complexity. This thesis attempts to explain the way the socket programming interface works on TCP/IP and the way the Visual Basic socket custom control works on TCP/IP within the 32-bit Windows environment. Finally the thesis presents an object, the Chinese Chess game. Implemented with Visual Basic and a socket custom control, the project works in the client/server model, on TCP/IP network protocol, under the 32-bit Windows environment. One may find that using a Visual Basic socket custom control to implement an application on TCP/IP is not very difficult.

Back to Top


Customer Service On The Internet

Student Name: Yueh-Fei Liao
Graduation Date: December 1997

Abstract

Nowadays much commerce is taking place on the Internet. This new tool will change what we do traditionally. In this technological era, old methods may not fit the new world. Handling customer service via Internet is an opportunity to succeed for some specific types of companies. In this project, I will discuss related topics about how to deal with customer service on the Internet successfully such as what a company needs to do, what their customers think about, and how technology can help. Not all companies can follow the same rules; different types of companies should use different aspects of Internet service. The result will depend upon how a company pays attention to things that happen around them.

Back to Top


Design And Implementation Of A Text-Base Object-Oriented Base

Student Name: Jiaping Fu
Graduation Date: August 1997

Abstract

The paper introduces the principles, methods, and strategies of Object-Oriented database design. Based on the carefully defined file object manipulating functions, the implementation of an OO Base is presented in detail.

Back to Top


Full Text Indexing Technology Applying To Web Pages

Student Name: Chun-Liang Tung
Graduation Date: December 1997

Abstract

The purpose of this thesis is to improve IBM's Storage And Information Retrieval System(STAIRS) and use the modified theory (Full Text Indexing Technology) to design a full-text-index search engine on the Internet. The design and implementation of the Full Text Indexing Technology (FTIT) can help people to efficiently search for useful information on the huge Internet.

The FTIT search engine consists of the spider, the database, and the search tool. The spider, which delves and retrieves the web content from the Internet, stores all of the valid tokens to a database of the FTIT search engine. The database, which is a kind of knowledge base database, collects a great deal of information about valid tokens such as the name of valid tokens, the attributes of valid tokens, and the addresses of home pages. The search tool, which is a search utility, looks for information in the database of the FTIT search engine and reports the result of the searching task to users via CGI.

In order to achieve the purpose of explaining the function of FTIT, the thesis will use Visual C++, standard Common Gateway Interface, Hypertext Markup Language, and Windows NT network to demonstrate.

Back to Top


Network Application Design Using TCP/IP Protocol In Windows

Student Name: Chun Wang
Graduation Date: August 1997

Abstract

One of the challenges in computer programming is internetworking with TCP/IP, not only because of its popularity, but also because of its complexity.

This thesis attemps to explain the way the socket programming interface works with TCP/IP and the way the Visual Basic socket custom control works with TCP/IP within 32-bit Windows environment. Finally the thesis presents an application, the Chinese Chess game. Implemented with Visual Basic and a socket custom control, the application works in the client/server model, with TCP/IP network protocol, under the 32-bit Windows environment. Readers may find that using the Visual Basic socket custom control to implement an application using TCP/IP is not very difficult.

Back to Top


The Design Of A Library On-Line Search Application

Student Name: Anbin Huang
Graduation Date: December 1997

Abstract

This thesis concerns the design of a Library On-Line Search Application for Knowledge Systems Institute library books. It is based on the Internet Web programming. Three Web programming methods have been used to implement the book search through the Internet. They are HTML, CGI and Java.

HTML, which stands for HyperText Markup Language, keeps everything on the World Wide Web anchored to a common ground. It makes the Web dynamic. One of the powerful features of HTML is its this special HTML feature, we catalog all the books in the library and connect them all in the Web page. This is the first test of the project.
Secondly we use a special mechanism that supports the dynamic creation of HTML documents. This mechanism is based on the invocation of external applications, usually referred to as CGI scripts, that run under the auspices of a WWW server, and that are called by the client browser in the form of an ordinary- looking URL from the Web document currently in use. CGI, which stands for Common Gateway Interface, supplies the middleware between WWW servers and external databases and information sources. We use CGI applications to perform the book search processing and formatting tasks on behalf of their WWW servers.

Thirdly we use Java, one of the most popular Web programming languages, to implement the on-line book search.

Back to Top