Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Project proposal Module
1. Page No. 1
College Of Computer Technology
Affiliated to CTEVT
Butwal-13,Devinagar, Rupandehi
Nepal
PROJECT PROPOSAL
ON
“Sylabus Viewer”
SUBMITTED BY:
Diploma in Computer Engineering
Fifth Semester, 2015
SUBMITTED TO:
DEPARTMENT OF COMPUTER ENGINEERING
COLLEGE OF COMPUTER TECHNOLOGY
Butwal-13, RUPANDEHI
NEPAL
2. Page No. 2
March-10, 2015
Certificate of Approval
College of Computer Technology
Affiliated to CTEVT
Butwal-13, Devinagar, Rupandehi
Nepal
PROJECT PROPOSAL
ON
“Sylabus Viewer”
………………………………………………...
Er. Birjesh Chaudary
HOD of computer Department
College of Computer Technology
Bhalwari, Rupandehi
Nepal
………………………………………………...
Mr. Devi Bhandari
Principal
College of Computer Technology
Bhalwari, Rupandehi
Nepal
3. Page No. 3
Acknowledgement
We would like to express our heartfelt thanks to the principal Mr. Devi Bhandari
and Head of Department, Er. Birjesh Chaudary for allowing us to undergo this project.
We are greatly indebted to Er. Sovit Thapa for providing us with valuable guidance and
support.
Moreover, the project team is thankful to the library management for availing us
with the valuable resources which were the most for undertaking our project work.
Last, but not the least we are thankful to our friends for their direct and indirect help,
co-operation and encouragement.
Project Team Members:
1. Krishna Bashyal
2. Anybody
3. Anybody
4. Anybody
5. Anybody
6. Anybody
5. Page No. 5
Introduction
Background:
The worldwide acceptance of IT and software technologies for the overall
development of country has been realized for some years now in Nepal. The
government’s initiated for moving ahead in the field hand-in-hand with the private
sector and lunching some large scale project such as establishment of IT parks and
training youth throughout the country to prepare mid-level IT manpower are some
good indication. The booming of academic and technical institution, IT companies and
engineering consultancies throughout the kingdom is an indicative that Nepal now has
been prepared to enter the global market and that it has sufficient skilled manpower to
meet the demands for the national & international area.
Computer is the essence of human life and system will be reliable for
enhancement of cryptography also. This software will fulfill the necessity &
requirement of the owner who are curious to get more knowledge and information so
there is the need to protect the vast amount of data against intruders every day. Be it for
encrypting valuable data such as passwords and e-mails.
Objectives
General objectives:
1. For the partial fulfillment of the syllabus of Eighth semester Bachelor of
Computer Engineering.
2. To implement the project relevant skills gained in previous semesters of
Bachelor of Computer Engineering.
Specific objectives:
1. To encrypt the valuable data such as password so that other cannot understand
and misuse it.
2. To secure the communication by using encrypted emails.
3. To carry out any kind of sensitive transaction, like the discussion of a company
secret between different departments in the organization.
4. Effective and efficient work operation with self-understandable environment.
5. Fulfill the requirement of data encryption and decryption.
6. Easy to handle the management.
6. Page No. 6
7. Ensure data security.
Abstract
The project entitled “Cryptography” is a full-fledged standalone application.
It is developed using visual C# as the front end and SQL/MS-Access as the background.
This project has tried to incorporate all the advanced features of visual programming
such as to fulfill the aim of the project. The application has been designed such that it
encompasses the managerial as well as public functionalities. Among the managerial
functionalities are the task performed by the various offices. The public features are
exercised by the users and outsiders according to the permissions level availed to them.
“Cryptography” provides data encryption and decryption. Moreover, it helps for
securing communication.
For encryption and decryption of valuable data, it uses various algorithms such as
symmetric key algorithms (AES, RC4, and Triple DES) and public key algorithm (RSA).
Project Overview
The proposal provides a useful insight about the project carried out as a whole. It
provides details on the requirement specification, analysis, application modeling,
design, testing, and implementation, future scope and limitation of the application
developed.
Project Scope
The “Cryptography”, the end product of current project, is better suited to the users
who want to secure their data and communication. Providing security to the valuable
information is very important in many offices so, it can be used there. Providing secure
communication is also very important in today’s world because there need to transfer
many important data daily in various business transaction.
The “Cryptography” passes all the features that are needed for data encryption and
decryption. The main theme to generate this system is that ‘secure the communication
and information’.
7. Page No. 7
Tools and Software used
Tools/ Software to be used Description
1. SQL High level database management tools
2. C# High level visual programming language
3. Visual Studio 2010 An IDE provided by Microsoft Inc.
4. Windows XP/7 Operating system (Microsoft Corporation)
5. Microsoft Word Word processor from Microsoft Corporation
Requirements
1. Computer Set
2. Windows Operating System (Windows 7 Recommended)
3. PDF Reader
4. Reference books
5. Internet connection
6. .NET Framework v3.5