2007
Permanent URI for this collection
Browse
Browsing 2007 by Title
Now showing 1 - 18 of 18
Results Per Page
Sort Options
Item Accounting management system(UMT.Lahore, 2007) Zagfiman rsfiatf; muhammad ilyas; awaid munawarrncililatc the maintenance of the daily records such As inventory related mtomiation like Purchase, Sale, Purchase return , Sale Return and maintain their invoice and accounting related information like balance sheet, income statement, and the necessary information of the general ledger. It will also provide information about creating accounts of User and suppliers.Item Customer relationship management(UMT.Lahore, 2007) All Imran Ahmad; Amjad Subhani; Mehboob HussainBusiness means profit. So as more as we improve business process, our profit will increase. So being a student of computer science, we must focus on how we can improve the business process and make our customer more profitable. This keeping this fact in view, we decided to carry our final project on improving Business Process using CRM strategy. The term CRM (Customer Relationship Management) is a strategy used to learn more about customer's need and behaviors in order to make strong relationship with them. By using this strategy employees within the organization manage themselves according to that and improve our business services and make it more profitable. Companies need to know their customer preferences not only for the products but also for the services that companies provide. So the employees need to manage within the company to provide better services to the customer. Many companies in the world now days successful because of the better services and will managed relationship with the customers. Because employees in such organizations are well managed and their communication within the organization and with the customers is excellent. The methodology that make this possible is called CRM.Item Design and implementation Of wireless lan security system(UMT.Lahore, 2007) Nabeel Ahmed; Rashid HafeezWired technology has been replaced by wireless. We cannot stop this flow of change in technology. The need for securing wireless has also increased and this is a major issue of current era. Security is much much important because it saves: 1) Confidential data 2) Passwords 3) First mover advantage for the company 4) Army confidential messages 5) Confidential GOVT messages 6) Internet personal messages These are very important because, for example if someone steels someone’s serial number of ATM card which is its password then he can easily withdraw money with bad intentions. As far wired technology was concerned security was not a big problem because data use to flow through a guided medium. However where in wireless communication signals flows throughout the air. If someone within the range resonate the frequency of this signal then he can easily scan the sent message. This is prevented by using proper encryption techniques such as stream ciphers and block ciphers. WEP algo that is RC4 algo was also used but was not as beneficial as ciphers. The initialization vector (IV) is more advanced and beneficial. However attacks on them can occur to predict actual keys before the encryption. Such attacks may include statistical key derivation, inductive key derivation, Replay attacks and Bit-flipping attacks. These attacks can be overcome by dynamic key management. The most beneficial work don in this record is by the virtue of Cisco. Cisco provide as follows: 1) Message integrity check 2) Per packet keying 3) Broadcast key rotation In this regard the most beneficial standards used by Cisco is 802.11x which provides extensive authentication protocol. 802.11 support TKIP, per packet keying, broadcast key rotation and Cisco LEAP. Broadcast key rotation helps dynamic purposes TKIP provides a strong authentication method and LEAP is easier to deploy. LEAP also uses strong authentication passwords. However security can be enhanced in terms of its encryption through advanced encryption standards. It contains OCB and cipher block. There is also CCM included in it. These are all encryption techniques. Protected EAP is also included in AES it uses generic token card and EAP MD5 for passwords based authentication. However wireless field is like an enlit object which radiates in all directions and it is difficult which renders to a challenge of securing wireless LAN altogether. Never the less researches are being made to overcome this challenge but hackers are also advancing themselves day by day.Item Design and implementation of gsm jammer(UMT.Lahore, 2007) Nida Ui Irrum; Hina ZafarThe last lew years have witnessed a dramatic boom in the wireless communications industry, hence, increasing the number of users of mobile communication devices. This magnified the need for a more efficient and reliable signal scrambler, in order to fulfill this needs of the markets .lammers are introduced in every sector. Mobile .lammer have become a necessity for accomplishing a more cultured society because there is a growing demand for controlling the use of cellular phones in public places such as religious places, theaters, libraries, and others as well as for security purposes to demolish the possibility of any terrorist activity using this resource. A number of techniques and tools for Jammers designing have been proposed. We are learning & designing a Jammer within our knowledge & resources limitations. Our final project is based on the study and implementation of mobile Jammers. Further more we will focus on the GSM infrastructure, GSM leatures and different interfaces in the GSM technology. A Mobile Jammer can be delined as a transmitter used to broadcast electromagnetic signals capable of blocking frequencies used by gf IllJlar sygtems, When active in a certain area, the mobile Jammer will prevent any cellular system from communicating with the base station, and thus prohibiting all incoming and outgoing calls. Jamming devices were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. The bombs that blew up commuter trains in Spain in March 2004. as well as blasts in Bali in October 2002 and Jakarta in August 2003, all relied on cell phones to trigger explosives. It has been widely reported that a cell-phone Jammer thwarted an assassination attempt on Pakistani President Musharraf in December 2003. When President Bush visited London in November 2004, it was reported that British police considered using Jammers to protect the president's motorcade through London. During a hostage situation, police can control when and where a captor can make a phone call. Police can block phone calls during a drug raid so suspects can't communicate outside the area. Cell-phone Jammers can be used in areas where radio transmissions are dangerous, (areas with a potentially explosive atmosphere), such as chemical storage facilities or grain elevators. For e.xample, a 1 RJ-89 Jammer from Antenna System & Supplies Inc. carries its own electrical generator and can block cellular communications in a 5-mile (8-km) radius. Corporations use Jammers to stop corporate espionage by blocking voice transmissions and photo transmissions from camera phones. On the more questionable end of the legitimacy spectrum, there are rumors that hotel chains install Jammers to block guests' cell-phone usage and force them to use in-room phones at high rates.Item Design and Implementation Of Wireless LAN security system(UMT.Lahore, 2007) Nabeel Ahmed; Rashid HafeezWired technology has been replaced by wireless. We cannot stop this flow of change in technology. The need for securing wireless has also increased and this is a major issue of current era. Security is much much important because it saves: 1) Confidential data 2) Passwords 3) First mover advantage for the company 4) Army confidential messages 5) Confidential GOVT messages 6) Internet personal messages These are very important because, for example if someone steels someone's serial number of ATM card which is its password then he can easily withdraw money with bad intentions. As far wired technology was concerned security was not a big problem because data use to flow through a guided medium. However where in wireless communication signals flows throughout the air. If someone within the range resonate the frequency of this signal then he can easily scan the sent message. This is prevented by using proper encryption techniques such as stream ciphers and block ciphers. WEP algo that is RC4 algo was also used but was not as beneficial as ciphers. The initialization vector (IV) is more advanced and beneficial. However attacks on them can occur to predict actual keys before the encryption. Such attacks may include statistical key derivation, inductive key derivation. Replay attacks and Bit-flipping attacks. These attacks can be overcome by dynamic key management. The most beneficial work don in this record is by the virtue of Cisco. Cisco provide as follows: 1) Message integrity check 2) Per packet keying 3) Broadcast key rotation In this regard the most beneficial standards used by Cisco is 802.11 x which provides extensive authentication protocol. 802.11 support TKIP, per packet keying, broadcast key rotation and Cisco LEAP. Broadcast key rotation helps dynamic purposes TKIP provides a strong authentication method and LEAP is easier to deploy. LEAP also uses strong authentication passwords. However security can be enhanced in terms of its encryption through advanced encryption standards. It contains OCB and cipher block. There is also CCM included in it. These are all encryption techniques. Protected EAP is also included in AES it uses generic token card and EAP MD5 for passwords based authentication. However wireless field is like an enlit object which radiates in all directions and it is difficult w ic ren ers to a challenge of securing wireless LAN altogether. Never the less researches are being made to overcome this challenge but hackers are also advancing themselves ay y ay-Item End to end VoIP communication using Asterisk(UMT Lahore, 2007-06-30) Zaheer Ahmed; Muhammad Mustafa Aziz; Faheem Iqbal Bhatti; Areeba TasawarThis report aims to describe the complete process that was followed while developing an end-to-end telephone service using VoIP through Asterisk (an open-source PBX). Our project aims to create an internet telephony system that allows subscribers to make long-distance calls at rates equivalent to local rates. The subscribers are able to use traditional hard phones instead of soft phones (or computers) for communicating via our service. The system is similar to that of Net2Phone and other internet telephony service providers, except that we provide a hard phone interface to our users. This allows users to access all the facilities available through internet telephony without needing either a computer or an internet connection. Hence, our solution is not only cost-effective but also very user-friendly. We used Asterisk to act as the exchange for our main servers. Asterisk is an open-source private branch exchange (PBX) implemented in Linux. It has the facility to connect to the local telephone exchange or PSTN and other Asterisk exchanges. We implemented a menu-based service on our main servers that allows our subscribers to authenticate and dial the number they desire to connect with. Our server connects to another Asterisk server at a remote location through the internet. The remote server is also connected to its local exchange. This allows a user of one PSTN, for example Lahore, to connect to another remote PSTN, such as Karachi, through our servers. The voice traffic generated after the establishment of a connection is transmitted using voice over IP (VoIP). This document explains the requirements, analysis and design, implementation issues, and testing process of the project, and concludes with future work that can be done in this direction.Item Finance management system Of Millat equipment ltd(UMT.Lahore, 2007) Mazhar Iqbal; Asif MushtaqAbstract not availableItem Health information system(UMT, Lahore, 2007) Naveed ZakariyaHIS (Health Information Services) it is online Information portal, which will provide the assistance regarding Health oriented services. It will provide the Appointment facilities to the Patients who will be registered on this website. Its mean only registered Patients and Doctors can use the services of this web system. The system will be useful for the patients to share their medical records with their preferred physicians and get partial consultancy before the complete physical check-up, on the other hand the Doctors will feel convenient to use this system and save their precious time to allocate online suggestion and appointments.Item Long distance international (ldi)(UMT.Lahore, 2007) Ayesha Nawaz; Zubaria HussainAbstract not availableItem Online sales management system(UMT.Lahore, 2007) Mubashir Alam; Muhammad Ans Bilal; Sajjad RashidSales Management System (SMS) is online workshop registration system for Center for Management Development (CMD).This is fully computerized system for external and internal users for registering workshop and clients. This application will allow internal users to enter and manage client and workshop related information to the database, search the database, generate invoices, print reports, keep records of workshop and client bills. CMD users will be able to view and manage the workshop related information, clients current and previous status and bills for specific workshop listing on the database according to their preference using this system. This system will also provide a financial calcLilator for users to calculate workshop payment based on discount and taxes and paid their workshop fees via check and cash. SMS will also facilitate the automatic email generation, printing name tags and certificates. Administrator of SMS can manage users easily and allow rights for using this system accordingly.Item Quality of Service for VOIP(UMT.Lahore, 2007) M Zahid Aslam Mughal; Muhammad Saleem Butt; Sharif Arif; Yasir ShabhirSince Voice over Internet Protocol (VoIP) has emerged, there has been a need for a better quality for a voice call. If anyone among you has ever used "Net to Phone" service, will better understand the poor quality of a voice call. In this Project we have studied different Quality of Service (QoS) techmques in order to improve the VoIP on CISCO platform and made a critical analysis of major QoS techniques. We have also examined the quality of VoIP both with QoS and without QoS. On the basis of study and hand on experience we have made certain conclusions and recommendations for a better QoS. This Thesis has not only covered the theoretical concepts of different QoS techniques but also shows VoIP QoS configurations on Cisco network. We will also implement all this work in FP-2.Item Resourse Allocation in Multi-Service Wireless Access Network(UMT.Lahore, 2007) Fahd khaliqWireless Access Networks offer an alternative method for connecting subscribers to the global telecommunication networks. They will become widespread only if they can provide an attractive set of communication services at competitive prices and quality. Fundamental to achieving these goals is how the scarce radio frequency is managed. We evaluate a few alternative resource management principles and highlight some key design issues for such networks. The emphasis is on providing services that require certain minimum performance guarantees in order to be useful. High quality communication services and efficient resource management is only possible if the resource requirements of different services can be adequately described. We propose a framework for expressing wireless communication services in terms upon which radio resource management algorithms can operate. A price/priority component can be used to prioritize between different services. A comparison is made between fixed (PCA) and dynamic (DCA) channel allocation for multi-service TDMA networks. We show that if access networks should be capable of offering high peak-rate services, i.e., requiring more than a few percent of the available frequency spectrum, dynamic channel allocation techniques seem an imperative design component. Applications that can adapt to varying service levels enable higher resource utilization. The resulting admission control problem is formulated as a flexible knapsack problem. A few simple service-pricing models illustrate some tradeoffs involved in defining and pricing new services. Distributed quality-based power control has previously been shown to achieve substantial quality and capacity gains over a constant transmitter power scheme. We compare two classes of quality based power control, differentiated by the rate of the feedback information. A slow power control is preferable when the radio environment changes fast or coding and interleaving can be used to compensate for multi-path fading degradations. A fast scheme is preferred when communication links are established for only short periods, such as when providing busty data services, and for slowly moving terminals. A new technique is also developed to decrease the transmitter power dynamic range when using fast step-wise quality based power control. We demonstrate that with a suitable set of channel selection and channel access procedures, services for moderately busty data users can be provided without unduly degrading the quality of real-time services. This is possible without splitting of the available frequency resource between different user classes. A novel method is developed to "prepare" channels for rapid channel reassignments. Further, a traffic model for WWW and distributed file system access over wireless links is derived, based on an analysis ofItem Student Information System(UMT.Lahore, 2007) Muhammad ishfaq; Umer Farooq Khan; Umair HashmiThe "Student Information System" will maintain the whole Record of a Leadership Colleges Network, Current system is Manual system which is less efficient, time consuming and have a lot of problems in Security, Searching and tracking the Records. Now a new Computer based system which will be more efficient and secure. This new system will have different modules e.g. Admission, Account, Course Management, Examination Deptt. These modules will have information and record of different things. Page 2Item Study of design, implementation and analysis of WAN traffic management(UMT Lahore, 2007) Qadeer Ahmed; Salman Ali Muhammad; Muhammad Waqas HaiderIn this era of fast communication, organizations are growing more decentralized, and a greater amount of network traffic traverses the WAN to reach remote sites and users. We can say that the wide area network (WAN) works as IT glue throughout highly distributed organizations, as it enables intercommunication among corporate sites, e-business with partners, and e-commerce services. Basically, a wide area network is a computer network covering a broad geographical area. The most well-known example of a WAN is the Internet. With ever-increasing online business and network traffic, companies require help to overcome the weaknesses and inefficiencies of their Internet infrastructure. To overcome the weaknesses and inefficiencies of their Internet infrastructure, we have to manage WAN traffic. WAN traffic management refers to the process of monitoring user traffic on a network and redistributing or routing it when necessary in order to ensure optimal network performance. It allows network administrators to maximize available network resources. It gives them control over network resource allocation and ensures efficient use of resources that have not been explicitly allocated. The main objective of this project is to analyze and evaluate the network traffic using “Boson Network Simulator” with different scenarios of WAN, traffic sources, traffic conditions, and transmission environment dynamics. Different techniques are used to manage WAN traffic, like priority queues, bandwidth allocation, call admission control, traffic policing, congestion avoidance, and traffic shaping.Item Telecommunication Network based System(UMT.Lahore, 2007) Agha Mohd Alam; Bilal Bashir ButtThis project deals with extremely small Local Area Netwoiic (LAN) that operates through Free Space Optics (FSO) rather than traditional and fiber channels Beaming light through the air offers the speed of optics without the expense of fiber" - IEEE Spectrum August 2001Item Terrestrial Wireless Services for Location Management(UMT.Lahore, 2005) Omair Majid Bhullar; M. Waqas YasinThis report describes technical details about our microcontroller Architecture assembly languageItem To Determine the Effect of GDP and GWP on Performance Properties of Denim.(UMT.Lahore, 2007) Fatima JabeenAbstract not availableItem Transfer of Voice over Data Network Using IP Telephones(UMT.Lahore, 2007) Jibran Aslam Sheikh; Muhammad Sarmad ZahidThe purpose of our project is to travel the voice over the data network using IP Telephone technology. For this purpose we are using call processing server known as the Cisco Callmanager in which all the services are running which we need to accomplish our requirements. The Cisco Callmanager transfers voice packets across the data network. If a person wants to talk with another person whether within office, outside office or whether in a city or outside the city but should be in the same network. He is now able to make a call using his own network without any cost. With this project we are basically bypassing the PSTN network.