Front Pages - Phase 1
-
Upload
raghavendra-gowda -
Category
Documents
-
view
3 -
download
1
description
Transcript of Front Pages - Phase 1
FUZZY BASED APPROACH FOR DETECTING SELFISH NODES & TRUST LEVELS IN MANET
PAGE
TITLE OF THE PROJECT
A Project Report
Submitted in partial fulfilment for the award of the degree ofMaster of Sciencein
Information Technology by
(REG NO)Under the guidance of
Dr./Prof.
VIT University
School of Information Technology and EngineeringMonth, 2015
School of Information Technology and Engineering
DECLARATION BY THE CANDIDATE
I hereby declare that the thesis entitled submitted by me to Vellore Institute of Technology University Vellore, in partial fulfillment of the requirement for the award of the degree of Master of Science in Information Technology is a record of bonafide project work carried out by me under the supervision of . I further declare that the work reported in this project has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.
Place:
Date:
Signature of the Candidate
School of Information Technology and Engineering
BONAFIDE CERTIFICATE
This is to certify that the project work entitled by (REGNO), to Vellore Institute of Technology University, Vellore, in partial fulfillment of the requirement for the award of the degree of Master of Science in Information Technology, is a project bonafide work carried out by him/her under my supervision. The project fulfills the requirement as per the regulations of this Institute and in my opinion meets the necessary standards for submission. The contents of this report have not been submitted and will not be submitted either in part or in full, for the award of any other degree or diploma in this Institute or any other Institute or University. Prof/Dr.
Internal Supervisor
VIT University
Internal Examiner(s)
External Examiner(s)
TABLE OF CONTENTSCHAPTER NO.TITLEPAGE NO.
ABSTRACTvi
LIST OF TABLES
LIST OF FIGURES
LIST OF SYMBOLS
1.INTRODUCTION1
1.1 Motivation
1.2 Issues
1.3 Organization of the report
2.Literature Survey
2.1
2.1.1
2.2
2.3
3DETAILED DESIGN OF THE PROJECT
3.1
3.4 Requirements Specification
3.4.1 Software Requirements
3.4.2 Hardware Requirements
4IMPLEMENTATION OF SYSTEM
4.3
REFERENCES
ABSTRACT
(THIS CAN BE MORE THAN ONE PARAGRAGH-max 2)
(where you have implemented>NOTE: ABSTRACT SHOULD NOT EXCEED MORE THAN ONE PAGELIST OF TABLESTable NoTitlePage No
TABLE-1tblUserLogin43
TABLE-2tblRoadBills43
TABLE-3tblShippingBill44
TABLE-4tblSuppliers44
TABLE-5tblPayment45
TABLE-6TblOrder45
TABLE-7tblInvoiceDetails46
TABLE-8tblProducts46
TABLE-9tblPersonalDetails47
TABLE-10tblCurrency47
TABLE-11tblAddressDetails47
TABLE-12tbl_Status48
TABLE-13tblAdminLogin48
TABLE-14tbl_Country48
TABLE-15TblBillDetails49
TABLE-16receiptdetails49
TABLE-17tablelinks50
TABLE-18tbl_CityDetails51
TABLE-19tbl_State51
List of Figures
Figure NoTitlePage No
FIG-1IIS 6.0 PROCESS MODEL15
FIG-23 Tier Applications23
FIG-3SDLC Model28
FIG-4Context Level Diagram32
FIG-5First Level DFD32
FIG-6Second Level DFD33
FIG-7Third Level DFD33
FIG-8Use Case for Admin34
FIG-9Use Case for Customer35
FIG-10Use Case for Supplier36
FIG-11Sequence Diagram for Admin37
FIG-12Sequence Diagram for Customer38
FIG-13Sequence Diagram for Supplier39
FIG-14Creating of Customer Invoices40
FIG-15Registration of Customers / Suppliers / Products41
FIG-16Tracking Invoices42
LIST OF Abbreviations
ACRONYMEXPANSION
DSRDynamic Source Routing
FSRFisheye State Routing Protocol
IDTIndirect Trust
IDTREQIndirect Trust Request
IDTREPIndirect Trust Reply
TTLTime To Live
PAGE vii