Final Year Project Report Manual - Prepration - B - Tech
Final Year Project Report Manual - Prepration - B - Tech
on
Name of Project
BACHELOR OF TECHNOLOGY
Degree
In
Computer Science & Engineering
By
STUDENTS
Names ( Univ. Roll Nos.)
APRIL 2020
I.T.S. Engineering College, Gr. Noida
GUIDELINES FOR B. TECH. PROJECT
These guidelines for successful completion of B.Tech. projects are to facilitate departments in effective
and uniform regulation of projects being carried out by undergraduate students in 8 th semester.
A Project Report
on
Name of Project
BACHELOR OF TECHNOLOGY
Degree
In
Computer Science & Engineering
By
STUDENTS
Names( Univ. Roll Nos.)
APRIL 2020
The students should submit a CD with each copy of Project . The CD should be in cover and
paste on the last page of project Report.
The CD contains the Running code +Presentation +Project Report
The sequence in which the project report should be arranged and bound is as follows
Sequence of Report:
The text should be typed in 12 font size Times New Roman style in 1.5 spacing on one side of
A4 size page (Executive Bond) only. The Captions for figures should be typed at the its bottom
for example 4th figure in Chapter 3 should be captioned as Figure. 3.4 Title of Figure. The
captions for tables should be typed at its top for example 7 th table in Chapter 3 should be
captioned as Table. 3.7 Title of Table.
The numbering of Chapters, division and sub-divisions should be done using Arabic numerals
only and further decimal notation should be used for numbering the divisions and subdivisions
within a chapter. For examples sub-division 4 under division 3 belonging to chapter 2 should be
numbered as 2.3.4.
Equations appearing in each Chapter should be numbered serially, the numbering commencing
fresh for each Chapter or Appendix. For example, an equation appearing in Chapter 2, if it
happens to be the eighth equation in that Chapter 2 should be numbered (2.8). While referring
this equation in the body of the project it should be referred to as Equation (2.8).
Any work of other researchers, if used either directly or indirectly, the origin of the material thus
referred to at appropriate places in the report should be indicated. The citation may assume any
of the standard form (preferably ASCE, ASCE, IEEE, or other international Journal Publishers
such as Elsevier, Kluwer, Pergamon etc.). For more details the students may contact their
respective guides.
Books
[4] R. Hayes, G. Pisano, and S. Wheelwright, Operations, Strategy, and Technical Knowledge.
Hoboken, NJ: Wiley, 2007
The dimensions of the final bound 2 copies report should be Standard A4 size (297mm x
210mm) paper may be used for preparing the copies. The Project (at the time of submission)
should have the following page margins: Top and Bottom edge : 25 mm (1 inches) Left and
right side : 30 mm (1.25 inches)
Page Type : The project report should print on 85 GSM white bond paper.
Page Numbering
All pages numbers should be typed at the center of page bottom. The preliminary pages of the
Project (such as Title page, Acknowledgement, Table of Contents, List of tables and figures,
Notations, Abbreviations etc.) should be numbered in lower case Roman numerals.
Size of Project
The size of Project should not exceed 150 Pages of typed matter reckoned from the First page of
Chapter 1 to the last page of the Appendix.
Binding Specifications:
Project submitted (2copies) should be bound in Black Color (Matt finish) hard rexin binding
with golden engraved letters. The side/face of thickness of Project should have the name of the
project, and month of submission .
Plagiarism Checker Tool
For this session the students can use free online plagiarism tool and the report will generate .
Attach that report with the final Project Report
www. Duplichecker.com
www. plagiarismdefector.net
Two hard Copies of Project Report (one for departmental library and one for Project Guide) are
to be submitted before 14th July 2020 to the Project Coordinator.
Project Coordinator
Mr. Devesh Garg
Before the Final Print Please Check and verify from your guide.
CERTIFICATE
Certified that Name of students, Name of students has carried out the
Project work presented in this project entitled “Title of Project” for the
award of Bachelor of Technology from Dr. A.P.J. Abdul Kalam
Technical University, Uttar Pradesh, Lucknow under my supervision.
The Project embodies result of original work and studies carried out by
Student himself and the contents of the Project do not form the basis for
the award of any other degree to the candidate or to anybody else.
Name of Supervisor
Assistant Professor
Department of CSE
Date:
It gives us a great sense of pleasure to present the Report of the Project “ Name of
Project” undertaken during B.Tech final Year. First and foremost We wish to
thank our Guide Prof. Name of Guide , Department of Computer Science and
blessings to us . He/She allowed us the freedom to explore, while at the same time
provided us with invaluable sight without which this Project would not have been
possible.
We also do not like to miss the opportunity to acknowledge the contribution of all
faculty members of the Department for their kind assistance and cooperation
…………………………………………………………………………………..………
……………………………….………………………………………...………………..
2.
Project Preparation Guide was referred for preparing the Report YES NO
3. The contents of the Project Report have been organized based on
the guidelines. YES NO
4.
The Report has been prepared without resorting to plagiarism. YES NO
5. All sources used have been cited appropriately in Project Report YES NO
6. Submitted Two Hard bound copies along with one CD. YES NO
CERTIFICATE ii
ACKNOWLEDGEMENT iii
ABSTRACT iv
LIST OF TABLES ix
LIST OF FIGURES x
LIST OF SYMBOLS, ABBREVIATIONS xii
1. 1. INTRODUCTION 1
INTRODUCTION
Since the rise of the Internet, one of the most important factors of information
technology and communication has been the security of information. Cryptography was created
as a technique for securing the secrecy of communication and many different methods have been
developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is
sometimes not enough to keep the contents of a message secret, it may also be necessary to keep
the existence of the message secret. The technique used to implement this, is called
Steganography.
Steganography is the art and science of invisible communication. This is
accomplished through hiding information in other information, thus hiding the existence of the
communicated information. The word steganography is derived from the Greek words “stegos”
meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. In image
steganography the information is hidden exclusively in images. The idea and practice of hiding
information has a long history. In Histories the Greek historian Herodotus writes of a nobleman,
Histaeus, who needed to communicate with his son-in-law in Greece.
well-known channels greatly reduces the risk of information being leaked in transit. Hiding
information in a photograph of the company picnic is less suspicious than communicating an
encrypted file.