0% found this document useful (0 votes)
66 views27 pages

Global Soft Solutions

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. Through our results, we study the problem of selecting an optimal route in terms of path availability.

Uploaded by

Raja Gana
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views27 pages

Global Soft Solutions

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. Through our results, we study the problem of selecting an optimal route in terms of path availability.

Uploaded by

Raja Gana
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 27

Global Soft Solutions

No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Route Stability in MANETs under the Random Direction Mobility Model Dotnet

A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive Routing protocols.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ INTEGRATED DATA MIGRATION Dotnet Abstract: Integrated data migration is a semi enterprise application which provides data transfer between two applications along with data format conversion, platform independence.

Server Operations
Displays the menu Creates the new Instance of a server when requested User Authentication is done in server User Management is a main Operation of server Accepts the User information and connects to the database and checks for a valid user If valid user Client gui will be displayed for further actions If not, an error message will be displayed Receives the user details and registers the user as an valid user Option is provided to edit user details after registration Administrator can view the user details If required, administrator can also delete the user

Connection Establishment through JDBC Ms-Access connection-Provides access to MS-Access Database

Mysql connection-Provides access to MySQL Oracle connection -Provides access to Oracle Client Operations Displays the client Main Menu If Select menu item is selected you are provided with two panels You can enter the database name and save the data in the text file if you have chosen Text File panel You can choose Database File panel if you need to convert from one data format to another (for ex oracle to mysql) If Database File panel is chosen we enter the database name, the available table will be displayed You can choose any table that needed to be converted Once you choose the table, the content of the table will be displayed along with options to convert the table to required format

Client [Middle Format Data Conversion] Once the table is selected the data in the table are copied in to text file and the fields are separated using the delimiter % You can choose any type of conversion According to the option the details of conversion and required format should be provided

Advantages
Enables the data in one database format [MYSQL, Oracle ,MS-Access] to be transferred to another database [MYSQL, Oracle, MS-Access]

Enables the data to be transferred across two different platforms Avoids Manual Insertion of Data into the Database

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ A Compressed Video Database Structured for Active Browsing and Search Dotnet Abstract: In this project, we describe a unique new paradigm for video database management known as ViBE (video indexing and browsing environment). ViBE is a browseable / searchable paradigm for organizing video data containing a large number of sequences. The system first segments video sequences into shots by using a new feature vector known as the Generalized Trace obtained from the DC-sequence of the compressed data. Each video shot is then represented by a hierarchical structure known as the shot tree. The shots are then classified into pseudo-semantic classes that describe the shot content. Finally, the results are presented to the user in an active browsing environment using a similarity pyramid data structure. The similarity pyramid allows the user to view the video database at various levels of detail. The user can also define semantic classes and reorganize the browsing environment based on relevance feedback. We describe how ViBE performs on a database of MPEG sequences.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ E-CITIZENSHIP CARD Dotnet This project entitled E-CITIZENSHIP CARD which is used to view the integrated details of the individual citizen. Basically each person have their own bank accounts, voter id , passport, driving license, pancard, mobile number, ration card details. And all their details are integrated and viewed with the photograph verification. This project deals with multiple criteria linking for viewing the individual citizen details and to generate the report. All the personal details of the individual citizen are maintained by the administrator. The modules in this project are: Administrator module Ration card module Passport module Voter id module Driving license module PAN card module Bank details module Mobile number module Report generation module.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Authenticated passport using Watermark technologies

Java 1. INTRODUCTION Steganography provides for the embedding of information in a block of host data in conditions where perceptible modification of the host data is intolerable. steganography techniques are highly dependent on the character of the host data. A technique for embedding information in image makes subtle changes in hue, while a method for embedding information in audio data could exploit the limitations of the human ear by encoding the encapsulated information in audible frequency ranges. Current implementations of textual steganography exploit tolerances in type setting by making minute changes in line placement in order to encapsulate hidden information, making them vulnerable to simple retype setting attacks. Manipulating digital media in an effort to disable or remove the embedded messages is a simpler task than detecting the messages. Any image can be manipulated with the intent of destroying some hidden information whether an embedded message exists or not. Detecting the existence of a hidden message will save time in the activity to disable or remove messages by guiding the analyst to process only the media that contain hidden information Because the most successful hiding method is the uncommon one, but it is unthinkable one and needs a knowledge and experience to be discovered. Every few years, computer security has to re-invert itself. New technologies and new applications bring new

threats, and force us to invent new protection mechanisms. Cryptography has become important when business started to build networked computer system; Virus epidemics started once large numbers of Personal Computer (PC) users were swapping programs; and when the Internet took off, the firewall industry was one of the first to benefit. One of the newest hot spots in security application is information hiding. It is driven by two of the biggest policy issues of the information age-copyright protection (watermark) and state surveillance (steganography). In the proposed system have implemented the scheme of watermark as a method of authentication.

System study and analysis


Existing System In the existing systems the biometrics used to provide the security for the passport That is used to identify the features or attributes of human beings. For security application the most viable solutions appear to be iris and fingerprint recognition with respect to recognition accuracy, particularly for automated user authentication in scenarios with little or no manual observation. Both methods have a level of inconvenience, but this may be manageable. Forgeries can be prevented by future technology by supplying sufficient liveness detection tools. On the other hand, face recognition techniques can be used as decision support tools for manual authentication scenarios, like observed border control. While the error rates that are achieved today are too high for automated user verification, the determination of some similarity score may proof as being helpful to optimize authentication processes in some applications. Signature Verification may be useful in applications where users can be considered as cooperative in the authentication process and user activity is required as a declaration of intention. In the application scenarios of ID cards, this does not seem to be necessary for the primary goal of verifying the identity of subjects, with or without their explicit consent.

Proposed system Techniques for embedding information as digital watermarks have been widely explored and a great variety of embedding and retrieval techniques have been presented for image as well as other digital media. However in context of ID documents, there are no problems with watermarking techniques. The embedding retrieval processes are solely depending on the key and algorithm chosen. Secondly, the data capacity is quite limited due to poor SNR ratios and, particularly in the case of ID documents, due to the rather small area available on the document. Nevertheless, first approaches to include biometric data in ID cards using watermarking have been published. Watermarks have been suggested to store references of handwritten signatures in the facial image although a media specific compression technique has been applied to the data, this approach clearly unveils the capacity limitations of reasonably robust watermarks and consequently, severe difficulties can be expected in practical applications. As most reference data sizes exceed several hundreds of bytes. However digital watermarks appear to be qualified to cryptographically bind visible representations to of the ID document to biometric data stored by other techniques.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Network Border Patrol Java


Project Prerequisations:The fundamental philosophy behind the Internet is expressed by the scalability argument: no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible.

Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets.

The Internets excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion-avoidance mechanism called network border patrol (NBP). NBP entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network.

Global Soft Solutions

No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ AUTHENTICATED WEB MANAGEMENT SYSTEM Front End: ASP.NET


Web Server Based Information and Maintenances. Microsoft, IBM, Sun Solaris and consuming many

Back End : SQL SERVER


All new product line vendors like and

This Project AUTHENTICATED WEB MANAGEMENT SYSTEM deals with the

others will support for developing, deploying

Web services, consequently still Web services development would be a key

requirement for future programmers. Some of the information of our service can intelligently identify through the web are listed below.

Web Service can identify our consumer. It shows whether the consumer is an individual, a business entity or another Web Service. The physical location of the consumer

is traceable by the Web Service. The Service knows the security and privacy policies related to the consumer. Service level agreements that exist between the consumer and the service provider are open to the Web Services.URL names and Authorities are identified easily. It

highly maintains the relationship among the consumers and web services.

Today stay These

in

fast in

moving making to

world their talk to

of

E-Commerce, Companies available over

realize the to

to

competitive services also

products the partner

Internet. make the

need

applications

Business-To-Customer communication work. Services may also be provided to the customer to get closer to the organization. The inherent complexities of automating such services are the interoperability between platforms. Web Service is emerging as the most solution to this need. promising

Global Soft Solutions

No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ DIGITAL SECURITY MANAGEMENT SYSTEM Front End: ASP.NET Back End: SQL Server

Your companys website has been changed to a message and images that are extremely offensive to your customers. Or very private information from your personnel and financial records has been sent to all company employees. Or your main competitor now has all of your confidential marketing plans and proprietary company information. Any of these scenarios can occur from an insecure network system. The break-ins can be from outside or inside a competitor doing it for profit, a teenager doing it for fun. Any

break-in will be costly, whether you discover it or not. Some break-ins could spell the end of your company. Recently, with the growth technologies, millions of small to medium size companies and businesses are wide open to the ravages of the Internet. It is a very simple task for anyone to have full access to all the data contained in the hard drive. Digital Security specializes in securing your company computer network against any or all such disasters. The admin only register the employee details that are going to work in that particular concern. They will give member Id for the employee. Through that id he can retain his/her user name and password. So the admin know their user id and password. With out the permission of the admin the single employee cannot do anything. They will watch the workers status. If they are sending message to other worker and at what time he/she had sent, they will find all information. So there will not be any disaster of data from the company. Protection will be there for the data.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Enterprise Resource Planning Dotnet


This project Enterprise Resource Planning is a software system that uses, VB.Net programming for its implementation . This project centers on creation and maintenance of official records. This project will be helpful for the management to maintain the work status of their staffs. Staffs in various departments such as production, sales, service etc., should maintain their work entry of day-to-day status. So, the management can collect the daily, weekly, monthly and yearly reports of the staffs work status. This would be helpful for them to see their progress regularly. Staffs can also get the incomplete work, which has to be done on the specific day due to the reminder section facility. Thus this system is previous safety secure and easier to maintain as every person is given an id to login to his or her section .Intra mail facility and Email facility for higher authorities would be the features of this project.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Title Front End Back End : E-Stamping : Active Server Pages : Ms Access
This aim of our project is to develop a Web application for the E-Registration, by using Font-end as Active Server Pages (ASP), HTML and Back-end as MS Access. We can run our project in any type of Web Browser with the help of Personal Web Server (PWS) and Internet Information Server (IIS).

This project entitled E-STAMPING was developed for the end users to register there forms online in Chit Funds, Marriage, Land and Company. This project includes Static pages, Dynamic page and database. This project consists the following modules.

LOGIN PAGE ADMINISTRATION CHIT REGISTRATION MARRIAGE REGISTRATION LAND REGISTRATION COMPANY REGISTRATION USER SEARCH FOR CHIT REGISTRATION SEARCH FOR MARRIAGE REGISTRATION SEARCH FOR LAND REGISTRATION SEARCH FOR COMPANY REGISTRATION

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ FILE PROCESSING SYSTEM


This project entitled FILE PROCESSING SYSTEM was developed for the users to send a file. Actual concept involved in it, user has to register in the site and he can upload his file user Id. Not only upload he can send a file to receivers user id without file extension restriction.

Each of the modules is been developed for the end users in a user friendly way. So that user can upload a file easily

Highlights of this project

Allows any persons to view the site & able to register themselves When user forgot password he can retrieve his password. Upload files with out any restriction.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Bugs tracking system Dotnet


The Bugs tracking system is aimed to search bugs in the distinct project for their clients. The corporation has been doing the project for the clients. If the clients find any bug in their project then they will send that bug to the corporation. The corporation will search the bugs for their clients. Client will send the bugs to the corporation through the bug entry page. Corporation will search the bugs through some data. The bug id should be unique to avoid the collapse between the clients bugs. The corporation may get lot of bugs from their clients. Modules: Authentication Personalized home Bug entry Bug search

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Multi Lavel Marketing Login


This is to verify the information of the administrator with his user name and password for authentication. The administrator can view the member information and also maintain by the member accounts through this authentication module.

Member Registration
In this module the user will register their profile and also register their nominee details. Member Id should be unique and auto generated. Reference details include the person who introduced him into this multi level marketing criteria. These information are stored for the future use and the report preparation.

Account Maintenance
This module consists of the payment details from the members. Payment will be paid in stage wise and amount entered by the member with the date. These details are to be modifying, so there is an option to update the information and delete the information through this module.

Incentive Calculation
Master level person will have a tree like structure. ML will pay some amount to get a membership same way he can make 5 members to join in this group to get membership by paying Rs.500 like him. If that 5 member paid Rs.500 then the ML will get an incentive of 40% of the total amount and the company will get an incentive of 40% of the total amount, remaining 20% for using their networking maintenance fund.

Report
Reports are generated to view the member wise details, member wise account details, company account details and network maintenance fund details.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________

MOBILE NETWORKING ADMINISTRATION SYSTEM

This project Mobile Networking Administration System automates the operation of five Call Centers by taking the order for the cell phones and the particular customer is attached and finally the cell phone is dispatched to the customer. All the five call centers databases are updated by administrator. By adding more entries to the database, store the application can respond to more number of queries from the customers. The importance is given for delivery of the cell phones to the customers. It is divided into two modules: Client Based Module. Server Based Module.

Client based module deals with the relationship between the customers and call centers. In this models user can view the cell phone models and order products from any one of the call centers. For this Job user need not go to shop request for his facilities. Users do the same job in their place. If there is any query also user can send them to get a valid reply.

The Server based module deals with the call center details, cell phone, model details, customer details, cell phone description, talk plan details. The Server based module deals with the analysis of purchases with the call centers and give necessary service to the customers.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ ONLINE QUOTATION SYSTEM


This project entitled ONLINE QUOTATION SYSTEM was developed for the users those who are taking the job work on a tender basis. Actual concept involved in it, user has to quote a price for that particular work. Then project is been assigned to the person who is quoted least amount in that group. This entire process is been developed through online in ordered to reach many customers for different work in different company. This project consists of. Customer Information Quotation Information Tender Coded REPORTS Tender Code Wise Report Amount Code Wise Report Each of the modules is been developed for the end Customers to get entire information regarding Tender Information. Highlights of this project Allows any persons to view the site & able to register themselves Entire search process is been done by the users. So they can get what they need. Maintains the list by date wise for users convenient. So he can quote for that project according to market conditions. Once when the user visit the site he can really save time rather than going to place and giving sealed tenders in that particular office.

Global Soft Solutions

No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Portfolio Tracking System


The project is entitled as Portfolio Tracking System. This Project provides solution to the people who suffer by income tax and guide them towards a most appropriate investment. This is an important benefit overlooked by many individuals.

The main objective of the project is divided into two parts. The first is to develop a software module for the user. The second is to develop a suitable software for the administrator.

In the User side, the software consists of three modules. The first module deals with registration. In this module, a new user can register their name in this session. The second module deals with the company information. The information will be based on the relevant scheme of shares and mutual funds and as well as company details. The third module deals with stock review. The user can buy the shares and sell it. The investment rate will be compared with the current market rate and the calculations are done to display the corresponding profit and loss.

In the Admin side, the software consists of three modules. The first module deals with the company address and details of the company. The second module displays the users information and the third module deals with the company name and the current rate, and the rate will be given by the administrator.

This software is designed in such a way that future updates and enhancement can be made easily for multi-user.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ VEHICLE INFORMATION SYSTEM


The system "Vehicle Information System" is basically developed for company purchase the products and selling to the customers with specific requirements. It is divided into two modules:

Client Based Module Server Based Module

Client based module deals with the relationship between the Customers and sales of the vehicle. In this modules is can view the stock, purchasing the products, display the Sales Bills and servicing the vehicle.

The Server based module deals with the business in which the business can view the orders received from the customers, checks the stocks and dispatches the orders. The Server based module deals with the analysis of purchases and verification of service period.

At every stage of data entry necessary comments and valedictory messages

are provided to the user. The comments and valedictory messages provide a way to get away with the

redundant data. In this System is also expected to reduce the amount of paper work involved.

The hard copies of only necessary documents need to be taken the rest can be avoided.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ WEB RESPONSE SYSTEM


Web Response System deals with the Web Server Based Information and Maintenance of the Web Server. All New Product lines Vendors like Microsoft, IBM, Sun Solaris and many others will support for developing, deploying and consuming Web Services, consequently skill in Web Services development would be a key requirement for future programmers.

Some of the information that a Web Service can intelligently identify is listed below Web Service can identify the consumer whether the consumer is an individual, a business entity or another Web Service. The Physical location of the consumer is traceable by the Web Service. The Security and Privacy policies related to the consumer are known to a Web Service. Service level Agreements that exist between the consumer and the service provider are open to the web services. URL names and URL Authorities are identified and maintain the relationship between the consumers and Web Services. Today in fast moving world of E-Commerce, companies realize to stay competitive in making their products available over the Internet. These services also need to talk to the partner applications to make the business to business communication work. Services may also be provided to the customer to get the interactivity in the website and get the customer closer to the organization. The inherent complexities of automating such services are the

interoperability between platforms. Web Services is emerging as the most promising solution to this need.

Global Soft Solutions


No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]

________________________________________________________ Project Titles in ASP ASP TITLES


1. Vehicle Spare Parts Information & Maintenance System

2. Cellular Phone Service and Maintenance 3. Dispenser Management System 4. Online Deposit Management 5. International Trading Management 6. Online Income Tax Tariff System 7. E-Banking System 8. Online Book Mal 9. Cargo Management System 10. Insurance Payment 11. Online Pharmaceutical Maintenance 12. Textile Management System 13. Product Sales Analysis 14. Share Marketing 15. Financial Services 16. Computer Sales and Marketing 17. Super Market Maintenance 18. Online Electricity Bill Payment 19. Equal Monthly Installment Loan System 20. LPG Registration and Customer Maintenance 21. Online Mutual Funds 22. Online Poultry Farm Management System 23. Online Telephone Billing

24. Stock Maintenance System 25. Online Vegetable Shopping 26. Web Response System 27. Credit Card Banking 28. Petro Card Management System 29. Online Estimation System 30. Vehicle Information System 31. Corporation Information System 32. Web Based Order Processing 33. Online Aptitude Test 34. Endeavor Resource Improvement 35. E-Shopping 36. Educational Loan System 37. Telephone Index and Customer Services 38. Jewellery Management System 39. Bugs Tracking System 40.News Agency Information System 41. Photoroom for Net 42. Smart Card Banking 43. Tamilnadu Arts & Science Colleges Information System 44. Business - Business Organization System 45. Business Consumer Organization System 46. E-Caf 47. Blood Donors Encyclopedia 48. Funster Encyclopedia 49. Child Care Information System 50. Mobile Info Provider 51. E-Career Consulting 52. Personal Coordinator 53. Commercial Real Estate System 54. Matriculation Schools Information System (Search Engine)

55. Mail Processing System 56. Digital Security 57. Airways Information System 58. Fixed Deposit Bond System 59. Gift Services Management System 60. Global Agency System 61. Hr Planning System 62. Library Management System 63. Material Planning System 64. Mobile Networking & Administration System 65. Online Ticket Reservation 66. Resume Data Processing 67. Universal Travel Agency 68. University Information 69. Vertical Marketing 70. Marketing Analysis 71. Health Care Management System 72. E-Governance 73. Bank Education Loan System 74. Housing Loan Information System 75. Query Response 76. Lan Messenger 77. Signature Storage & Retrieval System 78. Tours and Travels Information System 79. Zap Card Information or Cluster Info Fling Card 80. Office Maintenance System 81. Safety Bond Information System 82. Accounting Financial Transaction 83. Customer Relation and Management System

You might also like