eMedicine, eShops and eRestaurants

Privacy-Preserving Utility Verification Of The Data Published By Non-Interactive Differentially Private Mechanisms

emedicine Prescription – Recommendation Mobile App

eShop Mobile Based Stock Management System

erestaurant Mobile App – Real-Time Process Management System By Sharing Food Order Information

Ediagnostic Lab Online Reporting Mobile App

Hybrid Cloud Approach For Secure Authorized Reduplication

Discovery Of Ranking Fraud For Mobile Apps

Online System Complaints & Bug Tracking System For MNC Companies

Expert Discovery And Interactions In Mixed Service-Oriented Systems

Efficient And Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography For Multi-Server Architectures

eShop Mobile Based Stock Management System

In the modern world, technology has flourished in a very tremendous way. Where ever we go we come across digital gadgets and everything has been atomized whether it is an institution or business sector or any commercial sector for that matter, anything and everything has become technicality oriented in this cyberspace world.

The project “SMART BUSINESS” is a small approach to automate the ledges of the retailers, distributors and stockiest and help them to overcome stress when comes to investment analysis and management of stocks, orders and maintaining products such as baby care, biscuits, body care, hair care etc…, eShop Mobile Based Stock Management System

This project deals about the marketing and requirement strategy of the clients. These marketing strategies differ from place to place, time to time and from product to product. This is an application which is been developed and customized based on the categories of clients. The categories of clients are i) Retailer   ii) Distributor    iii) Stockiest.

Using this application the retailer can maintain his/her profile. He/She can find all the distributors available for the product for which has registered. He/She can order the products from the nearest and available distributors based on the demands of the customers.

Similarly, using this application a distributor can maintain his/her profile and can find all the stockiest available for the products for which he/she has registered. He/She can order the products from the nearest and available stockiest based on the demands of the retailers. They can maintain the track of retailers existing in their location so that they can expand their business.

In the same way, Stockiest can maintain their own profile and can maintain the details about their products and even their clients and orders placed by them so that it could be delivered as soon as possible. They also record the information regarding the stock availability, reorder level and expiry of products.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

erestaurant Mobile App – Sharing Food Order Information

eRestaurant is a portal which allows admin in developing counters to advertise and sell their restaurant. This would permit rural communities to make their wares available to the rest of the world.

The objective of this project is to create a portal which would allow product information to be updated securely using a mobile device and will allow users to buy restaurant from the admin. The main concern is given to the village women’s to explore their talents and to enhance our traditional Indian culture.

In future the internet become whole and soul to the business fields, each and every trades are going to be done through it so this portal may helpful to the women as a business person in this running world. erestaurant Mobile App – Sharing Food Order Information

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Online Mobile Applications

Android Application To Access College Activities and Management Events, Placement, Student Info, Results

Veterinary Care for animal medical soultion based Mobile Application

Nexus Mobile App For Searching Contractor And Worker In City&s

EGG Production Management System Based Mobile App

Online Matrimonial

eAyurvedic Recommended Solution For All Disease Based Mobile Application

Net classified Based Mobile App

ehealth Care Management

Local Services Info Based Mobile App

icar : Mobile App For Car Pooling Using Bootstrap Responsive Design

EGG Production Management System

Poultry Farm Management System has been developed for giving various information of the poultry farm. This application is mainly for the maintenance and management of the poultry farm. It maintains the record systematically and enables us to give information in time. EGG Production Management System

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

eAyurvedic Recommended Solution For All Disease

It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. This system provides medical suggestions for patients on any time either by go Ayurveda treatment or by consultation through online. So we hereby make a web application for patients and from that they can easily undergo treatment. The user who needs for help at their home can consult online easily. It also saves the time of the user. From this the medical suggestions get more customers from online and they earn a lot. eAyurvedic Recommended Solution For All Disease

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Net classified Based Mobile App

My project is “NET CLASSIFIED”. Objective of this system is to providing a PC Grid. Solution focused on the workers of unorganized sector includes mason, carpenters, gardener, painter etc. PC Grid is a Web-based solution through which workers registered themselves for a specific skill. Using this system general public or organized sector user can select the workers as per their need. At the time of worker selection he/she can view the skill, references given by those who have taken their service in the past, area (worker location) and availability of a particular workers System sends SMS to a selected workers regarding work and customer details. workers confirms either through phone or this system and either fixed up meeting or work start date. Net classified Based Mobile App Organized sector user or general public can rate worker skill, charges, particularity about time, dedication, behavior, habits etc through this system. Users can put their demands regarding particular skill workers along with project location, and project details.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Managements Systems: University, Exam, Restaurant

Smart University Student Information Management System

Intelligent Agent Based Job Search System In Android Environment

Travel Management System Using GPS &
Geo Tagging On Android Platform

Faciliting Examination Process Via Exam Monitoring System

An Mobile App for Cloud-Based Smart Restaurant Management System in near-Field Communication

Exam And Hall Ticket Management Application System

iSearch Mobile App For Searching Lost Person

Operation Schudule For Hospital Management Based Mobile App

Online SMART BUSINESS – 1 Retailer 2) Distributor 3) Stockiest

e-Vaccination management System

Smart University-Student Information Management System

Abstract – SUSIMS is the most cutting-edge, innovative and robust solution for a university. In existing college datamanagement systems there are plenty of activities which are handled manually. All these activities are paper based which are expensive and time consuming. Various activities are handled by various departments. This leads to major problem in interlinking data and avoiding
duplicates. Hence this becomes very hard and prolonged process for students to access information from management. In the proposed system, a better solution is defined for all these activities which are paperless, cost effective and time saving.
In 21st century with the latest technology the world is moving towards cloud computing. SUSIMS is full-fledged cloud computing based information management system. It covers every minute aspects of a universities work flow and integrates all processes into smartphones with user friendly interface. Smart University-Student Information Management System It includes all major modules like Attendance module, Placement module, Alumni Association module and many more. All modules interrelated and data redundancy is eliminated.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Faciliting Examination Process Via Exam Monitoring System

This paper presents an Android application aimed to ease the task of Chief Invigilators and fellow invigilators during an examination conduct in a university environment. The Chief Invigilator delegates tasks to fellow invigilators at the examination venue before the start of the examination including collecting attendance slips and monitoring for candidates’ misconducts. After the examination ends, the invigilators need to ensure all answer scripts are submitted by the attendees of the examination. The Anrid application provides functionalities to facilitate task delegation among invigilators and improve efficiency of post examination tasks such as ensuring correct number of answer scripts are collected based on the right number of candidates. Faciliting Examination Process Via Exam Monitoring System

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

e Restaurant – Online Shopping For Food

e Restaurant is a portal which allows admin in developing counters to advertise and sell their restaurant. This would permit rural communities to make their wares available to the rest of the world.

The objective of this project is to create a portal which would allow product information to be updated securely using a mobile device and will allow users to buy restaurant from the admin. The main concern is given to the village women’s to explore their talents and to enhance our traditional Indian culture. e Restaurant – Online Shopping For Food

In future the internet become whole and soul to the business fields, each and every trades are going to be done through it so this portal may helpful to the women as a business person in this running world.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

PHP Vulnerability Detection Based on Taint Analysis

INTRODUCTION PHP language is widely used on the Web services, But it has the inherent vulnerability, so it is easy to produce a variety of vulnerabilities in the programming process, which is more common with SQL injection vulnerabilities and XSS (Cross Site Scripting) vulnerabilities. According to OWASP (Open Web Application Security) [1] 2017 latest data, in the top ten Web application security vulnerabilities, the first category is injection attacks, and Cross Site Scripting attack ranked third. The contributing factor of these two vulnerabilities is mainly that the validity of the user input data can not be reasonably verified, so this type of vulnerabilities is called tainted vulnerabilities. Currently there are several industry PHP static analysis tools such as: Pixy, RIPS, PHP-Sat, WAP and Fortify SCA and so on. Pixy [2] is an open source PHP static detection tool developed by Java. It is very effective in detecting vulnerabilities through data flow analysis. But Pixy only supports PHP4 syntax, which does not support for PHP5 and later syntax features. The Pixy is mainly aimed at XSS vulnerabilities, and in contrast is not ideal for other vulnerabilities. RIPS [3] is a PHP development tool for the detection of PHP. It is a static analysis tool based on the token flow. It uses PHP’s built-in token_get_all () to parse the PHP code to get the token, and then converts the code into an intermediate format for easy analysis, It adopts the taint analysis method to detect vulnerabilities. WAP(Web Application Protection) [4] is a PHP vulnerability detection tool which is developed by Java. This tool analyzes the source code by taint analysis. The advantage is that you can automatically repair the identified vulnerabilities. In addition, there are a lot of people also designed the relevant PHP static analysis tools. Balzarotti [5] is combined with string analysis method, based on Pixy tool to achieve a combination of static and dynamic PHP code analysis method. Rimsa [6] Used e-SSA as an intermediate representation to perform a taint analysis of PHP. Y.Zheng and X.Zhang [7] proposed path and context-related inter-process analysis methods to detect vulnerabilities. But there are still many problems with the above tools, for instance the intermediate representation is not complete resulting in the loss of a lot of important information; Some tools can not be fully compatible new version of the PHP syntax features; And the false negatives and false positives are relatively high. In this paper, based on the experience of predecessors, we use the PHP-Parser which can be compatible with the latest and more widely used PHP5 and PHP7 to conduct lexical and grammatical analysis for PHP. The PHP-Parser can produce AST (Abstract Syntax Tree) with very complete information. Then building the CFG(Control Flow Graph). At last we perform the fine-grained taint propagate analysis and detect the possible vulnerabilities. The experimental results show that we can really find a number of vulnerabilities by this method.

LEXICAL AND GRAMMATICAL ANALYSIS For taint analysis, the PHP source code must be transformed into an intermediate representation which is conducive to taint analysis. In this paper, we use the CFG as the intermediate representation. But the generation of CFG depends on the AST. The AST reflects the program structure, so we need to conduct lexical and grammatical analysis for PHP source code at first. There are several ways to generate the AST. Some use HHVM [8], a PHP virtual machine used to implement the PHP language to generate AST; some based on ANTLR [9], a grammar parser that automatically generates a AST based on input. In this paper, we use the PHP-Parser [10] to conduct lexical and grammatical analysis for PHP. PHP-Parser is mainly used to generate AST, It is a great help for the PHP static analysis. PHP syntax is large, probably contains 140 different nodes. In order to facilitate the analysis, they are divided into three categories: (1) Statement nodes, which do not return a value and can not occur in an expression. For example, a class definition is a statement. (2) Expression nodes, which return a value and thus can occur in other expressions, e.g. $var and func(). (3) Scalar nodes, like ‘string’ or magic constants like __FILE__. (4) There are some nodes not in either of these groups, such as names and call arguments.

THE CFG GENERATION ALGORITHM When we get the PHP source code, first of all, the source code will be converted to AST by PHP-Parser. If we perform data flow analysis on the AST, the AST and data flow analysis can not be fully compatible because the programming language will have branches, loops, jumps and conditional expressions and other structures, which implied discontinuous control flow. Therefore, we transform the AST into a CFG, and then perform a data flow analysis. The specific process is as follows: (1) Getting the array of AST which is generated by PHPParser. If it has only one statement which is a class definition, we extract the inner class function, pass it to the CFG constructor construct_cfg () and construct CFG of the PHP Function. Then constructing the CFG of the main program of the file. (2) Constructing a series of CFG node which is included in the AST, containing the assignment expression, unset, global, break, return, even including function calls, method calls, etc. The above statement is relatively simple, directly call CFGNodeStmt () Method can be. But the conditional statement and loop statement processing is more complex, so they need to be dealt with alone. (3) We set up an empty input node as the current node. Then we traverse each of the statements which included in the AST array variable $stmts, and determine the type of the statement. For example, if the statement is the assignment statement, firstly we build a statement node. Then connecting the current node with the assignment node. The current node is the parent node, the assignment node is the child node. Next the assignment node as the current node and then handling the next node. (4) When all nodes are traversed, we construct an exit node and connect the exit node with the last previously processing node which as the parent node of the exit node. Finally return to the constructed CFG. The algorithm is used to convert AST to CFG which is used to conduct the data flow analysis. IV. TAINT ANALYSIS PROCESS Taint analysis is a practical method of data flow analysis. In the past few decades, data flow analysis has been an important research direction in the field of information security, and a lot of work has been done in developing data flow strategy. In this paper, we perform a flow-sensitive forward taint analysis on the generated CFG. To begin with getting the generated mainCFG and functionCFG, and then initialize the pre-defined taint source information. Afterwards, preforming fine-grained taint analysis on the mainCFG and functionCFG. Getting the node of the CFG to do the taint analysis until all the nodes are traversed. Finally, printing the tainted types and variables to determine the vulnerabilities. A. Identify the Taint Source The taint source represents the directly introduction of the untrustworthy data in system. Identifying the taint source is the precondition for the taint propagate analysis. This paper uses the heuristic strategy [11] to identify the taint source. That is, all the program external input data are considered as tainted data, which may contain malicious attacks. When the program’s sensitive function obtains the untrustworthy data which inputted by users, it may bring about tainted vulnerabilities. So we need to make a mode for the parameters of the user input and MySQL sensitive functions. The user’s direct input can be gotten by the super-global variables. The super global variables comprise ‘$ _GET’, ‘$ _ POST’, ‘$ _ COOKIE’ and so on. MySQL sensitive functions include ‘mysql_query’, ‘mysql_fetch_array’ etc. They are added as pre-defined taint source functions and respectively become into two categories. The first category contains superglobal variables, the second category contains SQL functions. And then setting two functions, separately, getting parameters propagated by CFG and then to determine whether these parameters exist in the two types of pre-defined taint source functions. If the parameters exist in the pre-defined taint source functions, they may contain tainted variables, marked as a taint source. And to determine which kind of taint function they belong to. The first category is marked as userTainted, the second category is marked as secretTainted. B. Perform Flow-sensitive Forward Taint Analysis on the CFG After we have defined the taint source, we will perform the taint propagation analysis on the generated CFG. That is to track the propagation path of the taint data in the program. In this paper, the taint propagation analysis process on the CFG is as follows: First, we construct the CFG taint map which is an abstract object storage, which is generated directly by calling the PHP built-in function SqlObjectStorage(). The map contains a series of tainted variables per CFG node. Putting the nodes of the CFG into a queue. And initially the entry node is as the current node to determine whether the taint map contains the current node. If it is not contained, the current node is put into the taint map and perform taint analysis on the current node. Then we start to traverse the nodes of the CFG. To get the child node of the current node and analysis it until all nodes are traversed and all nodes are analyzed.

TESTING AND EVALUATION DVWA (Damm Vulnerable Web App) [12] is used as test set. DVWA is a Web application which are developed based on PHP and MySQL. It is a vulnerability experimental platform, including SQL injection, XSS and so on. The number of vulnerabilities is been determined, so relatively, it can be accurately identify false positives and false negatives. We have tested 16 programs which include SQL injection and XSS. The programs are divided into four groups, each with four programs. The vulnerability level of each groups are low, medium, high, impossible. That the low, medium and high each contains a vulnerability, the impossible is a security program that does not contain vulnerability. The actual detection results are shown in Table 1, where Y represents the detected vulnerability and N represents the undetected vulnerability.

CONCLUSIONS This paper presents a method for detecting PHP code vulnerabilities based on taint analysis. It use the PHP-Parser syntax parser which currently supports PHP5.2 to PHP7.1 all the features. Then we generate the CFG depending on the generated AST. After that, tracking the program parameters, variables and other external input, marking the input type, propagating to various types of vulnerability functions via the taint. Finally, according to the output of the tainted types and variables to examine the vulnerabilities. The analysis method of this paper currently only supports the procedure-oriented program, and further research is needed for the object-oriented analysis. There are fewer types of vulnerabilities currently supported for detection. The above questions will be further studied in the future.

cao2017

Object Oriented Metrics to measure the quality of software upon PHP source code with PHP_depend

INTRODUCTION Astra Graphia Information Technology PT. is an Information Technology (IT) consultant company which sale, distributed, and maintain both hardware and software for all level customer with either in-house or reseller software. Astra Graphia run SAP application from www.SAP.com which supports their daily business activity processes. However, there are some improvement and update on implemented SAP application on daily basis, which is needed by departments in order to supports their business activity processes. Request online system is a web based application which is built with Personal Home Page (PHP) language programming in order to record and control all improvement or update request in SAP application. For future implementation, the intelligent of this application will be extended with such as technology such as Data Warehouse [19,20,21,22,23] or Data Mining with some options algorithms such as Attribute Oriented Induction(AOI)[24,25,26,27,28,29,30,31] or Attribute Oriented Induction High level Emerging Patterns (AOIHEP)[32,33,34,35,36]. Meanwhile, Open Source Software has impacted software industry and recently became extremely popular such as Personal Home Pages (PHP), Java Server Pages (JSP), Java and so on. This paper will investigate how to measure PHP source code with PHP_depend. The investigation will examine 32 PHP source codes from Request online system application which supports improvement or update request upon SAP application, PHP_Depend is a small program that performs static code analysis on a given source base , According to G. Kour and S. Evolution PHP_Depend can generate a large set of software metrics from a given code base and identify parts of an application where refactoring should be applied [1]. Object Oriented that makes designs more powerfull, more maintainable, and more reusable for design system. Recently, almost all system design already uses a technique Object Oriented, in the design of a system designed to ensure software quality meet the standard Object Oriented Programming (OOP) need be tested to detect and subsequently handle all errors in it. A number of schemes are used for testing purpose and this measurement will make the result software which easy maintenance, understandability and reusability. This paper present how to perform a software measurement and presents the results in the a report that is easily understood by management, with this report can be used to predict the level of error and how much cost to spend on developing the program

RELATED WORK IN THE LITERATURE Measuring the discriminative power of object-oriented class cohesion metrics [2], this paper obtain the same cohesion values for different classes that have the same number of methods and attributes but different CPCIs. Software Quality Estimation through Object Oriented Design Metrics [3], this paper obtain how these metrics are useful in determining the quality of any software designed by using object oriented paradigm. Critical Analysis of Object Oriented Metrics in Software Development [4], this paper obtain to a review and analysis of object oriented metrics is presented for identification and validation of object oriented metrics and out of various metrics. Evaluating the impact of different types of inheritance on the object oriented software metrics [5], this paper discuss focuses on effects of inheritance on object oriented metrics. Implementation of ISO 9126-1 quality model for asset inventory information system by utilizing object oriented metrics[6], this paper aim Proposed ISO 9126-1 quality model has been internally evaluated by object oriented metric using case study on Politeknik Caltex Riau (PCR) which is one of the organization that engaged in academic area. Software Product Quality[7], this chapter by Martin Glinz discus about software product quality. Effectiveness of encapsulation and object-oriented metrics to refactor code and identify error prone classes using bad smells [8], this research develop a metrics model to identify smelly classes to improve Encapsulation and Object-oriented Metrics. Applying the ISO 9126 quality model to test specifications [9], this paper apply ISO 9126 for model to test specifications. An ISO 9126-based Quality Model to Assess the Quality of TTCN-3 Test Specifications 2 Software Quality Models [10], this chapter apply ISO 9126 to Assess the Quality of TTCN-3 Test Specifications, TTCN-3 is ETSI Centre for Testing and Interoperability.

PHP_DEPEND SOFTWARE METRIC MEASUREMENT EXPERIMENTS The experiments used source codes of Request online system application (ROLIS) which was allocated in sub directory C:\PEAR\proyektoPHP\rolisdev as PHP project. The experiments were carried on windows 7.0 operating system and used PHP version 5.2.3, including PEAR (PHP Extension and Application Repository) package which provide library PHP open source code. This PHP project will be measured with PHP-depend software metrics with such as next steps[13]:

The execution time for each experiment will be different which depend on your computer size and allocation process in your computer. Next is explanation for each PHP_depend experiment and they are: A. Summary XML. This PHP_depend experiment will be executed in sub directory PEAR by giving statement: php pdepend –summaryxml=C:\PEAR\results\summary.xml C:\PEAR\proyektoPHP\rolisdev. Figure 2 shows the statement execution and was executed in 3.22 minutes with memory allocation 94.50 MB and the result shows: • Parsing source files : 657 • Executing Cyclomatic Complexty-Analyzer:5629 • Executing Class Level-Analyzer: 6240 • Executing Code Rank-Analyzer: 1410 • Executing Cohesion-Analyzer:10716 • Executing Coupling-Analyzer: 5639 • Executing Hierarchy-Analyzer: 5375 • Executing Inheritance-Analyzer: 1405 • Executing NPatch Complexity-Analyzer:5685 • Executing Node Count-Analyzer : 3692 • Executing Node Loc-Anlyzer: 3947

B. Pyramid report. This PHP_depend experiment will be executed in sub directory PEAR as well and by typing statement: Phppdepend–overviewpyramid=c:PEAR\results\pyramid.svg :\PEAR\proyektoPHP\rolisdev. Figure 3 shows the statement execution and was executed in 2.19 minutes with memory allocation 93.50 MB and the result will shows: • Parsing source files : 657 • Executing Coupling-Analyzer: 5629 • Executing Cyclomatic Complexty -Analyzer:5681 • Executing Inheritance-Analyzer: 1405 • Executing Node Count-Analyzer : 3692 • Executing Node Loc-Anlyzer: 3947

  1. Charts. This PHP_depend experiment will be executed in sub directory PEAR as well by giving statement: php pdepend — jdepend-chart = \ PEAR \ results \ jdepend.svg : \ PEAR \ proyektoPHP \ rolisdev. Figure 5 shows the statement execution and was executed in 00.15 minutes with memory allocation 88.25 MB and the result will shows: • Parsing source files : 657 • Executing Dependency-Analyzer: 3411

INTERPRETATION OF PHP_DEPEND SOFTWARE METRICS MEASUREMENT EXPERIMENTS After running the PHP_depend software metric then we need to interpret the result as the conclusion of software metric measurement upon Request online system application as PHP project which was allocated in sub directory C:\PEAR\proyektoPHP\rolisdev will generate Pyramid Report shown in Figure 4 and Chart report shown in Figure 6. • LOC = CYCLO/LOC (1) • NOM = LOC/NOM (2) • NOC = NOM/NOC (3) • NOP = NOC/NOP (4) • CALLS = FANOUT/CALLS (5) • NOM = CALLS/NOM (6) The score for each of metrics in these 3 categorization of metric are shown in figure 4 as result of running pyramid report experiment and they are ANDC=0.588, AHH=0.242, NOP=5, NOC=254, NOM=3433, LOC=59994, CYCLO=17457, CALLS=9412 and FANOUT=346 as shown in figure 4. In order to find the software size then we need to score all these metrics with equations (1) to (6) where the number of dividend and divisor in each equation will refer to number its metric as shown in figures 4 or 8. The scoring only applied to size and complexity, and coupling categorization metrics as shown in figure 7, where inheritance categorization metrics such as ANDC and AHH didn’t include since they have already their scores.As shown in figures 4 or 8, metrics CYCLO and LOC in equation (1) will have number 17457 and 59994 respectively, metrics LOC and NOM in equation (2) have number 59994 and 3433 respectively. Metrics NOM and NOC in equation (3) have number 3433 and 254 respectively, metrics NOC and NOP in equation (4) have number 254 and 5 respectively. Meanwhile, Metrics FANOUT and CALLS in equation (5) have number 346 and 9412 respectively, metrics CALLS and NOM in equation (6) have number 9412 and 3433 respectively. The metrics LOC, NOM, NOC and NOP in left side in figure 8 as size and complexity categorization metric as shown in figure 7 with equations between (1) and (4). The score of metric LOC is executed with equation (1) = CYCLO/LOC=17457/59994 = 0.291. The score of metric NOM is executed with equation (2) =LOC/NOM =59994/3433=17.476. The score of metric NOC is executed with equation (3) =NOM/NOC=3433/254=13.516 and the score of metric NOP is executed with equation (4) = NOC/NOP=254/5=50.8. Figure 4 shows these 4 size and complexity categorization metrics’ score such as LOC=0.291, NOM=17.467, NOC=13.516 and NOP=50.8 in the left side. Meanwhile, the score for metrics CALLS and NOM in right side in figure 8 as coupling categorization metric as shown in figure 7 will be executed with equations (5) and (6). The score of metric CALLS is executed with equation (5) =FANOUT/CALLS=346/9412=0.037 and the score of metric NOM is executed with equation (6) =CALLS/NOM =412/3433=2.742. Figure 4 shows these 2 coupling categorization metrics score such as CALLS=0.037 and NOM=2.742 in the right side. Moreover, in order to give easy understanding the software size measurement based on PHP_depend software metrics as shown in pyramid report in figure 4, then the metrics scores will be categorized into 3 different colour such as black, green and orange colours. The black, green and orange colours refer to low, average and high scores based on reference value on table 1, where each number as minimum score. For example, AHH metric has minimum low score 0.09 with range score between 0.09-0.209, minimum average score 0.21 with range score between 0.21-0.319 and minimum high score 0.32 with range score start from 0.32.

CONCLUSION This paper presents how to perform measurements based on Object Oriented Metrics for PHP programming language, many tools that can be used to measurements for this paper used PHP_depend and source codes of Request online system application for testing, PHP_depend experiments generate summary XML, Pyramid report and Report Charts. The conclusion of after testing we suggest Request online application system developed using PHP framework such as Codeigniter Framework, Laravel Framework or Zend framework, so we get a system that is more reliable and easier to develop. For PHP_Depend we suggest for Pyramid report and Chart Report continue to be developed to make it more easier to understand for user.

Comparison the processing speed between PHP and ASP.NET

INTRODUCTION Nowadays the internet or the World Wide Web is a very important part of modern day. We are just a click away from the rest of the world and this is all possible because of the presents that we have on our computer. The several of our daily life like online browsing, shopping, booking, managing, communication and business that we conduct by click of the mouse has not only made the world a smaller place to life but simplified our lives amidst hectic schedules and professional and personal commitments in life. The mention above can be done by implement of web application in the computer that extends both across browser base application as well as client base application. Web applications play an important role for many business purpose activities in the modern world. It has become a platform for the companies to fulfil the needs of their business. web applications there are several techniques and software tool that are used to development of various web applications, also there are many server site programming languages for web application such as PHP, ASP.NET, JSP, Java, Pert, Python… , Each language has its own advantage and disadvantage. Today there are many web hosting in the world support one or more server site programming languages. Some languages are very popular in the web application as mention in the W3Techs – World Wide Web Technology Survey [1]. When use of web or web application of cause user want to use fast application. User do not want to wait for long time especially on web application, if it is slowly user will not wait and will go to other web site. User will not care which technology, sever site programming language used for develop the system and run on which kind of operating system. Then choose the right technology with faster processing speed is one of importance factor for development of web application. In the recent year, there were many researchers worked on this field of research such as Sneha Prabha Chandran, Mridula Angepat [2], this research was comparison between ASP.NET and PHP. The implementation was done by development of different servers implemented in these platforms comprising the SQL server 2008 for ASP.NET and MySQL for PHP. A real estate web application is developed with three main panels which are the user panel, advertiser panel and admin panel. The same functional requirements are used in two web technologies. The result was ASP. NET is found to be more efficient and reliable than PHP. Ramesh Nagilla [3], propose comparison of web development technologies (ASP.NET & PHP) by development web application for photo gallery, application is developed using ASP.NET and PHP in order to compare the two web development technologies. Result of this research was mention it is hard to decision which technology is better ASP.NET and PHP. Both can do the same things. ASP.NET is very good when it comes to large applications as there are lot of options available in it to move the phase of development faster. PHP will be useful for both small and large projects. Small projects are more comfortable in PHP. Timur Mirzoev [4], propose webpage load speed: ASP.NET and PHP by using “lori Firefox extension” was a tool for speed evaluation. Experiment was done on IIS with ASP.NET and Apache with PHP and test on two cases: 1. Load page with call external three JavaScript files, one Style sheet, one CSS image, three additional images, and one favicon. 2. Test on retrieved data (text file) 10,000 rows and show on browser. Result on load page ASP.NET was faster, on retrieved data PHP was better. Md. Ahsan Arif, Mohammad Shahazzat Hossain, Nazmun Nahar and Mst. Dilruba Khatun [5], propose Empirical Analysis of C#, PHP, JAVA, JSP and ASP.Net Regarding performance analysis based on CPU utilization. Research was done on window XP and database oracle 10g, IIS with ASP.net, Apache with PHP, and Apache Tomcat with Java. Experiments test by retrieves from database by use three loops. Loop one retrieve employees data from database, loop two reference to data got from loop one to retrieve attendance date of employees, loop three use data got from loop two to retrieve attendance time. Result Java/JSP was the best performance usage of CPU, Execute time and Memory. Alok Ranjan, Rajeev Kumar, Joydip Dhar [6], propose a comparative study between dynamic web scripting languages. Research done with ASP.NET, PHP, JSP on Windows XP and test in four cases: 1. Finding factorial of 100, 2. Check word with 1,000,000 characters was it palindrome. 3. Order number with random 1,000,000 numbers by using merge sort and 4. Run Dijkstra’s algorithm with 1,000 nodes and 5000 edges. Run on two kinds of codes: develop code by team research and use build-in module. Result was processing with number PHP was done better; sorting JSP was better performance and for complex solution ASP.NET was better. In this research we are comparison the processing speed between PHP and ASP.NET by development environment base on Windows Server and database oracle 11g. To evaluation processing speed was made experiment with five cases: 1. Load static web page (include photo, audio, video, file PDF), 2. Processing algorithms (Hanoi Tower and sum big number 50,000 digit and sorting data 5,000 value), 3. Managing database (Truncate, select, insert), 4. Upload file and 5. Read/ write data to external file.

THE PROPOSED METHOD Comparison processing speed between PHP and ASP.NET was done by establish three servers on VMWare ESXi Version 5.5.0. These three servers was established base on the same basic environment, OS was Windows Server 2008 R2 64 Bit, RAM 4GB and database oracle 11g R2 64 Bit. But on server one was installed web server IIS 7.5 and PHP 5.3.28, hereinafter referred to as “Server PHP-IIS”, Server two was installed webserver IIS 7.5 and ASP.NET 4, hereinafter referred to as “Server ASP”. Server three was installed webserver Apache 2.2.8 and PHP 5.3.28, hereinafter referred to as “Server PHP-Apache”. For client was Laptop Dell Inspiron 15R with Windows 8.1 Enterprise 64 Bit, RAM 8.00 GB, Firefox Version 39.0, ADD-ONS lori (Life-of-request info) Extensions [7] and ADD-ONS Status-4-Evar [8] for Firefox can show status bar. To evaluation the processing speed was done by development webpage with the same of algorithms on ASP.NET and PHP and experiment on three servers above.

EXPERIMENTS To evaluation processing speed, experimented was divided to five difference cases: Load static webpage, Algorithms processing, Managing database, Upload file and Read/write file. Each case was experimented with three kinds of servers as mention in above. On experiment each case was create as web page on both PHP (for server PHP-IIS and PHP-Apache) and ASP.NET (for server ASP.NET), and test by using browser to open web page and run each case 10 rounds on each server respectively to find average time. Each case of experiment had information as below: A. Load static web page Experiment was conducted by create web page (with all code was only HTML), the web page was the same information for test on three servers. Information of web page was included imagefile.jpg size 1.96 MB, audio song.mp3 size 4,2MB, flash Incredible.flv size 12.5MB, video MP4 videofile.m4a 15.4MB and PDF pdffile.pdf size 568 KB. B. Algorithms processing Experiment was conduct base on three kinds (Tower of Hanoi, sum big number and sorting 5,000 values) to the purpose of this case to compare processing speed by run complicate thing. 1) Tower of Hanoi conducted by created web page with PHP and also ASP.NET on both had the same algorithms and to slove Tower of Hanoi with 20 discs. 2) Sum big number, this is sum two big number that a number could not store in a variable, each a big number had 50,000 digits. To operation of this we changed a big number to character, a digit to a character and store a big number as set of characters. After that make function to operated sum each digit from lastest of set character and show rerult on brower after finished. 3) Sorting number 5,000 values was conducted by create web page with PHP and ASP.NET to automatic random number from 0 to 5,000 and after that was sort from small to big by number using bubble sort. C. Managing database Experiment was conducted base on three command in SQL (Truncate, select, insert) as below 1) Delete data from database by truncate command. it was conducted with create web page on both PHP and ASP.net to delete data 10,000 records from table in oracle 11g database and show message after completed. 2) Insert data to database was conducted by create web page on both PHP and ASP.net to insert data 10,000 records to table in oracle 11g database and show message after completed. 3) Retrieve data from database was conduct by create web page on both PHP and ASP.net to select data 10,000 records from table in oracle 11g database and show data on web page after completed. D. Upload file Experiment was conducted by create web page on both PHP and ASP.net to upload file to server. The file upload there are file.MP3 size 6,9 MB, file.MP4 size 64,9 MB and file.MP4 149 MB each size was experiment with 10 times. E. Read/ write data to external file Experiment was conducted by create web page on both PHP and ASP.net to read data from file there are 1,000,000 rows and after that wrote data got from process read back to other file in server.

CONCLUSION Web applications play an important role for many organizations and many business activities in the modern world. Web applications there are several techniques and software tool that are used to development of various web applications. To choose the right technology for development web application for organization or business is the one of most importance. ASP.NET is the one of good choice to choose for organization that use Window OS, because feature of processing speed is fast. From our experiment we can conclusion as ASP.NET is best for web page to show information, it is had fast speed of page load than PHP 1.81 times, it is best for web application need high processing speed and it is Read/write file ASP.NET better than PHP 3.37 times. However from our experiment ASP.NET had a weak point is data type changing, from experiment with sum big number by change number to string and string to number PHP faster than ASP.NET 6.8 times. For web application that manage of database PHP is best than ASP.NET 1.45 times. Load file PHP is faster ASP.NET 1.17 times.

COMPARISON-THE-PROCESSING-SPEED-BETWEEN-PHP-AND-ASP.NET_

A Prototype System to Scrutinize PHP Code Injection Attacks

INTRODUCTION The web environment is growing rapidly and number of crimes committed on web is also growing. Day by day web application are growing in the area of banking, business, healthcare, educational, and other critical infrastructure but due to adhoc nature of web application development and due to design complexity of web application it is difficult to attain foolproof web security. To provide a powerful awareness document for web application security Open Web Application Security Project (OWASP) [1] was formed in 2001. OWASP is an open community and nonprofit organization which is dedicated to finding and fighting the causes of insecure software. The mission of OWASP is to make application security noticeable, so that people and organizations can make informed decisions about true application security risks. OWASAP top 10 most common web application security vulnerabilities are rewritten every three years. Code Injection Attack is a common type of web application vulnerability, which may occur due to improper handling of the user’s input. The common type of code injection attacks are SQL Injection, Cross Site Scripting and PHP injection. In previous years some well known sites such as Twitter, Facebook, MySpace, and Orkut have been affected by code injection attacks [1]. Currently, these attacks are becoming the most common publicly reported security vulnerability, with some researchers claiming that as many as 68% of websites are likely prone to these attacks. To conduct the SQL injection attack [2] attacker injects malicious text string, most often a database query, into an available web form that is eventually executed by the database. The query inserted by attacker may impair the database by retrieving unauthorized data, altering the sensitive data or erasing the data. SQL Injection attacks have been rated first in the OWASP Top 10 web application vulnerabilities in 2010. To conduct Cross Site Scripting (XSS) attack an attacker may insert tricky script code into available web forms which may read and display the current cookie values or redirect the user to another web page. Cross Site Scripting (XSS) attack is ranked first on the OWASP Top 10 Web application vulnerabilities in 2007. PHP code injection refers to types of code injection attacks which allow an attacker to supply code to the server side scripting engine. In some case it is also referred as Shell Injection Attack.

PHP CODE INJECTION ATTACK ON VULNERABLE WEB APPLICATION A. Overview PHP code injection attack exploits an application which uses input to formulate commands that are executed by the operating system. Through this attack attacker may able to execute system commands if the PHP interpreter allows system ( ) or similar functions. The severity of the attack depends on the access level of the user account under which the process is running which executes the command. Currently advance web applications uses operating system features and external programs to perform the function like dynamically creation of folder to store multimedia data such as photograph and signature of end user. PHP injection attacks occur when input is incorporated into a string to be interpreted by the shell. One of the common examples of executing the operating system command is on line registration in which web application required dynamic folders creation by the candidate login name to store their scanned photograph and signature.

B. Attack Scenario An attack scenario is an effective means of specifying and describing the ways an attacker might exploit the vulnerabilities. Matt Bishop [3] defined attack scenario as, “an attack is an action that might cause a potential violation of security in the system”. An attack can also be classified on the basis of victim i.e. The person, or software, and the person who executes such action is called an attacker. A scenario is a synthetic description of an event or series of actions and events. It is an outline of entrances, action and exits. An attack scenario has been defined in [4] as an attack situation describing the actors of an information system and their secure capabilities as well as possible attackers and their goals. A typical web attack scenario comprises of the possible attacks to a web application, a possible attacker, and the web resources that are attacked and the actors of the system related to the attack together with their secure capabilities. An attacker is presented as an actor who aims to break the security of the system. The attacker intentions are modeled as goals and tasks.

WEB FORENSICS ANALYSIS OF PHP CODE INJECTION ATTACK Web forensics is the use of science and technology to investigate and establish facts to facilitate decisive action in cyber space. The objective of the web forensic is to discover and analyze digital evidences to prove the occurrence of criminal incident activity in cyber space. In the web environment system, logs are an important resource for evidence gathering. However, logs were initially created for trouble shooting, and are not purposefully designed for digital forensics. The present Web server log may not show if an attack was successful or unsuccessful and the extent of damage done by it. The available log are also incapable to record the code/data injected by user in to web forms, which is an important source of evidence in the investigation process of code injection attack. Therefore a tool is designed and developed for capturing code/data which is fired by user/ attacker. Web forensic analysis of this PHP code injection attack takes place in two principal phases. Evidences gathering phase to collect evidences through developed logging system. Another phase is analysis of gathered evidences through domain dictionary based evidence tagging. A. Evidence Gathering for PHP Code Injection Attack In web application code can be injected from three entry point: normal web form used for entering information, by query string pass through URL and modify user agent HTTP header of browser. The developed logs captures the evidences of code injection from all these three possible modes.

B. Evidence Analysis for PHP Code Injection Attack The captured end user activity in developed HTTP log has been classified into two categories: litigate activities which do not belong to attacker and attacker activities which are suspicious. Manual tagging of this information is a tedious and time consuming task due to the enormous of information that is generated in the log file whenever a user submit a request to a web server. Hence there is a need for automated system which effectively scrutinizes the vulnerable string/code. In the normal logging system type and nature of activity is not clear by looking at captured log therefore an evidence tagging through domain dictionary is developed that shall be helpful in identifying and segregating the code injection attack from the rest. In this work, rule based strategy is applied to tag the suspicious activity of the attacker in the captured logs. One of the advantage of the rule based system is that it yields a very little false positive as the rules will usually look for specific and well known attack string for code injection attacks. To support investigation a domain dictionary is constructed which contain regular expression [5] for vulnerable code. The implemented module extracts each entry from developed HTTP log and tag the end user evidences. To tag the particular type of code injection attack in HTTP log a regular expression based searching technique is implemented which match the evidences of injected malicious code with symptom of vulnerable code stored in domain dictionary.

CONCLUSION AND FUTURE WORK This paper has explored a contemporary PHP code injection attacks and develops a prototype system to scrutinize such attacks. The work presented in this paper identified the problems of evidence gathering and analysis in the context of code injection attack. A prototype system has been developed which successfully gathers and analyzes the evidences subjected to code injection attack. There are a few improvements that may be addressed in the future in the current work developed for code injection attack. Firstly, the investigation system may be operated on-line in real-time. Secondly, the privacy preservation of the end user data is an important issue in investigating code injection attacks. The real time captured data may also contain the valuable information of end user which needs to be protected and not shared. Hence, a comprehensive strategy should be developed to preserve the privacy of end user by enforcing encoding/decoding mechanism in the captured log data.

A-PROTOTYPE-SYSTEM-TO-SCRUTINIZE-PHP-CODE-INJECTION-ATTACKS

Implementing Singleton method in Design of MVCBased PHP Framework

PHP provides a framework that aims to accelerate the process of developing a website. Today, there are many object oriented programming based framework that uses full-stack model design to MVC (Model View Controller) design. The use of these designs, especially MVC design, is to provide ease in web application development. Writing the code is becoming more systematic and reusable. In addition, the use of framework greatly helps programmers in the development of large-scale applications that involve a lot of people in it. With the framework, the code will be organized so that it can be easily understood by other programmers. There are many choices of use framework. Among them, there is Zend framework which is devoted to enterprise scale. However, this framework is rarely used because it is less popular compared with CodeIgniter and Yii framework. CodeIgniter is quite mild and can run faster than other frameworks. But the drawback is the absence of features ORM (Object Relational Mapping), so that it becomes more complicated when used in large applications. While the Yii framework has better features than CodeIgniter, but slower performance than CodeIgniter. To overcome the disadvantages of the 2 framework, it is built a new framework namely Becak HMVC.1) This framework is designed to simplify the design pattern and minimize the number of files. From the test results, it was found that the framework Pedicab HMVC have drawbacks such as the lack of library cache (temporary storage) and AJAX (Asynchronous JavaScript and XML). As a result, the performance of this framework is still not maximal.2) This research aims to produce a new framework that it’s performance more efficient than Yii framework, has ORM and AJAX feature. This is done by simplifying the design pattern and minimizing the number of files. In addition, it also uses a new way that found on PHP 5.3, namely the use of namespace (package) with the Singleton pattern (initialization once in the manufacture of objects).

  1. System Design Hierarchy structure of framework that was built looks like in Figure 1. This structure will be the basis or framework, which will serve as a folder or directory. After that, it will set up the structure of the namespace of the class that will be built. The main component of this framework is the core part. This section contains the basic classes that will handle the routing of the url. In addition, there is also a class to set the commonly used objects or to save the instance of the class that will be stored in the class registry. With the registry, no needs to create an instance manually. In the sub-system, there is also a class Exception to do error handling. The error that can be handled is a runtime error and a database error. Another component is the db namespace that is used to perform database operations. This adapter is used to handle multiple database connection. This database is called only from a factory method, so it will be easier for developers to create applications from various databases.3) There is also a wide variety of adapters that can be used to perform database operations such as mysql, mysqli, oci8, and pgsql driver. Driver is a native of the extension php and include primitive enough for this type of connection. For the more modern connection, php provides PDO connection. PDO extension provides many types of drivers to connect to multiple types of databases including MySQL, Oracle, SQLite, and PgSQL. In terms of security, the connection with the PDO is considered more secure, because all input will be filtered first by performing variable bindings before doing the query to the database.4) To speed up the processing time, there are features to do caching on web pages or data derived from the database. This feature is useful to accelerate the performance of a website, which is measured by the speed of processing a web page. How it works caching is to store data temporarily in files or cache engines such as memcache, apc, or alternatively phpcaching. B. Framework Architecture Based on the design of the hierarchy structure of folders or namespace that has been made, the UML design was made. UML package diagrams that exist in figure 2 illustrate the architecture of the framework to be created. The main system will apply the Singleton design pattern. There is only one class that will be used as a superclass. To call a sub-system, it is used design pattern facade. As for subsystems such as the database, will be used design pattern adapter. For helper subsystem, there are classes such as paging, captcha, sessions, cookies, etc.

RESULT AND ANALYSIS

In this section, will be presented the results of comparison tests between the new framework created in this research, compared with Yii and CodeIgniter framework. Benchmarking will be carried out on aspects of features, throughput static and dynamic pages, computing time in static and dynamic pages and memory resource usage .

Comparison of Framework Features There are some features that will be compared between the new framework created in this research, compared with the features of CodeIgniter and Yii framework. Here is a list of the standard features of a framework: • MVC: Model View Controller supports • Multiple DB’s: supports multiple databases without changing the code. • ORM: supports object relational mapping, sometimes implementation is active record. • DB Objects: support for object database • Templates: there is a template engine • Caching: support caching to a website • Validation: support input validation and filtering • Ajax: AJAX support by default • Auth Module: supports modules for login and access control. • Modules: support for other modules such as RSS, PDF Parse • EDP: Event Driven Programming

College Campus and Career Guidance Mobile App

Android Based College Campus App

Android base order recommender system

Design of an Enhanced Logistics Service Provider Selection Model for e-Commerce Application

DETSApp: An App for Disaster Event Tweets Summarization using Images Posted on Twitter

An Android based Mobile Application for Career Guidance

Requirements for a Flexible and Enabling Mobile Crowdsensing mHealth Applications

Android Based College Campus App

Technology has changed our daily life routine as well as living style. So, student of school or colleges or university require application that supports smart phone to get all type of information related to examination, lecture notes, placement regarding question, notification, events, transportation etc. instead of calling system because almost all mobile users has smart phone now days. Each and every educational institute provides limited services to their users including students, parents, guardian and public. If provided services are more than ease of using is very difficult. Android Based College Campus App That is why students interest towards using college or school or university is decreasing day by day. We designed an application to fulfil the requirement of students or parents or employee based on present scenario of
market and latest technology

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Job Search System In Android Environment

Abstract: The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academic keys.com, CareerBuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment.
However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exist on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. Job Search System In Android Environment The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind.
All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Food wastage reduction by Garbage Management

Greenhouse Remote Monitoring System Based Mobile App

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

Task Management App for mointoring and controlling task

A Food Wastage Reduction Mobile Application

Location Based Garbage Management System for Smart City

Daily Stand-Up Meetings Start Breaking the Rules

V-Buddy: A Learning Management System

MoMaP An interactive gamified app for the Museum of Mineralogy

Android Based Exam Paper Generator- E-PAGE

AUTOMATED BLOOD BANK SYSTEM

A Food Wastage Reduction Mobile Application

Abstract— Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. A Food Wastage Reduction Mobile Application Any user in need can see all the food images donated by different users and add it to his or her cart.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Location Based Garbage Management System for Smart City

Abstract – Smart cities integrate multiple mobile or web solutions to build a comfortable human habitation. One of these solutions is to provide an environmentally friendly, efficient and effective garbage management system. The current garbage collection system includes routine garbage trucks doing rounds daily or weekly, which not only doesn’t cover every zone of the city but is a completely inefficient use of government resources. This paper proposes a cost-effective mobile or web based system for the government to utilize available resources to efficiently manage the overwhelming amounts of garbage collected each day, while also providing a better solution for the inconvenience of garbage disposal for the citizens. Location Based Garbage Management System for Smart City This is done by a network of smart bins which integrates cloud-based techniques to monitor and analyze data collected to provide predictive routes generated through algorithms for garbage trucks. An android or web app is developed for the workforce and the citizens, which primarily provides the generated routes for the workforce and finds the nearest available smart bin for citizens.

Location Based Garbage Management System for Smart City

Abstract – Smart cities integrate multiple mobile or web solutions to build a comfortable human habitation. One of these solutions is to provide an environmentally friendly, efficient and effective garbage management system. The current garbage collection system includes routine garbage trucks doing rounds daily or weekly, which not only doesn’t cover every zone of the city but is a completely inefficient use of government resources. This paper proposes a cost-effective mobile or web based system for the government to utilize available resources to efficiently manage the overwhelming amounts of garbage collected each day, while also providing a better solution for the inconvenience of garbage disposal for the citizens. Location Based Garbage Management System for Smart City This is done by a network of smart bins which integrates cloud-based techniques to monitor and analyze data collected to provide predictive routes generated through algorithms for garbage trucks. An android or web app is developed for the workforce and the citizens, which primarily provides the generated routes for the workforce and finds the nearest available smart bin for citizens.

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Existing System

The obvious solution to this is for the cleaning staff to stay near garbage bins every day till they fill up to clean them. This is not a real solution.

There are some notable negative effects when considering the garbage bins always being full. One of the main effects is the surrounding area starting to smell and be very unpleasant. When

the garbage bins are full people put their trash on sides of the garbage bins.

PROPOSED System                 

  • The proposed system overview for this system. Solid waste management can be broadly categorized as segregation, collection, and transportation.
  • The server will collect the data and store them only a database. This data will be analyzed and displayed on two different dashboards that can be accessed by the workforce and clients.
  • Using data analytics, reports will be generated which can be monitored by the admins through the admin dashboard.
  • Based on the data collected, garbage trucks can be given routes generated through various algorithms and google maps API to efficiently route through all necessary garbage bins and finally reach the dumping site