NTCC Guidelines - ASET & AIIT

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 125

`

GUIDELINES

NON-TEACHING CREDIT COURSES


(Registration, Conduct, Supervision, Progress Monitoring, Assessment& Grading)

AMITY SCHOOL OF ENGINEERING & TECHNOLOGY


AMITY UNIVERSITY HARYANA
GURGAON

I
CONTENTS

S. No. Description Page No.

1 Introduction 3

2 Objectives of Non-Teaching Credit Course 3

3 Types of Non-Teaching Credit Courses 4

4 Credit Units 5

5 Student Learning Outcomes 6

6 Issues in Conduct of Non-Teaching Credit Course 6

7 Guidelines for Conduct of Non-teaching Credit Courses 6

8 Assessment Plan and Continuous Assessment 11

9 Plagiarism 13

10 Submission of Final Report 13

11 Students Not Meeting the Eligibility Criteria 14

12 Procedure for Examination of Cases for Special Consideration 15

13 Final Assessment 16

14 Components of Final Assessment 16

15 Report Requirements 18

16 Guidelines for Writing the Report 18

17 Appendix-A: Non- Teaching Credit Course Details 20

18 Appendix- B: Synopsis Format 21

19 Appendix-C: Sample Synopsis 23

Appendix-D: Term Paper/Independent Study/Seminar Abstract Format and


20 30
Sample

21 Appendix-E: Sample Gantt Chart to depict Major/Minor Project Planning 31

1
Appendix-F: Sample Gantt Chart to depict Term Paper/Independent Study/
22 32
Seminar Planning

23 Appendix-G: Fortnightly Progress Report (FPR) 33

24 Appendix-H: Student/Faculty Interaction Record 34

25 Appendix-I: Major/Minor Project Guidelines and Format 35

26 Appendix-J: Sample Project Report 45

27 Appendix-K: M.Tech Dissertation Guidelines and Format 81

28 Appendix-L: Term Paper / Independent Study /Seminar Report Guidelines 100

29 Appendix-M: Sample Term Paper / Independent Study / Seminar Report 101

2
HARYANA

1. INTRODUCTION

The academic philosophy of Amity University revolves around student centric learning, which
takes into consideration their varied learning needs and significantly accelerates their retention of
both knowledge and skills. It inspires and gives chance to a student to operate, manage and
monitor his/her own learning process under the supervision and guidance of a faculty
supervisor, so that he/she can train himself/herself to be independent and develop oneself to be a
good professional.

Non-teaching Credit Courses (NTCCs) have proved to be great tools to achieve the objectives of
student centric learning. Following are attributes of Non-teaching Credit Courses (NTCCs):-

 NTCCs are part of Programme Structure and are compulsory.


 Have credit units assigned.
 Not conducted as regular class lecture, lab practical or tutorial.
 Are self-exploratory/application oriented/fieldwork oriented in nature.
 Are done under the supervision/guidance of faculty guide and/or external guide depending
upon the place of course being undertaken.
 Conducted during the summer break or during the semester.
 Allows students to pursue their area of interest to greater depth.
 Help students to relate theory to actual practice in the industry.
 Help students to be innovative, creative and undertake thorough independent study.

The courses are conducted either at institution, industry, other research labs or universities in
India and abroad.

2. OBJECTIVES OF NON TEACHING CREDIT COURSES

There are certain facets of every student’s professional development that cannot be effectively
taught in an academic environment. These facets can only be learnt through direct, on-the-job
experience or working with successful professionals and experts in the field. Entire effort in
NTCCs is in terms of extending the program of education and evaluation beyond the classroom
/ laboratory of a university or institution.

The objectives of the NTCCs are:-


 To provide an opportunity to students to demonstrate the ability to devise, select and
use a range of methodologies and tools to the chosen / given project and applying the
theoretical knowledge to a real life situation.
 Experience learning outside classroom through self-exploration, practical experience,
Industry, field experience, live experience, research, design projects etc.

3
 The learning process in the NTCC seeks out and focuses attention on many latent
attributes, which do not surface in the normal class room situations.
 Research and its importance in experimental learning through NTCC. These
experimental learning attributes through NTCC include:
Intellectual ability.
Professional judgment and decision making ability.
Inter-disciplinary approach.
Skills for data handling.
Ability in written and oral presentation.
Sense of responsibility.
Developing professional skills.
Application of theory, concepts in given industry / practical /field scenario.

3. TYPES OF NON TEACHING CREDIT COURSES

Various types of NTCCs include

 Term Paper: A 'term paper' is a research paper written by students during a


specified semester or summer break. This is generally intended to describe an event, a
topic, a concept or to put forth a point. It is a written original work discussing a topic
in detail, usually several typed pages in length and is often due at the end of a
semester. It is designed to introduce student how to write papers through
investigation of topics that are of special interest to them.

 Independent Study: Independent study provides a way for well-motivated students to


pursue a topic of interest that does not necessarily fit into a traditional academic curriculum.
It provides students, opportunities to explore their interests deeper and make important
decisions about how and where they will direct their talents in the future.

 Seminar: A seminar is an important component of learning in a programme where


the student learns to prepare a report and presentation on a particular topic.

 Workshop: A brief intensive short term course for students which emphasizes on problem
solving in particular area.

 Field Work: Field work provides an opportunity to students to integrate theory and
practice from courses to an organizational context. This opportunity to observe,
participate, and perform independently in a supportive environment is especially
useful for students without previous experience in the field. It also helps the students to
decide the area of specialization or career path.

 Summer Internship / Industry Internship/ Minor Project: Summer Internship /


Industry Internship Programme/ Minor Project is an integral part of the academic
curriculum of most of the programmes. It aims at widening the student’s perspective
by providing an exposure to real life organizational and environmental situations.
This enables the students to explore an industry/organization, build a relationship with
a prospective employer, or simply enhance their skills in a familiar field. The
internship also provides invaluable knowledge and networking experience to the

4
students. Ideally the duration of the industry internship is six to eight weeks. However,
in some cases this period could be extended, but not more than 18 weeks.

 Major Project: Major Paper / Project is a scholarly essay / research project/ design
project that shows evidence of critical analysis and understanding of the topic. Project is
also design based, where a group of students work on various aspects of an integrated
design.

 Dissertation: A substantial, sustained and an independent exercise in research or


scholarship produced by an individual student involving substantial data collection in
the field and / or the laboratory with the work presented as a written report, which
demonstrates scholarship at an appropriate level and in an area relevant to the chosen
degree of the student.

Dissertation provides an opportunity to the students to demonstrate the ability to


devise, to show the application of skills of data collection, critical analysis and concept
synthesis necessary for formulation of defensible conclusions. It also provides a
platform to demonstrate ability to draw appropriate conclusions argued from the
evidence presented and also a forum to demonstrate the skills of structuring and
present a balanced informed, complete, clear and concise written argument.

 Research: Research is an integral part of any NTCC. Research can generally be classified
by Purpose or by Method or by Source of Data.
Research by Purpose:- Basic Research & Applied Research
Research by Method:- Deductive Research &Inductive Research
Research by Source of Data:- Primary Research & Secondary Research

4. CREDIT UNITS

 The range of credit units of NTCCs is from 1-30 credits depending upon nature, level and
duration of NTCCs as given below:

S. No. Course Title Credit Units


1 Term paper 01 –03
2 In – house Practical Training 03 – 04
3 Industry / Summer Training / Internship / Assignment 03 – 30
4 Minor Project 02 – 06
5 Major Project 08 – 22
6 Field work 01 – 15
7 Seminar / Conference 01 – 12
9 Dissertation 04 – 30
10 Independent Study 01 – 03
11 Workshop 01-03

 Following are the Credit Units associated with different modes of


Teaching/Learning:

5
Lecture : 100%
Tutorials : 100%
Laboratory : 50%
Field Work/Self Exploratory Learning in Lab : 15-20%

 Therefore, eight weeks full–time NTCC will have credit units:


40 days × 8 hrs per day/6hrs=5.3 credit units (i.e. 5 to 6 credit units)

 To earn 9 credit units for a NTCC, a student must put in self-efforts:


9 credits×55 to 60 hrs/per credit = 495 to 540 hrs
No. of days required in full-time mode: 495 hrs / 8 hrs per day = 62 days = 2 months
No. of days required in part-time mode: 495 days / 3 hrs per day = 165 days =5 to6
months.

 Therefore, faculty guide must ensure that the minimum efforts put in by students are
commensurate with the prescribed credit units of a course.

5. STUDENT LEARNING OUTCOMES

The student learning outcomes are very critical for every course. Therefore, these must be clearly
defined keeping in mind the programme objectives and course objectives.

6. ISSUES IN CONDUCT OF NON TEACHING CREDIT COURSES

 Lack of clarity of objectives.


 Lack of clarity about expectations.
 Lack of proper guidelines about conduct of course.
 Relationship between objectives, methodology, output, quality and credit units.
 Commencement &duration.
 Progress monitoring & report.
 Role of faculty &guide.
 Discipline & deadlines.
 Originality of work / plagiarism.
 Output and quality.
 Evaluation Scheme.
 Non submission of marks on time.
 Conduct of Back Paper of a NTCC.

7. GUIDELINES FOR CONDUCT OF NON TEACHING CREDIT COURSES

Irrespective of the nature of the NTCCs, these guideline are described as Guidelines for all the
NTCCs. The guidelines give a methodical approach to NTCC that will ensure effective
supervision and manage student expectations to improve student learning experience.

It aims:
 To provide a systematic approach to NTCCs across the School/Institute.
 To provide students taking NTCC with a valuable learning experience.

6
 To enable students to develop as independent learners.
 To promote the dissemination of effective practice.
 To support faculty guides in the supervision, progress monitoring and assessment of
NTCC.
 To enable students to follow prescribed guidelines for the course:-
These guidelines apply to all NTCC’s and provide information to both faculty -
guides and students, on roles and responsibilities, the conduct &monitoring
process, supervision, assessment and submission.
The prime responsibility for managing the NTCC lies with the student and the faculty
guide. A faculty guide will be identified for each student.
There will be clarity regarding the role and responsibilities of the student, faculty
guide, and external guide and NTCC Review Committee
These guidelines do not offer guidance on detailed methodology, lab experiments,
fieldwork or analysis of data.

7.1 Briefing the Students about NTCC Regulations &Guidelines

A briefing session for all the students and concerned faculty guides must be organized by the
departments well in advance so that the students and faculty guides are able to prepare well &proceed
for the course as per guidelines. For example, the briefing for Project / Dissertation in final semester
for UG / PG students must be done in mid of odd semester of the academic session so that the students
are able to finalise:

 The broad area of work, and


 The industry / research lab / external university on their own or with the help of
Institution.

The Guidelines for concerned NTCC must also be uploaded on AMIZONE for students and faculty
guides.

7.2 Roles and Responsibilities of Students

 Commit to a schedule of meetings, in order to ensure that the agreed schedule is


adhered to and deadlines met.
 Use supervisory time allocated effectively.
 Manage tutorial / gap lectures / briefing sessions effectively by preparing for same in
advance.
 Keep appointments which have been arranged.
 To send regularly ‘Fortnightly Progress Report’ (FPR) to faculty guide.
 Maintain a record of supervisory meetings.
 Act responsibly and professionally during field work / industry internship / working in
external labs etc.
 Make use of guidelines and documentation to plan and monitor progress of the NTCC, to
maximize the benefit of tutorial support, and to implement the feedback and approved
action plan for development of the project.

7
 Recognize ethical responsibilities and understand the regulations with regard to
plagiarism.

7.3 Roles and Responsibilities of Faculty Guide / Supervisor

To advise on:
 The topic, synopsis and work schedule of NTCC and its resources.
 To assist the student in identifying problems /issues and suggest / agree on
specifications to address those.
 Risk assessment, where applicable.
 Methodologies.
 Referencing/plagiarism.
 Ethical practice, as appropriate.
 Information sources, including AUH material (digital library, previous thesis or
project copies etc.), to support planning and monitoring progress of the NTCC.
 Structure and presentation of NTCC.
 Progress of NTCC.
 To offer feedback on partial versions of NTCC.
 To maintain regular supervisory contact.
 To contact any student who fails to attend supervisory sessions.
 Identify students of NTCC who are considered exemplary.

7.4 Finalization of Place to Undertake NTCC Course (Institution or outside in Industry,


Research Labs, other Universities etc.)

 The NTCC can be done at the Institution or outside as per the nature of the course /
choice of student. Certain courses can be done at both internally or externally. Further,
certain courses can only be done in industry, such as Industry Internship, Social Work,
Clinical Psychology & Legal Practice etc.
 The Institution NTCC Committee will decide the place of work.
 The student is given a choice to either arrange the external organization for NTCC on his
own or avail the institutional facilities.
 If the training / project etc. is organized by the institutional industry etc., then the
student has to undertake his NTCC in the assigned organization.
 The student can arrange outside organization for NTCC on his / her own also. In such
cases the student has to take permission from HoI/ Faculty Coordinator atleast three
months prior to the commencement of the NTCC course so that ‘Bonafide Student
Letter’(maximum seven organizations chosen by the student) can be given to students
by the Institution as per guidelines.

7.5 Allocation of Faculty Guide

 Each student shall be assigned faculty guide by Institution NTCC Committee. This will
be done well in advance in a formal manner depending on the number of students per
faculty member and the available specialization among the faculty guides.

8
 In the case of workshop/conference, course coordinator will maintain record of
workshop/conference attended by student and also give credits accordingly.
 In case a student is undertaking NTCC outside in an industry or research lab or other
university, the students will have two guides – a faculty guide from the institution and an
external guide from the concerned organization. In such cases of joint guidance, the main
guide will be the faculty guide.
 The allotment/allocation of supervisor shall not be left to the individual students or
teacher.
 The external guide must be provided with brief guidelines for performance monitoring
and assessment of the student for NTCC.
 The faculty guide from Amity must closely interact with the external guide and monitor
the progress of the student in NTCC at the host institution/industry/research lab etc.
Faculty guide must also strengthen the relationship with the host organization of the
student for future collaborative research and placement of the student in that
organization.

7.6 Briefing Sessions / Tutorials / Gap Lectures for Students

Briefing Sessions / Tutorials /Gap Lectures are very important for under taking the NTCC.
Therefore, it is mandatory for the students to attend the same whenever institution / faculty
guide have scheduled the same.

During such sessions students should expect to:


 Discuss ideas and concerns.
 Be guided on resources and the development of a topic / area,
 Be provided with direction’s to help them to manage the process,
 Be provided with advice on academic style, format and the scope of NTCC.
 Be provided with general feedback,
 Be provided with feedback on their NTCC and apply the comments they receive through
process of reflection and action-planning to other parts of their development work.

7.7 Approval of Topic, Synopsis/Abstract and Work Schedule

 Student will finalize the broad area / topic of the NTCC and submit it for approval as
per the format at Appendix ‘A’. Following time lines will be adhered to for
approval.
Major Project: By end of sixth week of the previous semester.
Summer Internship/Minor Project: By end of tenth week of the previous
semester.
All other NTCCs: By end of twelfth week of previous semester.

 Students will be informed about the approval by the faculty guide within two weeks of
submission.

 Once the approval has been accorded students will discuss the work schedule with their faculty
guides. They will submit the synopsis/abstract as per following time lines and formats:
Major Project/Dissertation: By end of tenth week of previous semester. Format
for synopsis is attached at Appendix ‘B’. Sample synopsis is attached at
Appendix ‘C’.
9
Summer Internship: Before proceeding on term break. Format for the synopsis
is same as at Appendix ‘B’.
Minor Project: In the first week of the semester in which the course is to be
conducted. Format for the synopsis is same as at Appendix ‘B’.
If the NTCC is a term paper/independent study/seminar, the students will
submit a one page abstract (instead of synopsis) as per format at Appendix ‘D’
in the first week of semester in which the course is to be conducted.

 For NTCC like workshop/conference there is no requirement of synopsis and work schedule.
Before going for workshop/conference, student should tell details of workshop to course
coordinator. Student is supposed to submit photocopy of workshop certificate to course
coordinator.

 If the student is undertaking the NTCC outside Amity (e.g. Major/Minor Project), he/she
will provide broad area of NTCC course before start of semester to respective course
coordinator/faculty guide. However, within ten days after joining the organisation the
student will work on the topic, synopsis and work schedule of his/her
project/training/dissertation under the guidance of external supervisor and faculty
guide.

 The student will send the synopsis along with work schedule duly approved and signed by
external guide to his faculty guide. If faculty guide feels requirement of some changes in the
synopsis and work schedule, he/she will discuss with the external guide and finalise the
same in order to meet the Course Objectives (COs) and Learning Out comes (LOs) in
accordance with Programme Learning Objectives (PLOs).

 The work /project schedule to be prepared using GANTT or PERT chart sample is attached
as Appendix ‘E’ for project and Appendix ‘F’ for term paper/independent study/seminar.

 The area/topic and work schedule of NTCC will be approved by the Institution NTCC
Committee (INC). The student will make a presentation before the INC on a specified date,
time and venue. The final list cleared by the INC and approved by HOI will be sent to
Academic Office in AUH HQ, before the date of first Fortnightly Progress Report.

7.8 Conduct and Progress Monitoring of NTCC

 The students will undertake NTCC as per the course requirement and work schedule.
 The students will regularly submit their faculty guide fortnightly progress as per the
prescribed format of Fortnightly Progress Report (FPR) attached at Appendix ‘G’.
 Students undergoing workshop/conference are not required to prepare FPR.
 If student is unable to come fortnightly, then he/she will send the FPR by email to
his/her faculty guide.
 Faculty guide will mark the status of Fortnightly Progress Report (FPR) received and
quality of work done for future reference. Faculty guide will also give feedback to students.
 The student will also maintain a daily diary of the work done which will be submitted to
the faculty guide on culmination of the same.
 The student will maintain a record of interaction and feedback by faculty guide as per the
format attached at Appendix ‘H’.

10
 Two periodic progress review meetings will be conducted by the INC. Class
coordinators/NTCC committee members will fix up dates for the same. For the students
working outside the country, the institute will organize a skype presentation for periodic
progress review.

8. ASSESSMENT PLAN AND CONTINUOUS ASSESSMENT

 The Institute Assessment Plan is based on Program Learning Outcomes (PLOs), Student
Learning Outcomes (SLOs) and Course Objectives.
 The assessment will have clearly defined Continuous Internal Assessment (CIA) and
Final Assessment weightage, which have various components to assess various learning
outcomes.
 Workshop/Conference will not have CIA.
 The weightage of CIA and final assessment will be as under
Continuous Internal
S.No Credit Units Final Assessment
Assessment
1 T >8 Credit Units 50 50
2 h 5 - 8 Credit Units 40 60
3 e Up to 4 credit Units 30 70

Breakup of components and their weightage of Continuous Internal Assessment are


given as under:-
Marks Marks Marks
S. Parameter/Activity (CIA=30%) (CIA = 40%) (CIA =
No. 50%)
Timely submission of topic&
approval, Synopsis /Abstract
1 07 10 12
submission and periodic progress
review through presentation

2 Submission of FPRs 05 06 08

Submission/assessment of Draft 10
3 Report 14 16
Internal Viva and Second Periodic 08
10 14
4 Progress Review through Presentation

 The breakup of components of assessment (refer s.no. 3 in table above) of draft report will be as
under:

For Major /Minor Project or Dissertation:

S.No. Parameter Weightage (10) Weightage (14) Weightage(16)


1. Introduction and Statement of the 1
2 2
Problem/Objective
2. Review of Literature: 2 2 2
3 Methodology/Methods/Approach 2 3 3

11
Data Collection , Analysis,
4 2
Experiment/Results, 3 4
Findings/Outcomes and
Conclusions
5 Future Scope and Limitations 1
1 1
outlined
6 Plagiarism Report( < than 10%
Plagiarism) Quality of Work and 1 2 2
Written Expression
7 Student Learning Outcomes 1 1 2

For Term Paper/Independent Study/ Seminar:


S.No. Parameter Weightage (10) Weightage (14) Weightage(16)
1. Introduction and Statement of the 1
Problem or Objective or Importance or 2 2
Significance of topic
2. Review of Literature/History/Issues to be 2
2 2
covered
3 Methodology/Methods/Approach/Typ 2
es 3 3

Data Collection, Analysis, Components,


4 2
Experiment/Results, 3 4
Findings/Outcomes and Conclusions
5 Future Scope and Limitations outlined 1 1 1
6 Quality of Work and Written Expression 1 2 2
7 Student Learning Outcomes 1 1 2

 Each department/faculty of studies must follow the above assessment and properly
maintain records for all NTCC.

 In case the NTCC is under joint supervision of faculty guide and external guide, the
weightage of Continuous Internal Assessment will be equally divided between both the
supervisors (faculty guide and external guide) as per following:

The faculty guide will give the CIA marks as per the ASET guidelines.
The marks provided by external guide will be converted into 30/40/50 as the case
may be on CIA norms, for specific course.
The average of marks given by faculty guide and converted marks of external guide
shall be treated as final CIA marks for NTCC.
It is the responsibility of the student and faculty guide to ensure the external guide
sends the assessment on time. In case the marks of external guide are not received, the
Institution NTCC Committee will review the case and put up recommendations to
HOI and COE.

12
8.1Submission of Continuous Internal Assessment Marks

The institution will send the CIA marks along with all the reports from AMIZONE and
supporting documents of all students to Controller of Examinations (COE).

9. PLAGIARISM

 The NTCC report must be written by the student himself/herself. However, if required
to cite the words of others, all the debts (for words, data, arguments and ideas) have to be
appropriately acknowledged.

 It is mandatory that each NTCC report shall be checked for plagiarism through Turntin or
similar software before submission. The content which is based on existing published work
must come from properly quoted material and from the references cited section. After
checking the accuracy of the citations and references of such content, the plagiarism
report should not return similarity index of more than 15% in any circumstance. However,
if the matching text is one continuous block, the index of 15% could still be considered
plagiarism. Any report with higher than this percentage matching must be explained by
the student. The details of copy rights, professional ethics are given in Plagiarism
Prevention Policy of the University.

10. SUBMISSION OF FINAL REPORT/TERM PAPER/INDEPENDENT STUDY


REPORT/SEMINAR REPORT

The most important aspect of the courses is the final report. Therefore following must be
ensured for producing quality report.
 The student will start the term paper/independent study report/seminar/minor or major
project report/dissertation while doing his /her NTCC course as per the
prescribed guidelines.

 The students will submit draft report to the guide for guidance. This submission
will help students for making necessary changes in final report as suggested by
the guide.

 Students will submit the final report as per following time lines and formats:
Major Project: By end of seventeenth week of semester. Format for final
project report is attached at Appendix ‘I’. Sample project report is attached at
Appendix ‘J’.
Summer Internship: In second last week of summer training. Format for the
summer internship report is same as at Appendix ‘I’. Sample project report is
attached at Appendix ‘J’.
Minor Project: By end of seventeenth week of the semester in which the
course is to be conducted. Format for the minor project is same as at Appendix
‘I’. Sample project report is attached at Appendix ‘J’.
Dissertation: By end of seventeenth week of semester. Format for dissertation
is attached at Appendix ‘K’. Sample dissertation can be taken from respective
coordinators.
If the NTCC is a term paper/independent study/seminar, the students will
submit a complete paper/study or seminar report (instead of project report) as
per format at Appendix ‘L’ in the twelfth week of semester. Sample is
attached at Appendix ‘M’.
13
 The final report/paper shall be submitted after checking plagiarism through
Turnitin or any other software subscribed by University. Copying material
should not be more than 15% provided source is mentioned in the report along with
proper acknowledgement and referencing as per Plagiarism Prevention Policy of
the University.

 Following will be submitted along with final report,


FPR
NTCC Dairy(in case of minor/major project and dissertation)
Plagiarism Report

 A student will be eligible to submit his/her report and final assessment provided he/she
meets following conditions:
Approval of topic, Synopsis and Project Plan by the guide.
90 % of FPR were submitted.
80% of the FPR were satisfactory.
Similarity index not more than 15 % as per Plagiarism Prevention Policy.

11.REPORT REQUIREMENTS

The final report/paper is important component of all NTCC. Therefore it must adhere to
following parameters (word length, No. of copies, binding type etc.) depending upon the
credit units associated and course objectives.

S. No. of Binding Type Report


No Word length Color Coding
Credit Units Copies Retention Details
.
Up to 1 month of
Up to2Credits Up to 2000 02 copies Plastic None
1 declaration of
words Folder
final result of
semester.

3 to 4 Credits Up to 3000 02 copies Plastic Folder None Up to 1 month of


2
words declaration of
Final result of
semester.

5,000 - 02 with 1 Academic


3 5 to 8 credits Spiral None
7,000 soft copy in Bound session at
words CD. Institution
level.

14
Hard Navy Blue At institution
10,000 - 02 with
4 9 to 15 credit level up to 2
12,000 soft copy in Bound
years.
words CD.
Best project
reports to be
kept for longer
period.
Dark Green Institution
02 with /Central Library
More than 15 12,000 - Hard
5 soft copy in upto 3 Years.
Credits 15,000 Bound
CD. Best project
words
reports to be
kept for longer
period.

Word length will be exclusive of Preface, Copyright Page, Faculty Guide Approval Page,
Acknowledgement, Table of Contents, List of Tables , List of Figures, Certificates etc.

12. STUDENTS NOT MEETING THE ELIGIBILITY CRITERIA


The students who are not eligible to submit the report will re-submit the theses as per the
following guidelines:

Parameter Action

Has not taken the approval of


the topic, synopsis and project Re-do the NTCC
plan from the faculty guide
Penalty in Continuous Internal Assessment
marks as under:
80 - 89% = 10 marks deducted
<90% of FPRs were submitted
75 - <80% = 12 marks deducted
70 -<75% = to be permitted by Vice Chancellor
on recommendations of NTCC Review
Committee with cap of B+ in grading or
deduction of 15 marks from Continuous Internal
Assessment.
<70 % = Re-do
<80-75%= the NTCC
10 marks to be deducted
<80% of the FPRs were <75-70% = to be permitted by Vice Chancellor
satisfactory on recommendations of a committee with cap of
B+ in grading or deduction of 15 marks from
CIA
If in plagiarism report the similarity index is
Similarity index more than 15 %
as per Plagiarism Prevention >15%, the student is required to re-write the
Policy. report / thesis provided he/she meets all the
other criteria.
15
Important:

 The students not meeting the eligibility criteria shall be required to provide detailed
justification for special consideration by the NTCC Review Committee.
 The students re-submitting the thesis due to plagiarism shall be eligible for the grade
provided he/she has submitted same at least 10 days prior to the final assessment of the
batch.
 If the student fails to submit the revised thesis in the prescribed time he/she shall not be
awarded more than B+ grade.
 The students whore-do the NTCC shall be awarded grade not more than B+.

13. PROCEDURE FOR EXAMINATION OF CASES FOR SPECIAL


CONSIDERATION

 To examine the cases for consideration by Vice Chancellor, the NTCC Review Committee
for the Academic Session will be constituted at the University level as per norms
prescribed in the regulations of NTCC.
 The recommendation of HOIs of all such cases after detailed explanation given by
students must be submitted to the COE office at least 10 days prior the final assessment
date for examination to be decided by NTCC Review Committee after consideration by
the Vice Chancellor.

14. FINAL ASSESSMENT

 The final assessment of NTCC need to be done only of those students who have qualified on
the basis of conduct and progress monitoring guidelines &submission of paper/report
/thesis guidelines as stated above.

 The final assessment will be treated as end semester examination. It is mandatory for the
students to appear for final assessment as per scheduled date and time. If a student fails to
appear in the students final assessment as per schedule, he /she will treated as absent.
For such cases same rules will be applicable as those for theory examination.

 The breakup of components of final report assessment for major/minor


project/summer internship will be as under:-
Marks Marks Marks
S. No. Parameter 50 60 70

1 Final Report (with Plagiarism <10%) 15 18 20

2 Presentation 10 15 18

Viva 10
3 12 15
15
Execution/Demonstration etc. 15 17
4
16
 The breakup of components of final term paper/independent study/seminar report
assessment will be as under:-
Marks Marks Marks
S. No. Parameter 50 60 70

Term Paper/Independent
1 Study/Seminar Report (with Plagiarism 20 25 30
<10%)

2 Presentation 15 20 20

Viva 15
3 15 20

 While evaluating the NTCC, institution, faculty guide and board of evaluators will consider
the following aspects:

Institution

– Institutional Project Committee must check the eligibility of all the students before
sending the list to COE.
– Guidelines for the students and board of evaluators must be prepared and approved by
competent authority/Academic Council.
– Only eligible students will be assessed as per the approved list provided by COE &
according to approved guidelines.
– Date of evaluation will be announced by COE on the recommendations of HOI.
– A board comprising 03 members will be constituted. Two faculty members from any of the
Institutions of AUH and one service external expert from Industry/Academia. The faculty
guide will not be a member of the evaluation board for his/her own students.
– The institution will send the budget along with the list of external expert for assessment
board to COE for necessary approval as per the University regulations and Guidelines.
– The assessment guide lines must be provided to evaluators.
– The format for evaluation will be provided along with the list of students, for each
evaluator.
– The duly signed evaluation sheets along with attendance sheets and print out of
consolidated marks from Amizone will be submitted on same day.
– Faculty guide/any other member of the institution will not try to influence the board of
evaluators for favoring/punishing any student appearing for final assessment.

Board of Evaluators:

– The board of evaluators will assess the eligible students only as per the prescribed
guidelines and assessment sheets.
– The evaluation will be done separately by each evaluator and duly signed copy of same will
be submitted before leaving the evaluation room.

17
Observer

– COE will appoint an observer and submit the report as per the regulations of the
University.

15. IMPROVEMENT OF SCORES &GRADE

The students shall be allowed to improve his /her Score/Grade as under:

 The student who has satisfactory score in the CIA of NTCC but failed in final assessment,
may be allowed to re-do the NTCC again. The student shall not be given grade more than
B+.
 The student who has passed in semester but failed in NTCC where semester has both
NTCC and other subjects, the student may be allowed to re-do the NTCC again. The
student shall not be given grade more than B+.
 The student shall apply to repeat the NTCC to his HOI with in fifteen days of result
declaration.
 HOI shall send the recommendation to COE for NTCC Review Committee for approval
of Vice Chancellor.
 The student shall repeat NTCC in corresponding semester or immediately after the
final semester result declaration or during extended period. The students shall
register for the NTCC course as per the University guidelines.
 The students shall complete the mandatory time required for the course. The date of
registration, submission of Continuous Internal Assessment, final report and final
assessment of NTCC shall be announced by COE along with block examination
calendar and with supplementary examinations.
 The student shall do the NTCC on a new topic and shall be assigned the faculty guide as
per the guide lines.
 The progress monitoring, continuous assessment, submission of report and final
assessment shall be done as per the guidelines. The previous marks of Continuous
Internal Assessment shall be treated as NULL and VOID once the new Continuous
Internal Assessment is submitted by the Institution for new NTCC.

16. COURSE-WISE DETAILED GUIDELINES – DOMAIN–WISE / INSTITUTION-WISE

Departments must develop detailed guidelines for each NTCC being conducted for the students as
per regulations and general guidelines of the University and the dependent school/institution.
Suggested Content List for a NTCC guide lines to be prepared may include:

 Introduction
 Definition
 Course Objectives
 Student Learning Objectives (SLOs)
 Briefing Session
 Finalizations and approval of area / topic of NTCC and schedule of activities
 Allocation of Faculty Guides
 Role and expectations of Faculty Guides and External Guides
Frequency of meetings and contact time (face to face and virtual)
Nature of tutorials / briefing sessions / gap lectures
18
Check list for NTCC
 Role and expectations of students
Responsibility for attending meetings
Details about supervision log /record
Check list for NTCC
 Structure of NTCC, Registration, Conduct of course, progress monitoring and activity
calendar
Registration and Conduct of the course,
Progress monitoring (weekly by faculty guide and Periodically by Institutional
Project Committee / Project Review Committee)
Assessment components & tools for Learning Out comes
 Assessment components and tools for learning outcomes.
Assessment criteria
Weighting of various components
Assessment plan and schedule
 Disciplines, Ethical issues and Plagiarism
 Quality of work
 Guidelines for writing the Reports / Term paper / Project /Dissertation etc.
 Standard formats to be used
 Make –up policy
 NTCC Activities Calendar

************

19
Appendix-A
AMITY SCHOOL OF ENGINEERING & TECHNOLOGY
Non-Teaching Credit Course Details
1. Student’s Particulars

a) Enrl. No. ______________ b) Student’s Name _________________________


c) Progamme _____________ d) Semester________ e)Mobile:__________________
f) E-mail: _________________________________

2 Type of Non Teaching Course

Summer Internship / Minor Project / Term Paper / Independent Study / Major Project / Seminar / Workshop

________________________________________________________________________________

3. Topic for the NTCC

___________________________________________________________________________________

4. Brief summary of the NTCC (Not more than 100 words)

_________________________________________________________________________________________________
_________________________________________________________________________________________________
_________________________________________________________________________________________________
_________________________________________________________________________________________________
_________________________________________________________________________________________________
_________________________________________________________________________________________________
_________________________________________________________________________________________________
_________________________________________________________________________________

5. If NTCC is Summer Training furnish following details:


a) Duration from ______________ to ____________
b) Industry particular with location ____________________________

6. For Summer Internship / Major Project, working in a group, specify the Details of Team Members:-

S.No. Enrollment No. Name Programme

7. Details of Guides
a) Faculty Guide _______________________ b) Industry Guide (if applicable)__________________

_____________________ _____________________ ____________________

Signature of the Student Signature of the Faculty Guide Signature of the HOD

20
SYNOPSIS FORMAT Appendix-B

SYNOPSIS OF SUMMER INTERNSHIP/MAJOR/MINOR


PROJECT

Title of Project

Bachelor of Engineering
In
Computer Science and Engineering

Proposed By

Student(s) Name
Enrollment No.

Under the guidance of

Name of Supervisor Name of Co-Supervisor

Department of Computer Science & Engineering


Amity School of Engineering & Technology
Amity University Haryana

21
SYNOPSIS MUST BE PREPARED UNDER THE FOLLOWING HEADINGS

1. Aims and Objective of the Project (1 page)

2. Background Study (2 pages)

3. Methodology/ Planning of work (1 page)

4. Tools and Techniques to be used (1 page)

5. Proposed work

6. References

SPECIFICATIONS FOR SYNOPSIS

1. The synopsis shall be computer typed (Font -Times Roman, Size-12 point for normal text and Times Roman, Size-14
point, Bold for headings) and printed on A4 size paper.

2. The Synopsis shall be typed on one side only with double space with a margin 3.5 cm on the left, 2.5 cm on the top,
and 1.25 cm on the right and at bottom.

3. The diagrams should be printed on a light/white background.

4. Tabular matter should be clearly arranged.

5. The caption for Figure must be given at the BOTTOM of the Figure and Caption for the Table
must be given at the TOP of the Table.

6. The Template of the cover page is the first page of this document.

22
SAMPLE SYNOPSIS Appendix-C

SYNOPSIS FOR SUMMER INTERNSHIP/MINOR/MAJOR


PROJECT

Advanced Encryption Techniques

Bachelor of Engineering
In
Computer Science and Engineering

Proposed By

ROHIT ARORA

Enrollment No. A2300911011

Under the guidance of


Mr Harish Gupta Ms. RekhaTripathi

Department of Computer Science & Engineering


Amity School of Engineering & Technology
Amity University Haryana

23
AIM AND OBJECTIVE OF THE PROJECT

“Advanced Encryption Technique” as a working system involves a service provider and an encryption system
application. Service provider accepts the payments and provides the downloadable application and a unique key.Term
“random selection” of algorithm refers to the selection of implementing algorithm in such a way that even the user is not
going to know about the algorithm used , while his motive of encryption is fulfilled in a efficient way.Manual mode of
operation provides the feature of intended selection of algorithm if user wishes to use particular encryption algorithm.The
whole system application is provided through a web server application which accepts the payments for purchasing the
software.As security feature is such an essence for any communication over any network and encryption is one of the
security issues, cryptanalysis is performed for breaking the algorithm as analyst try for guessing the key or for getting the
plaintext.In “Advanced Encryption Technique” random selection of encryption algorithm makes “cryptanalysis task
more complex”, as firstly analyst will have to get knowledge of selected algorithm which is selected by “Randomization
Function” for encryption.“Randomization function” makes the system unique in its class applications and makes it stand
apart from all traditional encryption systems.
The project can be used by any user who wants to encrypt any important message or any other information. This project
provides an easy to use GUI for encrypt and decrypt documents. It improves the security of documents.
The main objective of this project is to enable all the security services. Such as-
 Authentication: the assurance that the communicating entity is the one that it claims to be.

 Access control: the prevention of unauthorized use of a resource.

 Data confidentiality: the protection of data from third party.

 Data integrity: the assurance that data received are exactly as sent by an authorized entity.

It is password protected, so that only authenticated user can encrypt and decrypt the data

24
BACKGROUND STUDY
Encryption is one of the essential issues of communication security over any network, in conventional systems like:
algorithm hubs, the selection of algorithm for performing encryption is manual or static. Manually selection based
systems are not capable to be implemented in real world environment as such system just provides a simulation of
algorithms or a prototyping of real world systems.Such systems provide first thought for the development of “advance
encryption system”.Static or single algorithm based systems which hardly relates with the real world implementation, this
deficiency also boost the existence of the “advance encryption technique.
As more complex encryption algorithms are in trend as they have their own security .Length of encryption key is the
basic security feature of any algorithm, as the long key used, the possibility of number of existing key also increases.
Eg:- suppose any algorithm uses a 56 bit key then there exists 2^56 keys this feature is the soul security feature, but in
“advance encryption technique” the task of algorithm selection makes cryptanalysis a more complex risk.
In traditional systems user or agents encrypts the data with single algorithm rather the algorithm may be complex, and
such encryption systems can be thought as static encryption system.
While in “advance encryption technique” uses an idea of algo hub implementation but the selection of algorithm is based
on decision function which is implemented with the randomization functions of java.
Number of algorithms is implemented in an algorithm chamber while there exists a decision chamber which provides a
random selection of algorithms.
Basic idea for this project is strong encryption and decryption with a unique feature of randomization decision function.
This system provides an over come from the lagging features of traditional algo hubs and static encryption.

1. Dynamic selection concept:


The dynamic selection concept boosts the probability of standing up the whole “advance encryption system”. Dynamic
mode provides the randomize selection of algorithms.
The whole system works on the basic concept of algo selection but the feature of selection is new and enhanced one.
As a whole system is originated from the concept of the algo hub and it also covers this concept too in its manual mode
of operation.

25
METHODOLOGY

Decision function:
Decision function is the unique module of the advance encryption technique” which provides the randomize selection of
working algorithm. Decision function interacts with algo chamber and makes an algorithm in work.
Working of Decision function based on the random classes of java development tool.
Decision function will generate an integer value and match then against the algorithms assigned values, as the values
matched one of the working algorithms get in function.

Working:
The “decision function” accepts a string as an input, and then generates and integer number on bases of that string and
that integer works as base for selection of working algorithm. The generation of integer from a string works with the help
of RANDOM generation of number.

26
TOOLS AND TECHNIQUES TO BE USED

The main technologies used are:


 Java (AWT, JDBC Connectivity, Java Server Pages, Servlets)
 TOMCAT server
 HTML
 JavaScript

The hardware and software requirements for the project are:-

Hardware configuration:
Processor: 1.3 GHz.
RAM: 128 MB
Free Space required on hard disk: 10 MB

Software requirement:
Web server with jre 1.6 properties (apache tomcat 6.0.1)
Java2 development kit (1.6.0 former edition as a minimal requirement)
Java standard tag library (jsp pages deployment)

27
PROPOSED WORK
“Advance encryption technique” provides the encryption and decryption operation to an authenticated person, with two
operational modes and enriched with the feature of message digest creation.
“Advance encryption technique” there exists a randomization of algorithm selection for encryption and decryption as
well as manual selection of algorithm for encryption and decryption.
User can use any mode for encryption and decryption as his/her convenience. This system provides a password
protection security feature.
Cryptanalysis is more complicated as one will have known that which algorithm is used for encrypt.
The data, then one may go for cryptanalysis.
 Due to randomization Cryptanalysis is more complicated.

 System is user friendly and easy to work with.

 Provides user friendly interface.

 Provides flexibility.

28
REFERENCES

Books referred:
1. “Computer and networks security” by William Stallings.

2. “Concepts of Java” head first

3. “Software Engineering” by S.Pressman

4. “A Complete Reference” J2SE

5. Java articles by, Doug Baldwin

6. “Java server pages” by Hens Bergeson

Web sites referred:


1. www.security-fourm.com

2. www.gogetpapers.com

3. www.Java2s.com

4. www.google.com

5. www.vogella .de

6. www.mycrypto.net

29
Appendix-D
TERM PAPER/INDEPENDENT STUDY/SEMINAR ABSTRACT
GUIDELINES AND SAMPLE

i) Topic for the term paper/independent study/seminar

____________________________________________________________________________

ii) Abstract (Not more than 150 words)


____________________________________________________________________________________
____________________________________________________________________________________

ABSTRACT GUIDELINES
1. An abstract is a self-contained, short, and powerful statement that describes a larger work.
Components vary according to discipline. An abstract of a scientific work will contain the scope,
purpose, and contents of the work. Hence, it briefly states the essential information of a paper/study.

2. Start off your abstract by answering one or all of the following:


 Why did you decide to do this study?
 Why is this study important?

3. If your topic is about something well-known enough, you can reference the names of people or
places that your paper focuses on.

SPECIFICATIONS FOR ABSTRACT

The abstract shall be computer typed (Font -Times Roman, Size-12 point for normal text and Times
Roman, Size-14 point, Bold for headings) and printed on A4 size paper.

SAMPLE ABSTRACT

Computer system is a tool for processing many applications. Computer installation management
should know the performance all the time in order to tune and upgrade the system which will provide
high performance of the system for users. The objective of this paper is to study parameters selection
for a computer system performance evaluation. The study rightly deals with system data statistics
which involve in the activies of computer system, Bank for Agriculture and Agricultural
Cooperatives (BAAC), with NOS/VE operating system. The important part of the paper is to study
the hardware and software configuration, emphasizing on operating system, and the kinds of system
data including analysis of the statistic data. Performance parameters such as system attributes,
memory attributes, scheduling attributes and system bottleneck which involve with CPU, memory
and disk I/O were studied. The system activity data for analyzing CPU, memory and disk I/O
performance were collected and used to study system behaviour. The observations/conclusion from
the study/paper provides parameters selection for improvement of system bottleneck and parameters
for tuning BAAC's computer system.

30
Appendix-E

SAMPLE GANTT CHART TO DEPICT MAJOR/MINOR PROJECT PLANNING

Sample Gantt Chart to depict Major/Minor Project Planning Appendix-E

Task Start Date Duration(in Days)


End Date
Preliminary Investigation/
Literture Review 1-Jan-15 20 20-Jan-15
Synopsis Preparation 21-Jan-15 5 25-Jan-15
Methodology 26-Jan-15 6 31-Jan-15
Data Collection/Analysis 1-Feb-15 10 10-Feb-15
Design 11-Feb-15 20 3-Mar-15
Coding 3-Mar-15 30 4-Apr-15
Draft of Project Report 2-Apr-15 15 17-Apr-15
Testing/ Implementation 18-Apr-15 15 5-May-15
Final Project Report 3-May-15 15 22-May-15
1/1/15 16/1/15 31/1/15 15/2/15 2/3/15 17/3/15 1/4/15 16/4/15 1/5/15 16/5/15 31/5/15

Preliminary Investigation/ Literture Review 20 Days

Synopsis Preparation 5

Methodology 6

Data Collection/Analysis 10
Duration(in
Design 20
Days)
Coding 30

Draft of Project Report 15

Testing/ Implementation 15

Final Project Report 15

31
Appendix-F

SAMPLE GANTT CHART TO DEPICT INDEPENDENT STUDY/TERM PAPER/SEMINAR


PLANNING

Sample Gantt Chart to depict planning for Independent Study/Term


Paper/Seminar Appendix-F

Task Start Date Duration(in Days)


End Date
Choosing a Subject 1-Jan-15 20 20-Jan-15

Finding Sources of Materials 21-Jan-15 5 25-Jan-15


Collecting the Notes 26-Jan-15 6 31-Jan-15
Outlining the report 1-Feb-15 10 10-Feb-15
Writing the Draft Paper 11-Feb-15 20 3-Mar-15
Editing & Preparing the
Final Paper 3-Mar-15 30 4-Apr-15
1/1/15 16/1/15 31/1/15 15/2/15 2/3/15 17/3/15 1/4/15 16/4/15

Choosing a Subject 20 Days

Finding Sources of Materials 5

Collecting the Notes 6


Duration(in
Days)
Outlining the report 10

Writing the Draft Paper 20

Editing & Preparing the Final Paper 30

32
Appendix-G

AMITY SCHOOL OF ENGINEERING & TECHNOLOGY


Fortnightly Progress Report (FPR)

1) For the Period commencing: ___/____/____ to _____/_____/____

2) Programme: ________________ Semester:_____

3) Student Name : _________________________

4) Enrolment Number: _________________________

5) Company Name(in case of major or minor project): ______________

6) Faculty/Industry Guide’s Name: ____________________________________

7) Name of Team Members (if working in groups):

Enrolment Name Programme/Semester


Number

8) Title of the NTCC Course-------------------------------------------------------

9) Tasks Completed (e.g. Data Collection, Papers Reviewed, Methodology etc. Components for
final assessment from guidelines)

-----------------------------------------------------------------------------------------

10) Targets till next meeting

------------------------------------------------------------------------------------------

11) Remarks of Faculty Guide

------------------------------------------------------------------------------------------

Faculty Guide Signature

33
Appendix-H
AMITY SCHOOL OF ENGINEERING & TECHNOLOGY
Student/Faculty Interaction Record
Student’s Name ___________________ Enrl. No. ______________ Progamme_____________

Semester________ Guide Name:_______________________

S.No. Date and Discussion Points Tasks Assigned Guide


Time Signature

34
Appendix- I
MAJOR/MINOR PROJECT GUIDELINES AND FORMAT

A Project Report is a documentation of an Under Graduate/Post Graduate student’s research work, a


record of the original work done by the student. It provides information on the student’s research
work to the future researchers. The Department shall preserve a proper copy of the student’s report,
making it available to others for academic purpose. The three basic criteria for an acceptable form of
a report are standardization, readability and conformance to ethical norms.

The objective of this document is to provide a set of guidelines that help a student to prepare the
report help you to turn your research work in a professional document.

It is recommended that you meet your guide regularly during the course of the project, and maintain
a record of your discussions with your Guide, and of literature survey details, derivations etc. Such a
system will allow easy and quick access to the details and the order of your work. Remember, the
final responsibility for producing an error-free report lies with you, and not your Supervisor(s).

Please read the guidelines carefully and make sure your Project report strictly conforms to
specifications. What you are writing is a professional document.

This document is organized under the following headings:


1. Project Report Organization
2. Production of Project Report
3. Format of Project Report
4. Evaluation

1. Project Report Organization


The Project report must be organized as follows. Format for few report pages is given after these
guidelines:

1.1 Title of the Report


The title of the report should remain same as that given in the synopsis.

1.2 Title Page


The title page should be similar to the cover page but should contain a few additional items. This
page will not only bear the title of the report and the candidate’s name, but also the name of the
degree for which the report is submitted, the name of the Institute, month and year of submission of
the report.

1.3 Declaration by the Students


This is page number (i), the beginning of the small case Roman numeral page numbers. The student
has to give a declaration to the effect that the data used for the work, the work depicted in the report,
and the written material contained in the report are not copied from others and that due permission
has been taken from, and due credit has been given to, the sources whenever they are used.

35
1.4 Certificate
This is page number (ii). The certificate will be signed by the Faculty Supervisor(s) before the viva-
voce after verifying the format and by the Head of the Department after review with the
Supervisor(s).

1.5 Acknowledgements
This is page number (iii). Keep this brief and avoid using informal language. This page must be
signed by the candidate.

1.6 Abstract and Keywords


This is page number (iv). The abstract (preferably one page) should contain the context/relevance of
the problem at hand, a description of what was done and a gist of the significant observations/results.
The keywords (maximum 6) are a hint that what is contained in the report.

1.7 Contents
This is page number (v). The table of Contents should be titled just Contents (not Table of Contents).
Try to fit it into one or two pages.

1.8 List of Figures and List of Tables


Use separate pages for list of figures and list of tables. . Each list should give, in tabular form, the
figure or table number, its title/caption and its page number.

1.9 Nomenclature and Abbreviations


All symbols that appear in the report should be listed alphabetically. First give all Roman symbols,
then Greek symbols.

1.10 List of Acronyms and Standards

1.11 The Chapters


Each chapter should begin with an Introduction and end with a Conclusion (a summing up) and,
where applicable, a lead-in to the next chapter. The page on which chapter 1 starts is page 1. One
chapter should follow immediately after another. Do not use an intervening blank or title page
between chapters.
Each of the other chapters will have a precise title reflecting the contents of the chapter. A chapter
can be subdivided into sections, subsections and sub subsection so as to present the content discretely
and with due emphasis.

1.12 References
Number all the references. Use a chronological ordering for referencing. Each listed reference must
be cited in the text of the report. IEEE style is recommended.

1.13 Appendices.
Number the Appendices A, B, etc. Figures, tables and equations in an appendix are numbered as in
the case of a chapter with the appendix letter taking the place of the chapter number.
36
2. Production of Project Report
2.1 Report Size
The maximum number of pages of the Report should be preferably between 50-80 pages.

2.2 Paper Size


The standard size of paper of a Report is A4. Bond paper must be used for printing the report.

2.3 Single-Sided Printing


It is suggested that the report be printed on one side of the paper.

2.4 Non-Paper Material


Digital or magnetic materials, such as CDs and DVDs, may be included in the report. They have to
be given in a closed pocket in the inside of the back cover page of the report. All non-paper materials
must have a label each indicating the name of the student and the date of submission.

2.5 Binding
First submit a spiral bound report to your supervisor(s) for checking and after getting it checked the
final report must be hard bound. Refer NTCC guidelines for colour coding scheme. Three copies of
hard bound report must be submitted to the department. The degree, the name of the candidate and
the year of submission shall also be embossed on the bound (side) in gold.

3. Format of Project Report


After the text of the report is written, it is to be formatted in an appropriate manner for printing. The
following guidelines are provided to format the report for easy readability.

3.1 Font
For normal text Font Type and Size must be- Times New Roman, 12 pt. The minimum font size of
materials within a table or a figure can be 10 point.

3.2 Margins
A margin of 3.75 cm (1½ inch) is to be given on the binding edge while on the other sides it is to be
2.5 cm (1 inch). The text of the report, including headings, figures, tables, and notes, but excluding
page numbers, must be accommodated within the page area.

3.3 Line Spacing


The line spacing in the main text must be between one-and-a-half (1.5). Single line spacing should be
given for figure captions, table titles, figure legends, and footnotes. Equations, tables, figures, and
quotations should be set off from the main text with adequate space (not less than the normal line
spacing adopted for the main text). Two consecutive paragraphs should be separated by a spacing
which must be larger than the line spacing adopted for the text.

3.4 Tables and Figures


Each sketch, drawing, graph and photograph should have a figure number and title below the figure
etc. Numbering should be sequential, chapter wise. For instance, if there are 24 figures chapter 3
spread over all of its sections the figure numbers run from Figure 3.1 through Figure 3.24. In figures
experimental data should typically be represented by centered symbols, and theoretical data by
continuous curves.

37
Each table should have a table number and caption above the table. Numbering should be sequential,
chapter wise, as in the case of Figure numbers. For instance, if there are 18 tables in chapter 3 the
table numbers run from Figure 3.1 through Figure 3.18.

Make sure that figures and tables are complete in other respects such as legends, references (if any)
and coordinate labels with units. Each figure and table must be explicitly referred to in the text and
located where its first reference occurs, preferably after the reference.

3.5 Drawings
All engineering drawings must conform to relevant Standards and should include a title block. If
drawings are large they should be included at the back of the report in a separate pocket. In case
drawings are made using CAD packages, a CD ROM should be included which contains all the files
and details of the packages used.

3.6 Equations
The numbering of equations should be sequential, chapter wise. Numbered equations must be
explicitly referred to in the text.

3.7 SI
Make sure proper units, SI as far as possible, appear wherever required.

4. Evaluation
4.1 Department Evaluation Committee (DEC):
 DEC should go through NTCC guidelines.
 This committee will be responsible for evaluating the timely progress of the Project and
communicating the progress report to the students.
 In the starting of Final Year (VIII semester for Under Graduate and VI semester for Post
Graduate) the Department Evaluation Committee should take the list of projects proposed by
the students along with concerned supervisor's name.
 After finding that the proposed projects are up to the mark they may be approved by the DEC
and should forward the list to NTCC committee of their department.
 In case it is observed by the DEC that any group of students is not performing well, this
committee should take special care to improve their performance by means of counselling
them.
It is the responsibility of the Department to provide the Supervisor(s) for each B. Tech /MCA
Project. Supervisors may be assigned to each candidate either by the choice of candidate or by
faculty expertise.
 The supervisor must monitor the progress being carried out by the candidate on regular basis.
 In case it is found that progress is unsatisfactory it should be reported to the Department
Evaluation Committee for necessary action.
 It is expected that the supervisor looks into the Project report for desired format before the
final submission.
4.2 Evaluation Procedure:
Continuous Evaluation: Refer NTCC guidelines for continuous evaluation.
Final Evaluation: Refer NTCC guidelines for final evaluation

38
Title of Project

Project

submitted in partial fulfillment of the requirement for


the award of the degree of

Bachelor of Technology

In

Computer Science and Engineering

By

Name of student
Enroll. No.

Under the guidance of

Name of Supervisor Name of Co-Supervisor


Designation Designation

Department of Computer Science and Engineering


Amity School of Engineering and Technology
Amity University Haryana
Gurgaon, India
June, 20__

39
Department of Computer Science and Engineering
Amity School of Engineering and Technology

Declaration

I, Name(s) of candidate, Enroll. No. , student of Bachelor of Technology (or Master of


Computer Applications) in Department of Computer Science and Engineering, Amity School of
Engineering and Technology, Amity University Haryana, hereby declare that I am fully
responsible for the information and results provided in this project report titled “Title of
Project”submitted Department of Computer Science and Engineering, Amity School of
Engineering and Technology, Amity University Haryana, Gurgaon for the partial fulfilment of
the requirement for the award of the degree of Bachelor of Technology in Computer Science
and Engineering. I have taken care in all respects to honour the intellectual property rights and
have acknowledged the contributions of others for using them. I further declare that in case of
any violation of intellectual property rights or copyrights, I as a candidate will be fully
responsible for the same. My supervisor, Head of department and the Institute should not be held
for full or partial violation of copyrights if found at any stage of my degree.

Signature(s)

Name(s) of Candidate
Enroll No.

40
Department of Computer Science and Engineering
Amity School of Engineering and Technology

Certificate

This is to certify that the work in the project report entitled “Title of project” by Name(s) of
candidate bearing Enroll. No.is a bonafide record of project work carried out by him under my
supervision and guidance in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology in Computer Science and Engineering in the Department of Computer
Science and Engineering, Amity School of Engineering and Technology, Amity University
Haryana, Gurgaon. Neither this project nor any part of it has been submitted for anydegree or
academic award elsewhere.

Signature of Supervisor(s)

Date: Name & Designation

Head
Department of Computer Science & Engineering
Amity School of Engineering and Technology
Amity University Haryana, Gurgaon

41
Contents(Times New Roman, 24 Pts.)
Declaration i
Certificate ii
Acknowledgement iii
Abstract iv
List of Figures v
List of Tables vi
1. Introduction 1
1.1 . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..
1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . .. . . .. . . .
1.3. . . .. . . .. . . .. . . .. . . .. . . .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . . . . . . . . . . .
1.5. . . .. . . .. . . ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.1 . . . .. . . .. . . .. . . .. . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.2. . . .. . . .. . . .. . . .. . . .. . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.3. . . .. . . .. . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2. Literature Review and Problem Definition
3. Design and Implementation
4. Experimentation
5. Discussion of Results
6. Conclusion and Future Prospects
References
Appendix A
Appendix B
Appendix C

42
Chapter 1
( Chapter No: Times New Roman, 18 Pts.)

INTRODUCTION
( Chapter Name: Times New Roman, CAPS, 18 Pts., Bold)

1.1 Heading

( Main Heading: Times New Roman, 16 Pts., Bold)

1.1.1 Sub-Heading

( Sub- Heading: Times New Roman, 14 Pts., Bold)

1.1.1 (a) Subsections under Sub-Heading

( Sub- Sections: Times New Roman, 14 Pts., Italics)

Note: All formats above and sample project given below need minor changes for MCA,
BCA and B.Sc. students (like Amity School of Engineering and Technology should be
changed to Amity School of Information Technology).

43
BIBLIOGRAPHY/REFERENCES (16 bold, caps)
Leave 1½” space from the top edge and 2 blank lines after the title. Page numbering is a
continuation of preceding material. References should be in chronological order.

[23] Prasad, A.B., Kumar, C.D., Jones, E.F., and Frost, P.: “Cable Television Broadband
Architectures”, IEEE Comm. Magazine, vol. 39, pp. 134-141, June 1991.
[24] Dutta-Roy, A.: “An Overview of Cable Modem Technology Perspectives”, IEEE
Computer Magazine, vol. 25, pp. 44-54, Sept. 1992.
[25] Dean, A.K., Efficient Real-Time Fine-Grained Concurrency, 3rd Ed., Ch. 3, pp. 145-
7, Tata McGraw-Hill, New Delhi, 1994.
[26] Mayhew, L., and Krishnan, M.: “PCI Express and Advanced Switching in
Interconnects”, Proc. 11th Symp. on High Perf. Interconnects IEEE, pp. 21-29, Aug.
2003.
[27] …

44
Appendix-J
SAMPLE PROJECT REPORT

A project on

“Advanced Encryption Techniques”

submitted in partial fulfilment of the requirements


for the award of the degree of

Bachelors of Technology
in
Computer Science and Engineering

Submitted by:
ROHIT ARORA
Enroll No.A2300911011

Under the guidance of


Mr. HARISH GUPTA
Assistant Professor
CSE department

Department of Computer Science &Engineering


Amity School of Engineering & Technology
AMITY UNIVERSITY GURGAON, HARYANA
June 201…

45
Department of Computer Science and Engineering
Amity School of Engineering and Technology

DECLARATION

I, RohitArora, student of B.Tech (Computer Science &Engineering) hereby declare


that the project entitled “ADVANCED ENCRYPTION TECHNIQUES” which is
submitted by us to department of Computer Science & Engineering, Amity School of
Engineering & Technology, Amity University Haryana, in partial fulfillment of the
requirement for the award of the degree of Bachelors of Technology in Computer
Science & Engineering, has not been previously formed the basis for the award of
any degree, diploma or other similar title or recognition.

Haryana

Date: ROHIT ARORA

46
Department of Computer Science and Engineering
Amity School of Engineering and Technology

CERTIFICATE
This is to certify that ROHIT ARORA (Enrollment N0. A2300911011), student of
B.Tech(C.S.E) III semester, Department of Computer Science & Engineering, ASET, Amity
University Haryana, has done his Integrated Project entitled “ADVANCED ENCRYPTION
TECHNIQUES” under my guidance and supervision during “January 201…-June 201…”

The work was satisfactory. He has shown complete dedication and devotion to the given project
work.

Signature of Supervisor(s)

Date:
(MR HARISH GUPTA)
Assistant Professor
Computer Science & Engineering
ASET, Amity University, Haryana

Head
Department of Computer Science & Engineering
Amity School of Engineering and Technology
Amity University Haryana, Gurgaon

47
ABSTRACT
“Advanced Encryption Technique” as a working system involves a service provider and an
encryption system application. Service provider accepts the payments and provides the
downloadable application and a unique key.Term “random selection” of algorithm refers to the
selection of implementing algorithm in such a way that even the user is not going to know about
the algorithm used , while his motive of encryption is fulfilled in a efficient way.Manual mode
of operation provides the feature of intended selection of algorithm if user wishes to use
particular encryption algorithm. The whole system application is provided through a web server
application which accepts the payments for purchasing the software. As security feature is such
an essence for any communication over any network and encryption is one of the security issues,
cryptanalysis is performed for breaking the algorithm as analyst try for guessing the key or for
getting the plaintext. In “Advanced Encryption Technique” random selection of encryption
algorithm makes “cryptanalysis task more complex”, as firstly analyst will have to get knowledge
of selected algorithm which is selected by “Randomization Function” for
encryption.“Randomization function” makes the system unique in its class applications and
makes it stand apart from all traditional encryption systems.

48
LIST OF FIGURES
Figure 1 DFD Level 0
Figure 2 DFD Level 1
Figure 3 DFD Level 2
Figure 4 Entity Relationship Diagram
Figure 5(a),5(b) Working structure of decision function
Figure 6 DES Working
Figure 7 Block diagram for TDES
Figure 8 Fiestal structure for BlowFish
Figure 9 Screenshot for first page of AET
Figure 10 Screenshot for Registration form
Figure 11 (a), 11(b) Screenshot for Purchase page
Figure 12 Screenshot for credit card information
Figure 13 Screenshot for purchase key
Figure 14 Screenshot for generate key
Figure 15 Screenshot for home page for AET
Figure 16(a) Screenshot for login page
Figure 16(b) Screenshot for login page and key entry
Figure 17 Screenshot for registration page
Figure 18 Screenshot for AET Mode selection window
Figure 19 Screenshot for Algorithm selection mode
Figure 20 Screenshot for Dynamic mode window

49
Contents
Declaration i
Certificate ii
Acknowledgement iii
Abstract iv
List of Figures v
List of Tables vi
1. INTRODUCTION 1
1.1 Objective 1
1.2 Current system 2
1.3 Proposed system 3
2. BACKGROUND OF PROJECT 6

2.1 Dynamic selection concept 7

3. TECHNOLOGIES USED 7

3.1. Java 7

3.1.1. AWT 8

3.1.2. JDBC 9

3.2JSP and Servlets 9

3.2.1. Tomcat server 11

3.3. Html 12

4. DESIGN OF PROJECT 15

4.1 Hardware requirement 15


4.2 Software requirement 15
4.3 Software requirement (client end) 15
4.3 Data flow diagram 16
4.3.1 0 level DFD 16
4.3.2 1 level DFD 17
4.3.3 2 level DFD 18
4.4 Entity relationship diagram 19
4.5 Working structure of decision box 20

50
4.5.1 Working of decision function 21
4.6 List of modules 22
4.6.1 List of modules of application 22
4.6.2 List of modules of service provider 22

5. IMPLEMENTATION 23

5.1 Decision function block 23

5.2 XOR Based encryption 23

5.3 DES 24

5.4 Triple DES 26

5.5 Blowfish 28

5.6 MD5 (message digest algo) 30

6. SCREEN SHOTS 31

7. SCOPE OF THE PROJECT 47

8. CONCLUSION 48

9. REFERENCES 49

APPENDIX 50

51
Chapter 1

INTRODUCTION
Before beginning, we define some terms. An original message is known as the plaintext, while
the encoded message is called the cipher text. The process of converting from plain text to cipher
text is known as the encryption; restoring the plain text from the cipher text is decryption. The
many encryptions constitute the area of study known as cryptography. Technique used for
deciphering a message without any knowledge of the enciphering details fall into the area of
cryptanalysis.

 “Advance encryption technique” has been developed to automate the task involved in
encryption and decryption of any message or any other important information with
enhanced security concept. There are two modes in AET:-

 Manual mode

 Dynamic mode

In manual mode user selects one algorithm from given algorithms for encryption and
decryption but in dynamic mode random selection of algorithm occurs for encryption and
decryption.
 It also provide two other features:

1. Message digest

2. Crypt information.

 To use AET, first of all users has to register itself on service provider which provides AET
to users and has to purchase AET and a valid key to use the AET.

 Using “Dynamic mode” even the user will not know that with which algorithm his data is
going to be encrypted as he/she only knows the encryption password.

52
1.1 Objective

The project can be used by any user who wants to encrypt any important message or any other
information. This project provides an easy to use GUI for encrypt and decrypt documents. It
improves the security of documents.
The main objective of this project is to enable all the security services. Such as-
 Authentication: the assurance that the communicating entity is the one that it claims to
be.

 Access control: the prevention of unauthorized use of a resource.

 Data confidentiality: the protection of data from third party.

 Data integrity: theassurance that data received are exactly as sent by an authorized entity.

It is password protected, so that only authenticated user can encrypt and decrypt the data.

1.2 Current System


Current system uses a static way of encryption or decryption. Certain fixed encryption algorithms
are used for encryption or decryption. Most
E.g.: suppose there is a user “x” using algorithms “y” for encrypt his data and if anyone knows
the used algorithm then he will go for cryptanalysis by different methods.
In following ways current system is lagging-
 Current system is inefficient.

 No password protection.

 Data is not fully secured.

 Integrity is less.

 Current system has time consuming processes.

 Current system works on static methods.

53
1.3 Proposed System
“Advance encryption technique” provides the encryption and decryption operation to an authenticated person, with
two operational modes and enriched with the feature of message digest creation.
“Advance encryption technique” there exists a randomization of algorithm selection for encryption and decryption
as well as manual selection of algorithm for encryption and decryption.
User can use any mode for encryption and decryption as his/her convenience. This system provides a password
protection security feature.
Cryptanalysis is more complicated as one will have known that which algorithm is used for encrypt.
The data, then one may go for cryptanalysis.
 Due to randomization Cryptanalysis is more complicated.

 System is user friendly and easy to work with.

 Provides user friendly interface.

 Provides flexibility.

54
Chapter 2
BACKGROUND OF PROJECT
Encryption is one of the essential issues of communication security over any network, in
conventional systems like: algorithm hubs, the selection of algorithm for performing encryption
is manual or static.
Manually selection based systems are not capable to be implemented in real world environment
as such system just provides a simulation of algorithms or a prototyping of real world systems.
Such systems provide first thought for the development of “advance encryption system”.
Static or single algorithm based systems which hardly relates with the real world implementation,
this deficiency also boost the existence of the “advance encryption technique.
As more complex encryption algorithms are in trend as they have their own security .Length of
encryption key is the basic security feature of any algorithm, as the long key used, the possibility
of number of existing key also increases.
In traditional systems user or agents encrypts the data with single algorithm rather the algorithm
may be complex, and such encryption systems can be thought as static encryption system.
While in “advance encryption technique” uses an idea of algo hub implementation but the
selection of algorithm is based on decision function which is implemented with the
randomization functions of java.
Number of algorithms is implemented in an algorithm chamber while there exists a decision
chamber which provides a random selection of algorithms.
Basic idea for this project is strong encryption and decryption with a unique feature of
randomization decision function. This system provides an over come from the lagging features
of traditional algo hubs and static encryption.

2.1 Dynamic selection concept:


The dynamic selection concept boosts the probability of standing up the whole “advance
encryption system”. Dynamic mode provides the randomize selection of algorithms.
The whole system works on the basic concept of algo selection but the feature of selection is new
and enhanced one. As a whole system is originated from the concept of the algo hub and it also
covers this concept too in its manual mode of operation.

55
CHAPTER 3
TECHNOLOGIES USED

3.1 JAVA: Java is an object-oriented programming language developed by James Gosling and
colleagues at Sun Microsystems in the early 1990s. Unlike conventional languages which are
generally designed either to be compiled to native (machine) code, or to be interpreted from
source code at runtime, Java is intended to be compiled to a byte code, which is then run
(generally using JIT compilation) by a Java Virtual Machine.
There were five primary goals in the creation of the Java language:
1. It should use the object-oriented programming methodology.

2. It should allow the same program to be executed on multiple operating systems.

3. It should contain built-in support for using computer networks.

4. It should be designed to execute code from remote sources securely.

5. It should be easy to use by selecting what was considered the good parts of other object-
oriented languages.

3.1.1 Object orientation: The first characteristic, object orientation ("OO"), refers to a
method of programming and language design. Although there are many interpretations of OO,
one primary distinguishing idea is to design software so that the various types of data it
manipulates are combined together with their relevant operations. Thus, data and code are
combined into entities called objects.
3.1.2 Platform independence: The second characteristic, platform independence, means
that programs written in the Java language must run similarly on diverse hardware. One should
be able to write a program once and run it anywhere. This is achieved by most Java compilers by
compiling the Java language code "halfway" to byte code (specifically Java byte code)—
simplified machine instructions specific to the Java platform. The code is then run on a virtual
machine (VM), a program written in native code on the host hardware that interprets and
executes generic Java byte code. Further, standardized libraries are provided to allow access to

56
features of the host machines (such as graphics, threading and networking) in unified ways. Note
that, although there's an explicit compiling stage, at some point, the Java byte code is interpreted
or converted to native machine instructions by the JIT compiler.
3.1.3 Java Runtime Environment: The Java Runtime Environment or JRE is the
software required to run any application deployed on the Java Platform. End-users commonly
use a JRE in software packages and Web browser plug-in. Sun also distributes a superset of the
JRE called the Java 2 SDK (more commonly known as the JDK), which includes development
tools such as the Java compiler, Javadoc, and debugger.
3.1.4 AWT: (ABSTRACT WINDOW TOOLKIT): Most Java programs are visual programs.
Your Java programs are frequently visual interfaces to file and network processes as well as
ways of entering data into interactive web pages. While Java really grew out of the Unix world,
it has become extremely popular for Windows as well as on most other common operating
system platforms, including Solaris, Macintosh systems, AIX and Linux. The visual controls are
primarily those common to all of these platforms, although it is not difficult to write additional
control directly in Java.
The fundamental visual controls are
 Text Field - a single line text entry field
 Text Area - a multiple line text entry field
 Checkbox - a combination of checkbox and Radio (Option) buttons
 List - a list box
 Button - a simple push button
 Choice - a dropdown list control
 Menu - a drop down menu from the window’s toolbar
 Scrollbar - horizontal and vertical scrollbars.
 Panel - an area where you can group controls or paint images or graphics
 Canvas - a base class for creating your own controls.

57
3.1.5 JDBC: (JAVA DATABASE CONNECTIVITY): JDBC provides access to backend
database. Java application access job using a job driver, which is a database vender-specific
interface for a database server. Although any java application can load a vender’s JDBC driver,
connect to the database, and perform database operations.
When an application requires a JDBC connection, it gets a connection from pool, uses it, and
then returns it to the pool for use by for other applications. Establishing a database connection is
often a time consuming, resource-intensive operation, so a connection pool, which limits the
number of connection operations, improves performance. To register a connection pool in the
JNDI naming tree, define a data source object for it. Java client application can then get a
connection from the pool by performing and look-up on the data source name. Server side java
classes use the web logic JDBC pool driver, which is a gene4ric JDBC driver that calls through to
the vendor specific JDBC driver. This mechanism makes application code more portable, even if
you change the brand of database used in the backend tier.

3.2 JSP & SERVLETS:


Jsp can be viewed as a high level abstraction of servlets that is implemented as an extension of
the servlet 2.1API. Both servlets and JSPs were originally developed at sun Microsystems,
initially created by Anselm Baired-Smith and later elaborated on as a specification by
SatishDharmraj. Starting with version 2.1 of the Jsp specification, java server pages have been
developed under the java community process. JSR 53 defines the JSP 2.0 specification. As of
may 2006 the jsp 2.1 specification has been released under JSR 245as part of java EE 5.

3.2.1 JSP2.0
The new version of the JSP specification includes new features meant to improve programmer
productivity. Namely:
 An expression language (EL) which allows developers to create velocity style
templates (among other things).
 A faster/easier way to create new tags.
The original servlet specification was created by Sun Microsystems (version 1.0 was finalized in
June 1997). Starting with version 2.3, the servlet specification was developed under the java
community process. JSR 53 defined both the servlet 2.3 and java server page 1.2 specification.
JSR 154 specifies the servlet 2.4 and 2.5 specification. As of may 10, 2006, the current version of

58
the servlet specification is 2.5.
The java servlet API allows a software developer to add dynamic content to a web server using
the java platform. The generated content is commonly HTML, but may be other data XML.
Servlets are the java counterpart to no java dynamic web content technologies such as CGI and
ASP .NET. Servlets are maintain state across many server transaction by using HTTP cookies,
session variables or URL rewriting.
The servlet API, contain in the java package hierarchy javax.servlet, defines the expected
interactions of a web container and a servlet. A web container is essentially the container of a
web server that interacts with the servlet. The web container is responsible for managing the
lifecycle of servlets, mapping a URL to a particular servlet and ensuring that the URL requester
has the correct access rights.

3.2.2 Lifecycle of a Servlet:


The servlet lifecycle consists of the following steps:
1. The servlet class is loaded by the container during start-up.
2. The containers call the int () method. This message initializes the servlet and must be called
before the servlet can service any request. In the entire life of a servlet, the init method is called
only once.
3. After initialization, the servlet can service client request. Each request is serviced in its own
separate thread. The container calls the service () method of the servlet for every request. The
service () method determines the kind of HTTP request and accordingly calls the methods doget
(), dopost (), dotrace () etc. the developer of the servlet must provide implementation for these
methods. If an implementation for dopost () has not been provided, it means that the servlet
cannot handle POST request. In such a situation if a post request is made, the implementation of
the parent class will be invoked. By default, this will throw a bad HTTP request exception. A
developer must never overload the service () method.
4. Finally, the container calls the destroyed () methods which takes the servlet out of service. The
destroyed () method like init () is called only once in the life cycle of a servlet.

3.2.3 TOMCAT server:


Apache Tomcat version 6.0 implements the Servlet 2.5 and Java Server Pages 2.1 specifications
from the Java Community Process, and includes many additional features that make it a useful

59
platform for developing and deploying web applications and web services.
In many production environments, it is very useful to have the capability to deploy a new web
application, or underplay an existing one, without having to shut down and restart the entire
container. In addition, you can request an existing application to reload it, even if you have not
declared it to be reloadable in the Tomcat 6 server configuration file.
Deployment is the term used for the process of installing a web application (either a 3rd party
WAR or your own custom web application) into the Tomcat server.

3.3 HTML
Html stands for Hypertext Markup Language.
1. Hypertext is ordinary text that has been dressed up with extra features, such as formatting,
images, multimedia, and links to other documents.
2. Markup is the process of taking ordinary text and adding extra symbols. Each of the symbols
used for markup in html is a common that tells a browser how to display the text. HTML is the
predominant markup language for creation of web pages. It provides a means to describe the
structure of text based information in a document- by denoting certain text as heading, paragraph,
and lists and so on- and to supplement that text with interactive forms, embedded images, and
other objects. Html is written in the form of labels (known as tags), surrounded by less than (<)
and greater than (>) sign. Html can also describe, to some degree, the appearance and semantics
of a document, and can include embedded scripting language code which can affect the behavior
of web browsers and other HTML process. HTML is also used to refer to content to the MIME
type text/html or even more broadly as a generic term for HTML whether in its XML-descended
form or its form descended directly from SGML. TIM Burners Lee created the original HTML on
a next cube workstation using the next STEP development environment. At the time, HTML was
not a specification, but a collection of loosely defined elements to solve immediate problems: the
communication and dissemination of ongoing research between Lee burners and his colleagues.
His solution later combined with the emerging international and public internet to garner
worldwide attention. The original design of HTML was simple. The first publicly available
description of HTML was a document called HTML tags. The document describes 22 elements
that made up the initial design of HTML. Thirteen of these elements still exist in HTML 4.

60
CHAPTER 4

4.1 DESIGN OF PROJECT


Hardware configuration:
Processor: 1.3 GHz.
RAM: 128 MB
Free Space required on hard disk: 10 MB

Software requirement:
Web server with jre 1.6 properties (apache tomcat 6.0.1)
Java2 development kit (1.6.0 former edition as a minimal requirement)
Java standard tag library (jsp pages deployment)

Software requirement: (Client end)


HTTP supported Web browser
Web connectivity
Java Run Time Environment 1.6.1

61
4.2 DATA FLOW DIAGRAM
4.2.1 0 LEVEL

Figure 4.1: Data Flow Diagram level 0

62
4.2.2 LEVEL 1:

Figure 4.2: Data Flow Diagram level 1

63
4.2.3 2 LEVELS:

Figure 4.3: Data Flow Diagram level 2

64
4.3 Entity relationship diagram:

Figure 4.4: Entity Relationship diagram

65
4.5 Working structure of decision function:

Figure 4.5: Working structure of decision function

4.6 Working of decision function:

Figure 4.6: Working structure of decision function

66
4.7 List of modules (System applications)

1. User interface.
 Login

 Registration.

2. Manual mode.
3. Dynamic mode.
4. Message Digest.
5. Crypt information.

Algorithms used:

 XOR based encryption.

 DES.

 3DES.

 Blow fish

4.8 List of modules: (service provider)

1. Registration

2. Purchase key

3. Purchase AET

4. Credit card no. verification

67
Chapter 5

IMPLEMENTATION

5.1 Key generation for DES:

Figure 5: DES Working

68
Triple DES:

Triple DES is another mode of DES operation. It takes three 64-bit keys, for an overall key
length of 192 bits. In Stealth, you simply type in the entire 192-bit (24 character) key rather than
entering each of the three keys individually. The Triple DES DLL then breaks the user-provided
key into three sub keys, padding the keys if necessary so they are each 64 bits long. The
procedure for encryption is exactly the same as regular DES, but it is repeated three times, hence
the name Triple DES. The data is encrypted with the first key, decrypted with the second key,
and finally encrypted again with the third key.

Triple DES runs three times slower than DES, but is much more secure if used properly. The
procedure for decrypting something is the same as the procedure for encryption, except it is
executed in reverse. Like DES, data is encrypted and decrypted in 64-bit chunks. Although the
input key for DES is 64 bits long, the actual key used by DES is only 56 bits in length. The least
significant (right-most) bit in each byte is a parity bit, and should be set so that there are always
an odd number of 1s in every byte. These parity bits are ignored, so only the seven most
significant bits of each byte are used, resulting in a key length of 56 bits. This means that the
effective key strength for Triple DES is actually 168 bits because each of the three keys contains
8 parity bits that are not used during the encryption process

69
Figure 6.2 : Block diagram of TDES

70
Chapter 7

SCREEN SHOTS

Figure 7.1:Screenshot for first page of AET

71
Figure 7.2: Screenshot for Registration form

72
Figure 7.3(a): Screenshot for purchase page

73
Figure 7.3(b): Screenshot for purchase page

74
Figure 7.4: Screenshot for credit card information

75
Figure 7.5: Screenshot for download link of software

76
Figure 7.6: Screenshot for purchase key

77
Chapter 8
FUTURE SCOPE OF PROJECT
“Advance encryption technique” is a system application which fulfills the basic security issue of
encryption/decryption with the more complex approach of encryption...
Project helps in overcoming from the static encryption approach as this project enhanced with the decision function.
Cryptanalysis of this encryption system becomes more complex as the primary task of cryptanalysis is to find the
selected or working algorithm.
In future prospective system can be used for encrypting the real world data as it has an automated feature of
algorithm selection. Key feature of the system is the random selection.

CONCLUSION
Encryption is the basic security need for making a secure communication happen. Number of implemented
algorithms makes the encryption more complex.
Advance encryption technique boosts the security needs of any communication channel. As this project implements
the several numbers of algorithms, with a dynamic approach.
And decision function implementation makes the system more effective and secure. As cryptanalysis is not limited
till the guessing of the key or the plain text.
“Advance encryption technique” is not just a simulation of algorithms it can be adopted for real world data
encryption. Which is supported by fully automation of algorithm selection with randomization approach?
System is quite compatible for working with real world encryption schemes. Automation is dynamic in its own class
of application, as user just only responsible for inputs and expect for encrypted text, selection of is not over to the
user.
The project can serve to be useful system for any of the, individual or organizational networks for the security of
data.

78
REFERENCES
Books referred:
1. “Computer and networks security” by William Stallings.

2. “concepts of java” head first

3. “Software engineering” by S.Pressman.

4. “complete reference” J2SE

5. Java articles by, Doug Baldwin

6. “Java server pages” by Hens Bergeson

Web sites referred:


1. www.security-fourm.com
2. www.gogetpapers.com
3. Java2s.com
4. Google.com
5. www.vogella .de
6. www.mycrypto.net

79
APPENDIX
TABLE STRUCTURE

Server side tables:


Table 1: USER_DETAIL:

NAME DATA TYPE VALIDATION


f_name Text Not null
Password Text Not null
Address Text Not null
PHONE Text Not null
Dob Date/time Not null
Credit_card_no. Text Not null

Table 2: KEY DETAILS:


Field name Data type
S_no Number
Key Text

Application Database tables:


Table 3: LOGIN DETAILS:
Field name Data type Validation
User_name Text Not null
Password Text Not null

Table 4:USERS_DETAIL:
Field name Data type Validation
Name Text Not null
Password Text Not null
Country Text Not null
e-mail Text Not null

Table 5: KEY:
Field name Data type
S_no Number
Key Text

80
Appendix- K
M.TECH DISSERTATION GUIDELINES

ABOUT THE DISSERTATION

The Dissertation work provides students an opportunity to do something on their own and under
the supervision of a guide. Each student shall work on an approved topic, which may involve
fabrication, design or investigation of a technical problem that may take design, experimental or
analytical character or combine element of these areas. The dissertation work involves sufficient
work so that students get acquainted with different aspects of manufacture, design or analysis.
The students also have to keep in mind that they would be required to implement whatever has
been planned in the Dissertation in this semester and also evaluated by an external examiner. At
the end of semester, all students are required to submit dissertation reports.

The objectives of the Dissertation are:

• To provide students with a comprehensive experience for applying the knowledge gained so
far by studying various courses.

• To develop an inquiring aptitude and build confidence among students by working on


solutions of small industrial problems.

• To give students an opportunity to do something creative and to assimilate real life work
situation in institution.
• To adapt students for latest developments and to handle independently new situations.
• To develop good expression power and presentation abilities in students.

81
Guidelines for Dissertation
Dissertation is an important part of a program. It gives an opportunity to the students to explore
the application, implementation and research on various concepts that they have learned, under
the supervision of a faculty. The students can take up any topic of their choice after the
consultation with the internal faculty guide or external guide. Following are some of the
guidelines for the dissertation

1. The dissertation work is to be done by students individually.

2. The dissertation work can be purely hardware based, software based or comprising of both
hardware and software component.
3. The student will submit a synopsis at the beginning of the semester for approval from the
departmental committee in a specified format .
4. Dissertation guide for each group of students must be from the respective department.
However, co-guide may be from other department or organization, if required.
5. Synopsis is to be submitted within two weeks of commencement of the semester and will
be duly signed by all the guides.
6. The student must submit outline and action plan for the execution (time schedule) of
dissertation work and the same should be approved by all the guides.

7. The student must submit the Fortnightly Progress Report by email to faculty guides,
clearly mentioning Course Enroll, Enrolment Number, Name & Area of the Dissertation :
( NECESSARY IN THE SAME ORDER ) in the subject header by 12:00 PM on every
alternate Monday of the week.

8. Calendar of internal assessment (continuous assessment) will be worked out by the


department and will be communicated to the students and faculty guides at the beginning
of the semester.
9. The continuous evaluation criterion is 50% and given in NTCC guidelines.

82
10. Students will submit the final dissertation report duly approved by the guide to the
department

11. Final viva and presentation will be held in the presence of expert committee comprising of
external and internal examiners. The external evaluation will carry 50% weightage and the
evaluation scheme is given in NTCC guidelines.

12. Any student fails to satisfy the expert committee will be required to repeat the
dissertation work along with junior batch as per university examination norms.
13. It is expected that the dissertation work should result in some research publication.

Synopsis of the Dissertation:


Synopsis of the Dissertation should include: -

1. A brief introduction about the dissertation.


2. Problem Formulation.
3. Working Principle.
4. Applications.

Guidelines for Dissertation being carried out at Other Organizations/Industry:

1. Perform Good Quality Work , which would help you:

a) In developing an understanding of the research area.


b) In applying theoretical concepts learnt.
c) In evolving the new theories and concepts.
d) In gaining experience of working in the real life situation.
e) Building a rapport with the industry guide & other professional in the Organization &
Industry
f) Establish a mutually beneficial relationship between ASET and your respective
Dissertation organizations.

2. This is an opportunity for you and at the same time a very important responsibility to build a
close relationship between your institute and various members of your Dissertation
organization and all the other organization you come across during your Dissertation. The
following would definitely help you to achieve the above.

a) Be punctual in your timing.


b) Understand your industry guide’s and expectations from you

83
c) Be sincere towards your dissertation
d) Meet deadlines and targets given.
e) Offer your supporting hand to your industry guide for work.
f) Be ethical in your deals.
g) Build cordial relationship with all the industry professionals you come across during your
Summer Internship.
h) Build good rapport between your industry guide and faculty guide.

84
AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY
Synopsis of Dissertation:

Dissertation Title:
Name of Guide:

Program:- Year/Semester:-
S. No. Enrolment No. Name Signature

Dissertation Summary (at least 250


words) Methodology to be adopted:-
Resource requirement (Hardware & software etc):-
Justification of the Dissertation Work:
Schedule of Dissertation work completion:-

Signature(s) of student

Signature of external guide (if any) Signature of Internal Guide


Name: Name:

85
AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY
Guidelines for Dissertation Report
Research experience is as close to a professional problem-solving activity as anything in the
curriculum. It provides exposure to research methodology and an opportunity to work closely
with a faculty guide. It usually requires the use of advanced concepts, a variety of experimental
techniques, state-of-the-art instrumentation and software.
Research is genuine exploration of the unknown that leads to new knowledge which often
warrants publication. But whether or not the results of a research work are publishable, the
dissertation work should be communicated in the form of a research paper written by the
students.

Sufficient time should be allowed for satisfactory completion of reports, taking into account that
initial drafts should be critiqued by the faculty guide and corrected by the student at each stage.
Dissertation report is the principal means by which the work carried out will be assessed and
therefore great care should be taken in its preparation.

It is recommended that the student meets the guide regularly during the course of the dissertation,
and maintain a record of the discussions, survey details, derivations etc. Such a system will allow
easy and quick access to the details and chronology of the work. Please read the guidelines
carefully and make sure your dissertation report strictly conforms to specifications.

General Tips:

In general it will help to have someone else read the report and critique it. Make a checklist of
their questions and comments and resolve each one.

 The report must be complete, error free and referable. All references, figures, tables,
equations, etc. which are referenced in the text should be locatable in the report with the
specified number or reference. Conversely, all references, figures, tables, equations, etc. must
be cross-referenced in the text. 



86
 Use of spelling and grammar software is strongly recommended. “Spell-check”
cannot identify correctly spelt words in the wrong context. For example, typing “he” in 
place of “the” may alter the meaning of the sentence but the spell-check will not indicate
this, so re-read the text written.

 Except for acronyms do not use ALL CAPITALS. 



 Do not use underlining. 

 Use italics for emphasis or if the phrase is non-English. 

General Guidelines
 Report Layout
The report should be hard bound and for color coding scheme refer NTCC guidelines.

It should contain the following components:

 Number of pages and color


Keep the total number of pages (of the chapters) between 50 and 80, not exceeding 80 in any case.

This does not include the page count of the appendices.

With regard to the text please note:

Color: Black on white

Typing: One side

 Spacing and Margin


All text, drawings, tables, etc., must be positioned on an A4 sheet with 1 in. margin on the
top, bottom and right side and 1½ in. margin on the left side.

Use 1.5 lines spacing with material typed.

Single spacing should be used for typing:


(i) Long Tables
(ii) Long quotations
(iii) Foot notes
(iv) Multilane captions
(v) References

87
 Font

Font style and size: Times New Roman, 12 pt. For font size of chapter, section and subsection use
headings.

A sub-heading at the bottom of a page must have at least two full lines below it or else it
should be carried over to the next page. The last word of any page should not be split using a
hyphen.

The dissertation report should be prepared on good quality white paper preferably no lower than
80gsm.

 Page Numbering
 Pages should be numbered at bottom center (including pages that contain only figures or
tables). 


1 Beginning with the first page of the text of the dissertation (chapter 1), all pages should be
numbered consistently in Arabic numerals throughout the dissertation, including appendices. 
2 Page indications before Chapter 1 should be done in lower case Roman numerals. The
title page is considered to be page i, but the number is not typed.

 Tables, Figures and Equations


Figures and Tables

Each sketch, drawing, graph and photograph should have a figure number and title below the figure etc.
Numbering should be sequential, chapter wise. For instance, if there are 20 figures in chapter 1 spread
over all of its sections the figure numbers should run from Figure 1.1 through Figure 1.20.

In figures experimental data should typically be represented by centered symbols, and


theoretical data by continuous curves.
Each table should have a table number and caption above the table. Numbering should be
sequential, chapter wise, as in the case of Figure numbers. For instance, if there are 18 tables in
chapter 3 the table numbers run from Figure 3.1 through Figure 3.18.
Make sure that figures and tables are complete in other respects such as legends, references (if any)
and coordinate labels with units. Each figure and table must be explicitly referred to in the text and
located where its first reference occurs, preferably after the reference.

If tables and figures are of size half a page or less, they may appear on the same page as text but
separated above and below by triple line spacing.

88
 Equations

The numbering of equations should be sequential, chapter wise. Numbered equations must be explicitly
referred to in the text.

In general, Dissertation report should be comprehensive and include:

Title or Cover Page

The title page should contain the following information: Dissertation Title; Students Name;
Course; Year; Supervisor’s Name.

(Cover Page and first page inside the report must be same)

Declaration
Certificate
Certificate on Organizations Letter Head (if dissertation is carried
outside)
Acknowledgements
Acknowledgment to any advisory or financial assistance received in the course of work may be
given. The Acknowledgement shall be brief and should not exceed one page. The scholar’s
signature shall be made at the bottom end above his./ her name typed in capitals.

Abstract
A good "Abstract" should be straight to the point; not too descriptive but fully informative. First
paragraph should state what was accomplished with regard to the objectives. The abstract does not
have to be an entire summary of the dissertation work, but rather a concise summary of the scope
and results of the dissertation work. The abstract (about 250 words) should contain the
context/relevance of the problem at hand, a description of what was done and a gist of the
significant observations/results.

Table of Contents
Include page numbers indicating where each chapter / section begins. Chapter / section are to
correspond exactly with those in the text

89
List of Figures and List of Tables should be on separate pages. Each list should give, in tabular
form, the figure or table number, its title/caption and its page number.
The list should use exactly the same captions as they appear in the text.

List of Symbols, abbreviations and Nomenclature- One and a half spacing should be adopted for
typing the matter under this head. Standard symbols, abbreviations etc. should be used.

Introduction
Here a brief introduction to the problem that is central to the dissertation work and an outline of the
structure of the rest of the dissertation should be provided. It is the first chapter of the Dissertation.
The purpose of an introduction in the Dissertation is to justify the reasons for writing about the
report. The goal in this section is to introduce the topic to the reader, provide an overview of
previous research on the topic, and identify the own hypothesis. It can be noted here that the
introduction should not contain every bit of detail in the report, and it should not include support
for the report. An introduction might, however, include the reasons for supporting the report.

The introduction should aim to catch the imagination of the reader, so excessive details should be
avoided.

Literature Review
Literature survey/review is the documentation of a comprehensive review of the published and
unpublished work from secondary data sources. The library is a rich storage base for secondary
data and researchers can go through books, journals, newspapers, magazines, conference
proceedings, doctoral theses, master's dissertations, government publications and financial reports
to find information on their research topic. With computerized databases now readily available
and accessible the literature search is much speedier and easier and can be done without entering
the portals of a library building. Survey of literature related to the dissertation work e.g. research
papers published in national and international journals, conferences, related books, websites is
very important to get hold of the dissertation topic.

Design and Implementation

This section should aim at experimental designs, materials used. Methodology should be
mentioned in details including modifications if any.
90
Approach to design

A design approach will guide you to achieve the overall goal of the design. The key to design
approach is clear understanding of what you want to achieve. The basic idea of the design approach
is to understand the context in and the constraints under which a design solution will be produced.

For finding an appropriate design approach you need to:


 Investigate possibilities and constraints 
 Define problem spaces 

 Build and redefine the specifications of design solutions to test the ideas in a real world
 context 
 Prototype/Simulate possible scenarios that can incrementally or significantly improve the
inherited situation 
 Understanding the current style and trend 

Simulation/Experimentation
The act of simulating something generally entails representing certain key characteristics or
behaviors of a selected physical or abstract system. Simulation is used in many contexts, such as
simulation of technology for performance optimization, testing and verification of results. If the
dissertation involves the usage of a particular software tool e.g MATLAB, VHDL or a
programming Language like C, JAVA, then the simulated results as well as a brief overview of the
tool or features of the language should be presented in the dissertation.

Incase the dissertation work involves hardware tools and equipments, a brief summary of the
specifications and experimentation results should be presented.

Experiments should measure:

  Pure running time 


 Sensitivity to important parameters 
 Scalability in various aspects: data size, problem complexity 

Experiments should show:

  Absolute performance (i.e., it's acceptable/usable) 


  Relative performance in comparison to previous approaches 
 Relative performance among different proposed approaches 

Discussion of Results
The purpose of Discussion is to interpret the results in light of what was already known about the
91
topic of the dissertation, and to explain new understanding of the problem after taking the results
into consideration. It should discuss the implications of those results.

The Discussion will always connect to the Introduction, but it does not simply repeat or rearrange
the Introduction. Instead, it tells how the study has moved forward from the place it left, at the end
of the Introduction.

It can include:

92
 What can be the next step in the dissertation work , e.g., what experiments would you
do next? 

 Organize the Discussion to address each of the experiments/studies for which
results were presented. 

 Consider how the results of others studies may be combined to derive a new or perhaps
better substantiated understanding of the dissertation work. 

In writing this section, emphasis should be given on what has been performed and achieved in the
course of the work, rather than discuss in detail what is readily available in text books.

Presentation of Results and their analysis


An integrated results analysis is crucial for a dissertation work. Student with his insight and
understanding of the goals, strategies, environments, and challenges of the dissertation work can
analyze and put the results in context. While presenting the results, write at length about the various
statistical tools used in the data interpretation. The result interpretation should be simple but full of
data and statistical analysis. This data interpretation should be congruence with the written
objectives and the inferences should be drawn on data and not on impression. Avoid writing
straight forward conclusion result; it should lead to generalization of data on the chosen sample.

The integrated results analysis should satisfy the following guidelines.


It should:
 be relevant and significant 

 be comparable to the existing references. 

 be presented in a clear and understandable format. 

 focus on results and achievements 

 compare planned to actual results 

 describe variations and uncertainties 

 include simulation and experimentation results 

 if analysis is made under any assumptions, they should be clearly described 

Conclusion

93
A conclusion should be the final section in which the outcome of the work is mentioned briefly.
Check that your work answers the following questions:
Did the research work meet its aims (check back to introduction for stated
aims)? What are the main findings of the research?
Are there any recommendations?

Future prospects
State the aspects of the problem that have not been considered and possibilities for further
enhancements. This section shows how the work done can set new research directions. If
you're actively engaged in follow-up work or plan to pursue further work on the subject,
mention that.

Appendices
The Appendix contains material which is of interest to the reader but not an integral part of the
dissertation and any problem that have arisen that may be useful to document for future
reference.

References / Bibliography
References:
Referencing is necessary to avoid plagiarism, to verify quotations and to enable readers to follow-
up. Indicate references by number(s) sequentially in square brackets [ ] in the order in which they
appear in the text.

Examples:
For Journals
[1] J. F. Fuller, E. F. Fuchs, and K. J. Roesler, "Influence of harmonics on power distribution
system protection," IEEE Trans. Power Delivery, vol. 3, pp. 549-557, Apr. 1988.

For Books:
[2] E. Clarke, Circuit Analysis of AC Power Systems, vol. I. New York: Wiley, 1950, p. 81.
[3] G. O. Young, "Synthetic structure of industrial plastics," in Plastics, 2nd ed., vol. 3, J. Peters,
Ed. New York: McGraw-Hill, 1964, pp. 15-64.

For Technical Reports:


[4] E. E. Reber, R. L. Mitchell, and C. J. Carter, "Oxygen absorption in the Earth's atmosphere,"
Aerospace Corp., Los Angeles, CA, Tech. Rep. TR-0200 (4230-46)-3, Nov. 1968.
[5] S. L. Talleen. (1996, Apr.). The Intranet Architecture: Managing information in the new
paradigm. Amdahl Corp., Sunnyvale, CA. [Online]. Available:

94
http://www.amdahl.com/doc/products/bsg/intra/ infra/html

For Conference Proceedings

J. L. Alqueres and J. C. Praca, "The Brazilian power system and the challenge of the Amazon
transmission," in Proc. 1991 IEEE Power Engineering Society Transmission and Distribution
Conf., pp. 315-320.

For Dissertations:
[7] S. Hwang, "Frequency domain system identification of helicopter rotor dynamics incorporating
models with time periodic coefficients," Ph.D. dissertation, Dept. Aerosp. Eng., Univ.
Maryland, College Park, 1997.

For Standards:
[8] IEEE Guide for Application of Power Apparatus Bushings, IEEE Standard C57.19.100-1995,
Aug. 1995.

For Patents:
[9] G. Brandli and M. Dick, "Alternating current fed power supply," U.S. Patent 4 084 217, Nov. 4,
1978.

Submitting the Report

For the purpose of the viva voce exam, each student will submit a minimum of three reports
(one each for faculty supervisor, department and library record). All hard copies must be
identical from cover to cover.

Please follow these steps:

 Submit the draft of the dissertation (Spiral bound) at the time of Internal End Semester
(Second) Presentation. After the presentation, the modifications suggested if any, by the
Evaluation board, may be incorporated before final viva and presentation (External
Examination). 


 Make corrections, revisions and extensions as suggested before submitting the final hard bound
dissertation at the time of External Viva-Voce and Presentation. 

95
A Dissertation on

TITLE OF THE DISSERTATION

Submitted to

Amity University Haryana

in partial fulfillment of the requirements for the award of the degree of

Master of Technology
in
Specialization

by

STUDENT(S) NAME
under the guidance of
Name of Supervisor Name of Supervisor
Designation Designation

DEPARTMENT OF ………………………………
AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY
AMITY UNIVERSITY HARYANA

May-June 201….
96
Department of Computer Science and Engineering
Amity School of Engineering and Technology

DECLARATION

I, ……………………….., student of M.Tech (….) hereby declare that the dissertation titled
“……………………………………………..” which is submitted by me to Department of
……………………………., Amity School of Engineering and Technology, Amity University
Haryana, in partial fulfillment of requirement for the award of the degree of Master of
Technology in ….., has not been previously formed the basis for the award of any degree,
diploma or other similar title or recognition.

Haryana

Date Name and signature of Student(s)

97
Department of Computer Science and Engineering
Amity School of Engineering and Technology

CERTIFICATE

On the basis of declaration submitted by …………….., student of M. Tech ….., I hereby


certify that the dissertation titled “…………………………………………………...” which is
submitted to Department of ………………………………, Amity School of Engineering and
Technology, Amity University Haryana, in partial fulfillment of the requirement for the award of
the degree of Bachelor of Technology in ….., is an original contribution with existing knowledge
and faithful record of work carried out by him/them under my guidance and supervision.

To the best of my knowledge this work has not been submitted in part or full for any Degree or
Diploma to this University or elsewhere.

Haryana

Date (Guide)
Department of ……………….
Amity School of Engineering and Technology
Amity University Haryana

98
CONTENTS

Candidate’s Declaration iii

Certificate iv

Acknowledgements v

Abstract vi

Contents xv

List of Figures xxi

List of Tables xxvi

CHAPTER I INTRODUCTION 1

1.1 1

1.2

1.3

1.4

1.4.1

1.4.2

CHAPTER II LITERATURE REVIEW

CHAPTER III DESIGN & IMPLEMENTION

CHAPTER IV SIMULATION/EXPERIMENTATION

CHAPTER V DISCUSSION OF RESULTS

CHAPTER VI PRESENTATION & ANALYSIS OF RESULTS


CHAPTER VII CONCLUSION

CHAPTER VIII FUTURE PROSPECTS

APPENDICES

REFERENCES/BIBLIOGRAPHY
Appendix-L
Format for Independent Study/Term Paper/Seminar
a) Guidelines for writing independent study/Term Paper/ Seminar report

The procedure for writing a independent study/Term Paper/Seminar report must consist of the
following steps:
1. Choosing a subject
2. Finding sources of materials
3. Collecting the notes
4. Outlining the report
5. Writing the draft report
6. Editing & preparing the final report

b)Structure
It should be composed of the following sections:

1) Title page
2) Acknowledgement
3) Abstract
4) Table of contents
5) Introduction: This includes overview of topic or what is the issue or problem?
What is the significance of the problem or topic?
6) Literature Review/Background: What is previous/current thinking, findings, and
approaches on the topic/problem?
7) Methodology/Discussion: Explanation of topic, any comparison/observation/study.
How did you search for information or data on the topic? What is your impression of
the utility, relevance, or quality of the data you collected?
8) Results (If any)
9) Conclusion: Summarize the most important findings. It can include summary of main
limitations of the study at hand. What conclusions can you draw? Also include details
of possibilities for related future research
10) References/Bibliography: From the very beginning of a research project, you should
be careful to note all details of articles gathered.

The bibliography should contain ALL references included in the paper. References not included
in the text in any form should NOT be included in the bibliography.
The key to a good bibliography is consistency. Choose a particular convention and stick to this.

c) File Specifications: The file should be submitted in plastic folder with following
specifications:
i. A4 size paper
ii. Font: Arial(10 pts) or Times New Roman(12pts)
iii. Line Spacing(1.5)
iv. Top & Bottom Margins 1 inch/2.5 cm
v. Left & Right Margins 1.25 inch/3 cm
100
Appendix-M
Sample Term Paper/Independent Study/Seminar Report

Application of H.323 Signaling Protocol and VPN in


Telemedicine Field

Report Submitted In Partial


Fulfillment of the Requirements for The Award of The Degree Of

BACHELOR OFTECHNOLOGY
IN
COMPUTERSCIENCE& ENGINEERING

by

ABC
(Enrollment No. XYZ)

Under Guidance of
PQR
Assistant Professor

Department of Computer Science and Engineering


Amity School of Engineering & Technology
Amity University, Haryana
August -2013

101
ACKNOWLEDGEMENT

Acknowledgement is not a mere obligations but epitome of humility and ineptness to all
those who have helped in the completion of this project . I am thankful to Mr. Kishalay
Bhattacharya AGC networks Gurgaon, Mr.Rajesh Kumar Gupta, Assistant Prof, ASET for his
constant guidance and encouragement provided in this endeavour. I also thanks my parents for
their continues support, understanding and patience without whose support and understanding
this endeavour would never been fruitful . I also thanks all my friends for helping me out in
completing this project and helping me in solving various problems encountered during the
progress of this project .

ABC
(Enrollment No XYZ)

102
ABSTRACT

To use efficiently electronic information and communication technologies to provide and support
health care when distance separates participants. The main goal is to rapidly access and share
remote medical expertise by means of telecommunications and information technologies, no
matter where the patient or relevant information is located. The main objective is “the delivery
of healthcare services, where distance is a critical factor, by all healthcare professionals using
information and communication technologies for the exchange of valid information for diagnosis,
treatment and prevention of disease and injuries, research and evaluation, and for the continuing
education of healthcare providers, all in the interests of advancing the health of individuals and
their communities”. One of the major advantages of Telemedicine technology has been the saving
of cost and effort to the rural patients as they are not required to travel long distances for
obtaining consultation and treatment. Thus, Telemedicine can enlarge the gap between life and
death and can extend quality healthcare to the needy and the under privileged rural, semi rural
and urban population at large.

103
Table of Contents
Chapter 1 Introduction
1.1 Introduction to telemedicine ……………………………………........... 1
1.2 Telemedicine in India……………………………………………………1
1.3 Benefits of Telemedicine…………………………………………..........1
1.4 Limitations of Telemedicine…………………………………………….2
Chapter 2 Literature Reviewed…………………………………3
Chapter 3 Methodologies
2.1 Telemedicine Technology ....................................................…………. 4
2.2 Solution Description…………………………………………………... 5
Chapter 4 H.323Signaling Protocol
3.1 Introduction........................................................................................ 8
3.2 Elements of H.323 System .................................................................. 8
3.3 H.323 Protocol Stack………………………………….......................... 9
3.3 H.323 Call ………………………………………………………………10
Chapter 5 VPN in Telemedicine Area
4.1 Introduction…………………………………………………………….13
4.2 VPN Connectivity………………………………………………………13
4.3 Setting up a VPN tunnel ……………………………………………….14
Chapter 6 Results
5.1 Screen Shots H.323 Call Trace…………………………………………16
5.2 Screen Shots VPN Client Settings………………………………..........17
5.3 Screen Shots VPN Site Settings………………………………………..20
Chapter 6 Conclusion and Future Work
6.1 Conclusion and Future Work ………………………………………….22
References .............................................................................................. 23

104
Chapter 1
Introduction
1.1 Introduction to Telemedicine
Telemedicine facilitates the provision of medical aid from the distance. It is an effective solution
for providing specialty healthcare in the form of improved access and reduced cost to the rural
patients. Telemedicine is a “Rapid access to shared and remote medical expertise by means of
telecommunications and information technologies no matter where the patient or relevant
information is located”.
According to World Health Organization, telemedicine is defined as, “The delivery of
healthcare services, where distance is a critical factor, by all healthcare professionals using
information and communication technologies for the exchange of valid information for diagnosis,
treatment and prevention of disease and injuries, research and evaluation, and for continuing
education of healthcare providers, all in the interests of advancing the health of individuals and
their communities”.

1.2 Telemedicine in India:


India is the seventh largest country in the World in area and has the second largest population in
the world, but most of the people are living in the rural areas in India. It is the well known fact
that 75% of the expertise doctors live in urban areas in India. Most of the neurosurgeons in
Chennai city alone exceed those in the entire North Eastern Region of India.
This calls for innovative methods of utilization of science and technology for the benefit of
the society. Adaptation of Telemedicine technology offers one of the best options for delivering
healthcare for rural and geographically distant population spread across India. Telemedicine helps
in enabling specialty healthcare to the rural and remote population of India.

1.3 Benefits of Telemedicine:


The main objective of telemedicine is to cross the geographical barriers and provide healthcare
facilities to rural and remote areas (health for all), so it is beneficial for the population living in
isolated communities. Besides this other advantages of telemedicine are:
1) Eliminate distance barriers and improve access to quality health services.
2) In emergency and critical care situations where moving a patient may be undesirable and/or
not feasible.
105
3) Facilitate patients and rural practitioners’ access to specialist health services and support.
4) Lessen the inconvenience and/or cost of patient transfers.
5) Reduce unnecessary travel time for health professionals.
6) Reduce isolation of rural practice by upgrading their knowledge through tele-education.

7) Developing virtual communities that interacts and shares knowledge.

1.4 Limitations of Telemedicine:


With the due advantages there are certain limitations in the field of telemedicine. As an emerging
area, telemedicine has many unresolved questions. Some of its limitations are:
1) Good quality of communication must be available between the doctor and the patient,
otherwise quality of tele-medical opinion suffers.
2) (i) Till now there is no provision for telemedicine reimbursement in India, legal laws must be
made in this regard.
(ii) Up till now no strong legal provision in India for deciding who is liable for providing
wrong tele-medical opinion.

106
Chapter 2
Literature Reviewed
For understanding the role of telemedicine we have reviewed following papers:-
Pandianet. al. [1] this paper helps me in understanding what exactly telemedicine is and how it
helps in improving health conditions in remote areas. It also laid emphasis on using standard
communication protocols, and efficient bandwidth in telemedicine systems.
Karimet. al. [2] in this paper Karim presents low cost method for transmitting medical images.
He gives a complete description of Clinical Decision Support System (CDSS) which helps me in
understanding complete architecture of a virtual telemedicine setup.
Dafonteet. al. [3] this paper presents a project of telemedicine applied to Intensive Care Units
(ICUs). The implemented communications scheme can be adapted to patients interned in an ICU
as well as to remote patients connected to the principal hospital through the communication lines.
The developed system also provides maximal flexibility on the physical level, allowing ISDN,
ADSL, ATM and dedicated lines

107
Chapter 3
Methodologies
3.1 Telemedicine Technology
Telemedicine is a confluence of Communication Technology, Information Technology,
Biomedical Engineering and Medical Science.

Fig 3.1 Telemedicine technology

The Telemedicine system consists of customized hardware and software at both the Patient and
Specialist doctor ends with some of the Diagnostic Equipments like ECG, X-ray and pathology
Microscope/Camera provided at the patient end.
 The patient end is connected to the doctor’s end either by the internet or via a satellite
link.
 Through the telemedicine system consisting of the simple computer and the
communication link the medical images and the relevant information is sent to the
specialist doctor.

108
Fig 3.2 Telemedicine Solution Diagram

3.2 Solution Description:


 Each village will have one PC connected to the internet and the webcam.
 There will be a trained medical assistant at each village.
 At the other end doctor will be available with a PC having internet connection and
webcam.
 Patient will come in and the medical assistant enters his demographical details in the
specific software called as Electronic Medical Record (EMR) and then launches a call to
different doctors group.
 Once the doctor is available and video call is patched with the doctor, the doctor is
provided with the patient Id and the required details are stored in a database for future
reference.
 The medical assistant then uploads the measurements of these tests on the EMR.

109
Fig 3.3 EMR (Electronic Medical Record)

 Once the doctor is available and video call is patched with the doctor, the doctor is
provided with the patient Id and the required details are stored in a database for future
reference.
 Based on the discussion with the patient, doctor may ask the medical assistant to perform
some tests like to check the blood pressure, heart beats.
 The medical assistant then uploads the measurements of these tests on the EMR.
 Doctor will use these values for diagnostic purpose and put the prescription in the
application itself.
 Here we are using voice over IP for call transfer.
 Routing is based on the skill of the doctor.
 The doctor is logged in to their specific skills.
 When the villager comes at the remote end, the call is called to the specific doctor with
the help of Avaya one-X communicator.
110
Fig 3.4 Call Launch by Avaya One – X Communicator

 The trained assistant at the village end called the hunt group to which the doctor belongs
and wait for his turn.
 ACD (Automatic Call Distributor) will automatically route the call to the specialized
doctor.

111
Chapter 4
H.323 Signaling Protocol
4.1 Introduction:
H.323 is a protocol standard given by ITU for multimedia communication. H.323 provides
various services and, therefore, can be applied in a wide variety of areas - consumer, business,
and entertainment applications. It can be applied in a variety of mechanisms - audio only (IP
telephony), audio and video (video telephony), audio and data, video and data. H.323 can also
be applied to multipoint-multimedia communications. Here in telemedicine field, it supports
the real time transfer of audio and video data over packet network.

4.2 Elements of H.323 System:


(a) Terminals : Terminals are the end-points that are communicating . In our case in
telemedicine field one terminal is the PC at the village end and the other terminal is the PC at
the doctor’s end.
(b) Gatekeeper : It provides call control services to the H.323 terminals. A gatekeeper is
logically a separate entity from endpoints but its physical implementation may coexist with a
terminal, gateway or with a Multi-point control unit. Its main functions are:
 Admission Control
 Bandwidth Control
 Call Management
(c) Gateway : It is an optional element in H.323 environment but it allows endpoints from
different network to conference. In general the purpose of the gateway is to reflect the
characteristics of one endpoint to the other endpoint and vice- versa. It provides conversion
function for various transmissions of audio, video and data signals.
(d) MCU ( Multi –point Control Units) : It is an optional element in a H.323 environment. It
allows three or more devices to participate in a conference. In our case in telemedicine field
we are using point- to-point conferencing so we are not using MCU. But if we want multi-
point conferencing like if we want that several doctors need to discuss a medical case then we
need this equipment.

112
4.3 H.323 Protocol Stack:
H.323 uses both reliable and unreliable communication. Control signals and data require
reliable transport because the signals must be received in the order in which they were sent
and cannot be lost. To achieve reliable transmission, H.323 uses TCP, which is a reliable,
connection-oriented protocol. This guarantees sequenced, error-free, flow-controlled
transmission of packets. TCP is used by H.323 for the H.245 Control Channel, the T.120 Data
Channels and the Call Signaling Channel.

(a) H.245 Control Signaling: This standard provides the call control mechanism that allows
H.323-compatible terminals that is the PC at the village end to connect to the PC at the
doctor’s end. The H.245 Control Channel is a reliable channel that carries control messages
governing operation of the H.323 endpoint, These control messages carry information related
to the following:
(i)Capabilities exchange
(ii)Opening and closing of logical channels used to carry media streams
(iii)Preference requests
(iv)Flow-control messages
(v)General commands and indications
There is only one H.245 Control Channel per call.

(b) H.225 Call Signaling: In telemedicine field, this standard defines a layer that formats the
transmitted video, audio, data, and control streams for output to the network, and retrieves the
corresponding streams from the network. As part of audio and video transmissions, H.225
uses the packet format specified RTP and RTCP specifications.

(c) RTP (Real Time Transport Protocol): It provides end to end real time delivery of audio
and video medical information from the patient end to the doctor’s end.

(d) RTCP (Real Time Control Protocol): It provides control services, and mainly feedback
on the quality of the data distribution. Like in our case it provides feedback on the quality of
the audio and video received at the other end , whether the quality is appropriate to give
medical advice or not. It’s very important to get regular feedbacks because if quality defers
(in telemedicine field) it can lead to drastic results.

113
(e) Audio Codec’s (G.7XX series): basically it encodes the audio signals from the
microphones of the transmitting H.323 terminal i.e. the terminal at the remote end and
decodes the received audio codec that is sent to the speaker on the receiving end i.e. the
terminal at the doctor’s end.

(f) Video Codec’s (H.26X series): it is responsible for encoding the video signals from the
camera of the sending remote H.323 terminal and decoding the received video codec that is
send to the video display on the receiving H.323 terminal i.e. on the video display of the
doctor’s end.

Fig 4.1 H.323 Protocol Stack

4.4 H.323 Call Flow:


 When a terminal at the remote patient’s end wants to connect to the other terminal i.e. the
terminal at the doctor’s end first of all H.225.0 protocol is used.
 Firstly H.225.0 RAS (Registration, Admission and Status) channel is used for carrying
signals used for gatekeeper discovery and end-point registration.

114
 Then the H.225.0 call signaling protocol is used in order to establish a call, get status of
the endpoints in the call and to disconnect the call.
 After the call has been accepted by the endpoint, the media channels are set up using the
H.245 protocol.
 H.245 protocol helps in performing the negotiation between the endpoints which
includes:-
(i)Bandwidth exchange
(ii)Audio-codec exchange
(iii)Video- codec exchange
 Once all this is done connection is established between the endpoint at the remote patient
end and the doctor’s end.
Call Flow Steps:
1. GRQ (Gatekeeper Admission Request) : At first patient end at the remote location sends
the GRQ message i.e. the admission request message to the gatekeeper.
2. Then the gatekeeper either sends GCF (gatekeeper admission confirm) or GRJ
(gatekeeper admission reject) message back to the patient’s end.
3. Then a set-up is established between the patient’s end point and the gatekeeper.
4. A set-up is also established between the gatekeeper and the other communicating end i.e.
with the doctor’s end.
5. Then the doctor’s end sends the GRQ message to the gatekeeper.
6. In return gatekeeper sends either GCF or GRJ message back to the doctor’s end.
7. Then the doctor’s end is finally connected to the gatekeeper.
8. And the gatekeeper is finally connected to the patients end at the remote location.

115
Gatekeeper

3
4 6

1
2 5

8 7

Endpoint-1(Patient Endpoint -2
remote end) (Doctor’s end)

Fig 3.4 Call Flow between Endpoints

RAS Channel Messages

Call Signaling Channel Messages

116
Chapter 5
VPN in Telemedicine Area

5.1 Introduction:
VPN stands for Virtual Private Network. A VPN is a shared network where private
data is segmented from other traffic so that only the intended recipient has access. The
term VPN was originally used to describe a secure connection over the Internet. Here in
telemedicine field we require that the data transit between the patient and the doctor must
be confidential and the data should not change during the transit for this we require VPN
connectivity.

5.2 VPN Connectivity:

Fig 5.1 VPN Connectivity

 The remote end is connected to the main data center via VPN (Virtual Private Network)
tunnels.
 Similarly the doctor’s end is connected to the main data center via VPN tunnels.
117
 There is no direct communication between the remote end and the doctor’s end, all the
communication is through the main data center.
 VPN tunnels ensure data confidentiality and data integrity that transits between the remote
end and the doctor’s end.
 Here we use client to site IPSec based VPN connectivity.
 IPSec-based VPN use encryption to provide data security, which increases the network’s
resistance to data tampering or theft.

5.3 Setting up a VPN tunnel:


Tunnel is also known as security association(SA), it is the set of information that allows two
entities (networks, PCs, routers, firewalls, gateways) to “trust each other” and communicate
securely as they pass information over the Internet. Each gateway must negotiate its Security
Association with another gateway using the parameters and processes established by IPSec.

Fig 5.2 VPN tunnel negotiation Steps


 In our case in telemedicine field, we require a VPN client must be installed on each
PC at the remote location of the patient and VPN client must be installed at every
doctor’s PC.
 Then VPN connectivity is established between the VPN client at the patient’s end and
the gateway at the data center and similarly VPN connectivity is established between
the VPN client at the doctor’s end and the gateway at the data center.
The IPSec software on Host A initiates the IPSec process in an attempt to communicate with
Host B. The two computers then begin the Internet Key Exchange (IKE) process.
IKE Phase I.

118
(a) The two parties negotiate the encryption and authentication algorithms to use in the IKE
SAs.
(b) The two parties authenticate each other using a predetermined mechanism, such as pre-
shared keys or digital certificates.
IKE Phase II.
(a) The two parties negotiate the encryption and authentication algorithms to use in the IPSec
SAs.
(b) The master key is used to derive the IPSec keys for the SAs. Once the SA keys are
created and exchanged, the IPSec SAs are ready to protect user data between the two
VPN gateways.

119
Chapter 6
Results
6.1 Screen Shots H.323 Call Trace:

Fig 6.1 Registration Trace

Fig 6.2 End-point 1 calling End-point 2

120
6.2 Screen Shots VPN Client Settings:
Setting to be done on User machine i.e. on patient’s end PC and on the doctor’s end PC after
configuring VPN Client.
 Click my connections ---New and create one new like below (Test-VPN) keep same
values for all users.

Fig 6.3 Test VPN

Fig 6.4 Security Policy


 After that click on My Identity and choose the appropriate values

121
Fig 6.5 My Identity
 Then click on the Security Policy and select the Phase-1 options.
 Click on Proposal-1. Select Pre-shared key for the authentication method.
 Select triple DES for the encryption algorithm.
 Then click on the key-exchange (Phase-2)
 After that click on proposal-1
 Under IPSec protocols, select unspecified for SA life.
 Check ESP (Encapsulation Protocol), Select triple DES for encryption algorithm, SHA 1 for
the hash algorithm and tunnel for encapsulation.

Fig 6.8 Test-vpn Connectivity

122
Chapter 7
Conclusion and Future Work

Telemedicine has enormous benefits in the sector of healthcare. Various applications can be
developed for the telemedicine to provide better services with combined effort of medical
science. Telemedicine endeavor is expanding its outreach day by day and has the potential to
open up new frontiers for facilitating rural healthcare. Thus, telemedicine can enlarge the gap
between life and death and can extend quality healthcare to the needy and the under privileged
rural, semi rural and urban population at large.
Setting up the infrastructure for telemedicine network is a very costly process, because of the
large investment involved in it. Its usage is limited and not in the reach of underdeveloped
countries. This calls for inventing cheaper and faster methods for delivering telemedicine
information from one end point to another end point.

123
References
[1] Pandian, P.S. ,Safeer, K.P., Shakunthala, D.T. ,Gopal, P, Padaki, V.C.” Internet Protocol
Based Store and Forward Wireless Telemedicine System for VSAT and Wireless Local Area
Network” IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24,
2007. pp.54-58.
[2] Shazia Karim, Imran Sarwar Bajwa,”Clinical Decision Support System based Virtual
Telemedicine”2011 Third International Conference on Intelligent Human-Machine Systems and
Cybernetics
[3]Carlos Dafonte, Angel Gomez , Bernardino Arca, and Jose A. Taboada “Intelligent
Management of Processes in a ICU Telemedicine System” Proceedings of the 22nd Annual
EMBS International Conference, July 23-28,2000, Chicago IL.

124

You might also like