Acknowledgements List of Figures

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Contents

Acknowledgements i

Abstract ii

Contents iii

List of Figures iv

1. Introduction 01

1.1 Organization profile 01

1.2. Organization chart 02

1.3 Introduction 02

1.4 Project Layout 03

2. Genesis of the study 04

2.1Aim 04

2.2Description of Existing System 04

2.3 proposed system 04

3. Feasibility Study 06

3.1 Operational Feasibility 06

3.2 Technical Feasibility 06

3.3Economical Feasibility 07
4. System Analysis 08

4.1Entity-Relationship Diagrams 08

4.2Use-case Diagram 09

4.3 Sequence Diagram 11

4.4Activity Diagram 12

5. System Requirements Analysis 14

5.1Hardware Requirements 14

5.2Software Requirements 14

5.3Features of software 15

6. System Design 34

6.1Denial of services 34

6.1.1 vulnerabilities 34

6.1.2 Better protection 35

6.2 Data mining 36

62.1 Association Rules 36

6.2.2 cluster Analysis 36

6.3 Outliers 37

6.3.1 Classic Outlier Approach 37

6.3.2Spartial Outer Approach 37

6.4 Input Design 37

6.5 Output Design 38

6.4 Database table 39

6.5 Algorithm 40
7
7. Implementation 42

7.1 Algorithm implementation 42

7.2 Program code and output 45

8. System Testing 67

8.1 White Box Testing 67

8.2 Black Box Testing 68

8.3 Unit Testing 69

8.4 Integration Testing 69

9. Conclusion 71

APPENDICES 71

Output screens 72

BIBLIOGRAPHY 78

APPENDIX - A Base Paper ..

APPENDIX - B Conference Paper-1 ..

APPENDIX – C Cover page and Conference Paper-2 ..

You might also like