Monday, 13 January 2020

College Activity Management System

 College Activity Management System 

Android Projects 2019 2020

The arrangement and execution of the system is to give profit in establishment. The structure is to give profit far reaching understudy data framework and UI is to supplant the present paper records. Staff exchanges investment, results and establishment notices through a protected, online interface using android contraptions. All data is totally explored and approved on the server already certifiable record change happens. The system prepares for understudy UI, empowering understudies to get to tips and traps as given by their seniors. All data is secured securely on SQL servers managed by the Executive. The system lessens paperwork and time needed to access understudy records. As of now, establishment depended seriously on paper records for this activity which had its own impediments. This structure gives a direct interface to the help of understudy information. It can be used by enlightening associations or schools to maintain the records of understudies easily. Achieving this objective is troublesome using a manual structure as the data are scattered, can be repetitive social event apropos information may be astoundingly dull. Our proposed structure certifications to vanquish these obstacles. The paper bases on indicating information in a basicand justifiable way which gives workplaces like on the web enrollment and profile making of understudies, investment observing, roundabout warnings, result seeing along these lines diminishing written word and automating the record age process in an enlightening association. There is an extending trend for propelled instruction associations to be expected to screen understudy records. This item makes gives insights with respect to the results of research that contemplated the effect of interest on understudyexecution; examined orchestrating understudies about cooperation issues, conferred the results to partners checking admission to a Departmental game plan change, and assessed the approach educational staff should take towards poor investment [1]. It is finished up that a graduated way to deal with result watching is the best in which approve have a put, but just as a last resort. Online Participation and Feedback Framework is modifying made for step by step understudy investment in establishments, colleges and establishments. In case urges to get to the information of a particular understudyin a particular class. It is contemplated that a graduated method to manage result watching is the best response, in which sanctions have a put, albeit just if all else fails. Online Cooperation and Input Framework is modifying delivered for step by step understudy support in establishments, colleges and associations. In the occasion that urges to get to the information of a particular understudy in a particular class. There is another part which is feedback, the understudy can give the feedback at whatever point from wherever to work force. This feedback can be evaluated by the executive or the organization board of the establishment through which the secrecy of the criticism of the work force can be kept up. Thisapplication is created for step by step understudy cooperation in establishments and establishments. It can in like manner be profitable in an affiliation or association at a particular purpose of control not the aggregate application.

Online Matrimonial Android App

Isports : Mobile App For Sports Events Using Bootstrap Responsive Design

icar : Mobile App For Car Pooling Using Bootstrap Responsive Design

Business Classified Android App

Ebook Management System Based Mobile App

Citysteer

Building Construction Planner

Android App For Employee Management System For Monitoring And Controlling Process

erestaurant Android App - Real-Time Process Management System By Sharing Food Order Information

Catering Booking Android App

Cruise Ship Management Mobile App Ieee Android App

Friday, 10 January 2020

Data Transmission Security in BEM Chairman E-Voting Android Based Application

Data Transmission Security in BEM Chairman E-Voting AndroidBased Application 
Code Shoppy Androif PHP Projects 2019 2020
Abstract—Voting is a process that should be do in terms of leadership. In case, voting still use conventional methods which are less effective in terms of cost, governance, and working time. The possibility of calculation errors and fraud in the calculation process can also occur. STMIK Atma Luhur still using the conventional voting method in the election of the chairman of BEM. With the development of today’s technology, we can make electronic voting system based on Android to solve the problems of conventional voting.
E-voting security becomes fundamental things that must be considered. RSA cryptographic methods can be a solution to ensure the security. 
RSA choses because it has the advantage of difficulty level in factoring numbers into prime numbers. More difficult factoring the numbers, it will be more difficult to break the encryption. Another advantage is the form of higher security than symmetric algorithm. This algorithm is also resistant to various forms of attack, such as brute force. The security testing are using Wireshark and Eclipse LogCat. The result is the establishment of an e-voting system based on Android that is safe and confidential, so the students can do the voting quickly, whenever and wherever.Keywords—E-Voting; RSA Algorithm; Cryptography; Mobile; Android 

 INTRODUCTION 
Voting is making decision process in terms of leadership. STMIK Atma Luhur today still using conventional election methods that less effective in terms of cost, governance, time, and security. Conventional election method make possible the calculation error and fraud in the calculation process. Today, technology has been growing rapidly, and Android phone usage is also increasing. With these condition, it can be proposed election of BEM chairman using Android mobile phone. There are many benefit of using mobile e-voting like computerized voting counting process so that becomes faster, more precise, and more accurate. The cost of implementing voting can also be reduced. Users are also able to vote anywhere and anytime with their own Android phone. The possibility of fraud and error calculation can also be avoided. Security of e-voting become the fundamental things that must be considered. There are four things that must be considered, namely accurate, democracy, privacy, andverifiability [1]. To fulfill these security aspect, cryptographic methods are needed to keep safe the security of that information. There are several methods of cryptography, one of which is RSA (Rivest-Shamir Adleman). This algorithm is an asymmetric cryptographic algorithms that perform with different encryption and decryption keys. 
This algorithm chosen because it has the form of a higher security than symmetric algorithms. In addition, this method is used for applications requiring fast digital data [2]. This algorithm is also resistant to various forms of attack, especially brute force. Other advantages are the degree of difficulty in factoring numbers into primes [3]. The purpose of this study is to make mobile e-voting system based on Android with RSA algorithm method in data transmission security. II.RELATED WORKResearch by Al-Anie [4] conducted a study that the implementation of e-voting security protocol based on public key cryptosystem encryption. Nawindah [5], his work resulted the implementation of e-voting with MD5 encryption and election results were immediately visible. 
Handoyo [6] conducted a study that resulted the design of e-voting system with a cryptographic hash function without encryption and decryption. Kerem [7] resulted the use of NFC in mobile voting. Stradiotto [8] conducted the election process through the SMS protocol using web 2.0 tools and prototype system that can send voters data to the web service. Wisnu [9] resulted election-app with Hash Algorithm-1 and RSA key pair digital signing security method. Adnan [10] resulted multicore utilization for application of local e-voting purpose.  

RIVEST SHAMIR ADLEMAN (RSA)
The RSA algorithm consist from four steps : key generation, key distribution, encrytion, and decription. RSA have basic principle which are find three very large positive integers e,d, and n with modular exponentiation (m). 
A.Key Generation The RSA algorithm using a public key (e,n) to encrypt the plaintext message.To decrypt the ciphertext, RSA using private key (d,n). The following are formula to compute C which is ciphertextand M which is plaintext. 
B.Key Distribution To distribute public and private key, User A transmit the public key (n, e) to User B via general way, but not the private key. The private key is never distributed. 
C.Encryption To calculate C (ciphertext), we can use formula (1) as shown as below : C = Me mod n(1) α + β = χ. (1) (1) •C is calculation result into ciphertext (encrypted number). •M represent the plaintext that has been converted into ASCII code. •The value of e and n is a public key pair that has been generated through the key generation process. Here are the following RSA encryption flowchart shown as figure 1 : Fig. 1: RSA encryption Flowchart 
D.Decryption To calculate M (plaintext), we can use formula (2) as shown as below : M = Cdmod n (2) •M is calculation result the value that to be returned into plaintext. •C represent of the ciphertext or encrypted message that will be converted into plaintext. •The value of d and n are pairs of private key that have been generated through the key generation process.