By abdul wahid
This presentation is the property of its rightful owner.
Sponsored Links
1 / 32

By : Abdul Wahid PowerPoint PPT Presentation


  • 62 Views
  • Uploaded on
  • Presentation posted in: General

THE SUMMER TRAINING PROJECT. By : Abdul Wahid. TRAINING ORGANIZATION. Software Technology Group (Int.) Ltd . Jodhpur centre. Well known as STG. DIRECTOR : Mr.P.S.Bhadu GUIDED BY: 1.Mr.Amit Rathore 2.Mrs.Sandya Harsh.

Download Presentation

By : Abdul Wahid

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


By abdul wahid

THE

SUMMER TRAINING PROJECT

By : Abdul Wahid


Training organization

TRAINING ORGANIZATION

Software Technology Group (Int.) Ltd.

Jodhpur centre

  • Well known as STG

  • DIRECTOR :

  • Mr.P.S.Bhadu

  • GUIDED BY:

  • 1.Mr.Amit Rathore

  • 2.Mrs.Sandya Harsh


The project

THE PROJECT

NAME : AALEEF

TASKS :

1.File compression/decompression

2.File encryption/decryption

SCOPE : All types of files


Why codec and endec

WHY CODEC AND ENDEC

Previous interests

2.Real world importance

3.Uncertainty about completion

4.Concurrent learning of java


Team organization

TEAM ORGANIZATION

  • Single person project

  • Project manager to Tester – Abdul Wahid


Goals to be achieved

GOALS TO BE ACHIEVED

  • Implementation of object oriented concept

  • Easiest help & user interface

  • Reusability & future extensibility

  • Other general facilities to user


Project plan

PROJECT PLAN

  • TITLE- AALEEF

  • SCOPE-All types of files

  • SWDLC : Component based model

  • MODULES : 1.Endec 2.Codec 3.Help


Sheduling

SHEDULING


Requirement analysis

REQUIREMENT ANALYSIS

A. Functional Requirements

1.Overall Requirements(Services)

2.Functional Requirement of GUI

B. Non functional Requirements


System analysis

SYSTEM ANALYSIS

ALGORITHM DESIGNING :

CODEC: STANDARD CANONICAL HUFFMAN

ENDEC: SELF DEVELOPED


Algorithm designing

:

SYMBOL PROB

a 0.4

b 0.3

f2 0.3

SYMBOL PROB

a 0.4

SYMBOL PROB

b 0.3

a 0.4

f1 0.2

c 0.1

b 0.3

c 0.1

d 0.1

e 0.1

ALGORITHM DESIGNING

HUFFMAN COMPRESSION :

1

2


Algorithm designing1

:

SYMBOL PROB

f3 0.6

a 0.4

SYMBOL PROB

f4 1.0

ALGORITHM DESIGNING

THE HUFFMAN TREE :

0

1

0

1

0

1

0

1

3

4


Algorithm designing2

ALGORITHM DESIGNING

THE CODES :

Codes Length

a=0 1

b=11 2

c=100 3

d=1010 4

e=1011 4

Bits required in huffman coding=14

Bits required in fixed length coding=15


Algorithm designing3

ALGORITHM DESIGNING

MESSAGE ENCODING & DECODING :

Original message

b e a b d a c

Fixed length encoding

001 100 000 001 011 000 010

Huffman encoding

11 1011 0 11 1010 0 100

0

1

0

1

0

1

0

1


The canonical huffman

THE CANONICAL HUFFMAN

STEPS FOR BASE CODES :

Symbol Length

a 1

b 2

c 3

d 4

e 4

Repet from i=max code length to 1

Code=Code+Number of last codes

Code>>1;

Start_code[i]=Code

Number of= no.of codes in

last codes current length

Symbol BaseCode

d 0000

c 001

b 01

a 1


The canonical huffman1

THE CANONICAL HUFFMAN

STEPS FOR ACTUAL CODES :

Symbol BaseCode

d 0000

c 001

b 01

a 1

Symbol Code

a 1

b 01

c 001

d 0000

e 0001

1.Sort list in symbolic order

2.Increment last code and

assign codes


Algorithm designing4

ALGORITHM DESIGNING

THE ENCRYPTION ALGORITHM :

1.Read password and calculate len= password length.

2.Write len and password to destination file.

3.Read bytes from source file and to destination file write :

byte=byte value-(password length+2)


Algorithm designing5

ALGORITHM DESIGNING

THE DECRYPTION ALGORITHM :

After matching the entered password with the password in file

1.Read bytes from source file and to destination file write :

byte=byte value+(password length+2)


The dfd s

THE DFD’s

Level zero(0) DFD :


The dfd s1

THE DFD’s

LEVEL ONE(1) DFD FOR Codec :


The dfd s2

THE DFD’s

LEVEL TWO(2) DFD FOR Codec : Compress


The dfd s3

THE DFD’s

LEVEL TWO(2) DFD FOR CODEC :Decompress


The dfd s4

THE DFD’s

LEVEL ONE(1) DFD FOR Endec


The dfd s5

THE DFD’s

LEVEL TWO(2) DFD FOR ENDEC : Encrypt


The dfd s6

THE DFD’s

LEVEL TWO(2) DFD FOR ENDEC : Decrypt


System design

SYSTEM DESIGN

User’s responsibility: Familiarity with working with files.

Validations:

1.Software must dynamically interact with user.

2.User friendly message should be shown if required.

3.Level of compression/encryption should be shown by extensions.

4.Facility for showing password should be given.

Interface design:

Background colour:gray

Window’s W/H ratio:3:2

Window’s size:600:400 pixels


System design1

SYSTEM DESIGN

INTERFACE DESIGN :

Main screen:


System design2

SYSTEM DESIGN

INTERFACE DESIGN :

When “Codec” pressed:


System design3

SYSTEM DESIGN

INTERFACE DESIGN :

When “Endec” pressed:


System implementation

SYSTEM IMPLEMENTATION


Conclusion

CONCLUSION

  • PRESENT VERSION OF AALEEF

  • FUTURE PLANS

  • TRAINING EXPERIENCE


By abdul wahid

?

QUERIES


  • Login