VISVESVARAYA TECHNOLOGICAL UNIVERSITY
“JNANA SANGAMA”, BELAGAVI - 590 018
A PROJECT REPORT
on
“PROJECT TITLE”
Submitted by
Student Name 1 4SF15CS001
Student Name 2 4SF15CS002
Student Name 3 4SF15CS003
Student Name 4 4SF15CS004
In partial fulfillment of the requirements for the award of
BACHELOR OF ENGINEERING
in
COMPUTER SCIENCE & ENGINEERING
Under the Guidance of
Guide Name
Designation, Department of CSE
at
SAHYADRI
College of Engineering & Management
Adyar, Mangaluru - 575 007
2018 - 19
SAHYADRI
College of Engineering & Management
Adyar, Mangaluru - 575 007
Department of Computer Science & Engineering
CERTIFICATE
This is to certify that the project entitled “Project Title” has been carried out by
Student Name 1 (4SF14CS001), Student Name 2 (4SF14CS002), Student Name
3 (4SF14CS003) and Student Name 4 (4SF14CS004), the bonafide students of
Sahyadri College of Engineering & Management in partial fulfillment for the award of
Bachelor of Engineering in Computer Science & Engineering of Visvesvaraya Technological
University, Belagavi during the year 2018 - 19. It is certified that all corrections/suggestions
indicated for Internal Assessment have been incorporated in the Report deposited in the
departmental library. The project report has been approved as it satisfies the academic
requirements in respect of project work prescribed for the said degree.
———————————– ——————————— ————————————–
Signature of the Guide Signature of the HOD Signature of the Principal
Guide Name Dr. J V Gorabal Dr. R Srinivasa Rao Kunte
External Viva:
Examiner’s Name Signature with Date
1. . . . . . . . . . . . . . . . . . . . . . .....................
2. . . . . . . . . . . . . . . . . . . . . . .....................
SAHYADRI
College of Engineering & Management
Adyar, Mangaluru - 575 007
Department of Computer Science & Engineering
DECLARATION
We hereby declare that the entire work embodied in this Project Report titled “Project
Title” has been carried out by us at Sahyadri College of Engineering and Management,
Mangaluru under the supervision of Guide Name, for the award of Bachelor of Engi-
neering in Computer Science & Engineering. This report has not been submitted to
this or any other University for the award of any other degree.
Student Name 1 (4SF15CS001)
Student Name 2 (4SF15CS002)
Student Name 3 (4SF15CS003)
Student Name 4 (4SF15CS004)
Dept. of CSE, SCEM, Mangaluru
Abstract
Hadoop is an open source software project that enables the distributed processing of large
data sets across clusters of commodity servers. It is designed to scale up from a single
server to thousands of machines, with a very high degree of fault tolerance. In this project,
Hadoop will be deployed in virtual machine which can be obtained from Kernel-based
Virtual Machine (KVM) virtualization infrastructure. And in this a new MapReduce cloud
service model is proposed for data analytics in the cloud. Existing services require users
to select a number of complex cluster and job parameters while simultaneously forcing
the cloud provider to use those potentially sub-optimal configurations resulting in poor
resource utilization and higher cost. So avoid this create different clusters initial state,
Instead of customers to decide the resources to be used for the jobs, this model leverages
MapReduce profiling to automatically select appropriate cluster configuration for the job.
In this project resource(memory) utilization efficient compare to other existing one.
i
Acknowledgement
It is with great satisfaction and euphoria that we are submitting the Project Report on
“Project Title”. We have completed it as a part of the curriculum of Visvesvaraya
Technological University, Belagavi for the award of Bachelor of Engineering in Computer
Science & Engineering.
We are profoundly indebted to our guide, Guide Name, Designation, Department of
Computer Science & Engineering for innumerable acts of timely advice, encouragement
and We sincerely express our gratitude.
We also thank Project Coordinator name1, Project Coordinator name2 and Project
Coordinator name3, Project Coordinators, Department of Computer Science & Engi-
neering for their constant encouragement and support extended throughout.
We express our sincere gratitude to Dr. J V Gorabal, Head & Professor, Department of
Computer Science & Engineering for his invaluable support and guidance.
We sincerely thank Dr. R Srinivasa Rao Kunte, Principal, Sahyadri College of En-
gineering & Management, Dr. Umesh M. Bhushi, Director Strategic and Planning,
Sahyadri College of Engineering & Management, and Dr. D. L. Prabhakara, Director,
Sahyadri Educational Institutions,who have always been a great source of inspiration.
Finally, yet importantly, We express our heartfelt thanks to our family & friends for their
wishes and encouragement throughout the work.
Student Name 1 (4SF15CS001)
Student Name 2 (4SF15CS002)
Student Name 3 (4SF15CS003)
Student Name 4 (4SF15CS004)
ii
Table of Contents
Abstract i
Acknowledgement ii
Table of Contents iv
List of Figures v
List of Tables vi
1 Introduction 1
1.1 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2 Literature Survey 3
3 Problem Definition 6
4 Software Requirements Specification 7
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.3 User Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.3.1 Farmer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.3.2 Admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.4 Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.4.1 Hardware Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.4.2 Software Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.5 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.6 Non-Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 8
iii
5 System Design 10
5.1 Architecture Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.2 Decomposition Description . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.3 Data Flow Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.4 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.5 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.6 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.7 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6 Implementation 17
7 System Testing 18
8 Results and Disscussion 20
9 Conclusion and Future work 21
Appendix 23
iv
List of Figures
5.1 System Architecture Diagram . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.2 Flow chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.3 Data Flow Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.4 Sequence diagram for the proposed system . . . . . . . . . . . . . . . . . . 12
5.5 Sequence diagram for the admin and cluster server . . . . . . . . . . . . . 13
5.6 Use case diagram for customer . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.7 Use case diagram for customer . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.8 Class diagram for the system . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.9 Activity diagram for proposed system . . . . . . . . . . . . . . . . . . . . . 15
v
List of Tables
7.1 Work Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
7.2 Test cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
vi
Chapter 1
Introduction
Information and communication are the essential part of human life. The demand for
the food, cloth, etc. are increasing with respect to the increasing population, to which
researchers and scientists are trying to find innovative solutions.in India the major source
of income is the agriculture itself hence its known as “land of agriculture”. Ever since
people learned to grow crops, harvest them and sell them to market, they have tried to
increase the profit by seeking information from others. But the information gained by
farmers over the centuries is not adequate to grow crops in the varying weather condition,
soil fertility, pests and diseases. This has raised the need for the latest information which
allows the farmers to deal with these changes smoothly.
There is a huge demand in the market for web services based on agriculture. The
applications with varying requirements help the agriculturist to do several jobs like designs,
decision making, chemical analyses, and GPS centred services etc. Portable devices provide
an appropriate information entree point and are convenient to be carried everywhere.
Developments in cloud computing has significantly helped in recent years. Based on
their requirements the services can be accessed by the users regardless of how the services
have been delivered and where the services have been hosted. Several computing models
have assured to deliver the value of computing visualization that include clustering, Grid
computing, and Cloud computing which is most recently used.
The organizations and users are able to access applications from anywhere in the world,
this infrastructure is referred as cloud. Rather than running the service on the individual
computers, the computing environment has developed a software for thousands and mil-
lions of users. Instead of accessing and storing, the data and programs in the computer’s
hard drive, the information is present in the internet which is referred to as cloud com-
puting. Cloud Technology has established as a scientifically, commercially and industrially
1
Project Title Chapter 1
important technology worldwide on the basis of its huge storage capacity and scalability.
Thus seeing the various prospects System deals with providing a security measure for
the transmission of data over network. Perhaps it is used conveniently mailing applica-
tion. The output of Requirement Specification is the “Software Requirement Specification”
(SRS). The SRS is a document, which describes completely the external behavior of the
software. It is the first and foremost work of a software developer to study the system to
be developed and specify the user requirements before going for the designing part.
1.1 Purpose
The main purpose of this project is to presents a new MapReduce cloud service model,
for data analytics in the cloud. I argued that existing cloud services for MapReduce are
inadequate and inefficient for production workloads.The resource management for large
number of nodes is quite difficulty from aspect of configuration, deployment and efficient
resource utilization. By deploying virtual machines, Hadoop management becomes much
easier. Sometime the resource utilization may not be optimized.
1.2 Scope
The resource management for large number of nodes is quite difficulty from aspect of
configuration, deployment and efficient resource utilization. This model will select best
configuration for job using MapReduce profiling. This resource management technique
includes cost-aware resource provisioning, VMaware scheduling and online virtual machine
reconfiguration.
1.3 Overview
Since the size of the data is growing at a much higher rate than the rate of accessing the
data, it became very important to create new system which can handle huge volume of
data without deteriorating the performance. New concepts like Cloud computing, MapRe-
duce and its open source implementation Hadoop became widely accepted for doing large
scale data analysis. This model will allow customer to select best configuration for data
analytical process. And it will reduce the resource utilization in efficient manner.
Department of Computer Science and Engineering, SCEM, Mangaluru Page 2
Chapter 2
Literature Survey
This chapter gives the details of the various works which were carried out for scalable data
sharing in cloud storage.
In [2], B. Wang et al. proposed a simple, efficient, and publicly verifiable approach to
ensure cloud data integrity without sacrificing the anonymity of data owners nor requiring
significant overhead. Specifically, security-mediator (SEM) is introduced which is able
to generate verification metadata (i.e., signatures) on outsourced data for data owners.
The approach decouples the anonymity protection mechanism from the PDP. Thus, an
organization can employ its own anonymous authentication mechanism, and the cloud is
oblivious to that since it only deals with typical PDP-metadata. Consequently, the identity
ofthe data owner is not revealed to the cloud, and there is no extra storage overhead unlike
existing anonymous PDP solutions. The distinctive features of this scheme also include
data privacy, such that the SEM does not learn anything about the data to be uploaded
to the cloud at all, and thus the trust on the SEM is minimized.
In [4], J. Benaloh et al. presented an encryption scheme which is originally proposed
for concisely transmitting large number of keys in broadcast scenario. The construction
is simple and briefly reviews its key derivation process for a concrete description of what
are the desirable properties to be achieved. The derivation of the key for a set of classes
(which is a subset of all possible cipher text classes) is as follows. A composite modulus
N= p*q is chosen where p and q are two large random primes. A master-secret Y is chosen
at random from ZN. Each class is associated with a distinct prime ei. All these prime
numbers can be put in the public system parameter. A constant-size key for set S0 can be
generated . This approach achieves similar properties and performances as our schemes.
F. Guo et al. introduced Identity-Based Encryption (IBE) in [6], which is a type of
public-key encryption in which the public-key of a user can be set as an identity string
3
Project Title Chapter 2
of the user (e.g., an email address). There is a trusted party called private key generator
in IBE which holds a master-secret key and issues a secret key to each user with respect
to the user identity. The encryptor can take the public parameter and a user identity to
encrypt a message. The recipient can decrypt this cipher text by his secret key. Guo et
al. tried to build IBE with key aggregation. One of their schemes assumes random oracles
but another does not. In their schemes, key aggregation is constrained in the sense that
all keys to be aggregated must come from different “identity divisions.”
V. Goyal et al. introduced Attribute-Based Encryption (ABE) which allows each cipher
text to be associated with an attribute, and the master-secret key holder can extract a
secret key for a policy of these attributes in [9], so that a cipher text can be decrypted by
this key if its associated attribute conforms to the policy. For example, with the secret key
for the policy, one can decrypt cipher text tagged with class 2, 3, 6, or 8. However, the
major concern in ABE is collusion resistance but not the compactness of secret keys.Indeed,
the size of the key often increases linearly with the number of attributes it encompasses, or
the cipher text-size is not constant. To delegate the decryption power of some cipher texts
without sending the secret key to the delegatee, a useful primitive is proxy re-encryption
(PRE).
R. S. Sandhu has explained about the Cryptographic key assignment schemes in [10],
which aim to minimize the expense in storing and managing secret keys for general cryp-
tographic use. Utilizing a tree structure, a key for a given branch can be used to derive
the keys of its descendent nodes. Just granting the parent key implicitly grants all the
keys of its descendent nodes. The author proposed a method to generate a tree hierarchy
of symmetric keys by using repeated evaluations of pseudorandom function/block-cipher
on a fixed secret. The concept can be generalized from a tree to graph. More advanced
cryptographic key assignment schemes support access policy that can be modelled by an
acyclic graph or a cyclic graph.
V. Goyal et al. introduced Attribute-Based Encryption (ABE) which allows each cipher
text to be associated with an attribute, and the master-secret key holder can extract a
secret key for a policy of these attributes in [9], so that a cipher text can be decrypted by
this key if its associated attribute conforms to the policy.The author proposed a method to
generate a tree hierarchy of symmetric keys by using repeated evaluations of pseudorandom
function/block-cipher on a fixed secret. The concept can be generalized from a tree to
graph. More advanced cryptographic key assignment schemes support access policy that
can be modelled by an acyclic graph or a cyclic graph.
Department of Computer Science and Engineering, SCEM, Mangaluru Page 4
Project Title Chapter 2
V. Goyal et al. introduced Attribute-Based Encryption (ABE) which allows each cipher
text to be associated with an attribute, and the master-secret key holder can extract a
secret key for a policy of these attributes in [9], so that a cipher text can be decrypted by
this key if its associated attribute conforms to the policy. For example, with the secret key
for the policy, one can decrypt cipher text tagged with class 2, 3, 6, or 8. However, the
major concern in ABE is collusion resistance but not the compactness of secret keys.Indeed,
the size of the key often increases linearly with the number of attributes it encompasses, or
the cipher text-size is not constant. To delegate the decryption power of some cipher texts
without sending the secret key to the delegatee, a useful primitive is proxy re-encryption
(PRE).
V. Goyal et al. introduced Attribute-Based Encryption (ABE) which allows each cipher
text to be associated with an attribute, and the master-secret key holder can extract a
secret key for a policy of these attributes in [9], so that a cipher text can be decrypted by
this key if its associated attribute conforms to the policy. For example, with the secret key
for the policy, one can decrypt cipher text tagged with class 2, 3, 6, or 8. However, the
major concern in ABE is collusion resistance but not the compactness of secret keys.Indeed,
the size of the key often increases linearly with the number of attributes it encompasses, or
the cipher text-size is not constant. To delegate the decryption power of some cipher texts
without sending the secret key to the delegatee, a useful primitive is proxy re-encryption
(PRE).
Department of Computer Science and Engineering, SCEM, Mangaluru Page 5
Chapter 3
Problem Definition
To design an efficient public-key encryption scheme which supports flexible delegation
in the sense that any subset of the cipher texts (produced by the encryption scheme) is
decryptable by a constant-size decryption key (generated by the owner of the master-secret
key).
6
Chapter 4
Software Requirements Specification
4.1 Introduction
Software Requirement Specification totally defines how the projected software behaves
without unfolding how the software will perform it. The elementary objective of the
requirement stage is to yield the software requirement specification that designates the pe-
ripheral performance of the projected software. Software requirement can be well- defined
as a condition of a capability required by a user to solve a problem or attain an objective.
4.2 Purpose
The purpose of this project is to obtain information regarding the pesticides for the plant
diseases by sending an image of the infected plant through the android phone. The pro-
posed system will match the image received with the available database and provide output
to the user. The system can also provide general information to the farmer on request.
4.3 User Characteristics
Two levels of user:
4.3.1 Farmer
Farmer has to click a picture of the infected crop from the android phone and send the
image to the cloud. Or else the farmer can request for information from the application
from the menu provided.
7
Project Title Chapter 4
4.3.2 Admin
The admin has to maintain the database and update on necessary.
4.4 Interfaces
4.4.1 Hardware Interfaces
• Processor : Any processor above 500 MHz
• RAM : 1GB
• Hard Disk : 5GB
• Input Device : Standard keyboard and Mouse
• Output Device : Monitor
4.4.2 Software Interfaces
• Database : Sqlyog Enterprise.
• Programming Language : MATLAB, Java.
• Server :NETBEANS
• Application Software :ANDROID SDK
4.5 Functional Requirements
4.6 Non-Functional Requirements
• Security:
High level of security is provided in the cloud storage for the stored data. To update
the cloud database admin has to authenticate himself with appropriate username
and password.
• Availability:
System will be available at any point of time when both server and mobile is con-
nected to the same hotspot.
Department of Computer Science and Engineering, SCEM, Mangaluru Page 8
Project Title Chapter 4
• Portability:
This application can be ported to any of the android phones, from API level 16 to
25 i.e. from jellybean to marshmallow.
• Maintainability:
The system can be repaired within a specified period of time. If maintainability is
increased repair time will be comparatively less.
• Reliability:
The system will function under stated conditions without failure for the given period
of time.
Department of Computer Science and Engineering, SCEM, Mangaluru Page 9
Chapter 5
System Design
5.1 Architecture Design
Figure 5.1: System Architecture Diagram
Customer will interact with the system through application server, will assign the job
with deadline. Once job is assigned admin will request for the master slave for information
about slave virtual machine details. Then calculate minimum requirement for execute
job. After assign job to master, it will process the job and return the result. The main
functionality, calculating minimum nodes, is done by admin.
5.2 Decomposition Description
Figure 3.2 represent the flow chart of the proposed system. The customer will be submitting
job with deadline. Then admin will request for client information. According to what ever
10
Project Title Chapter 5
information acquired calculating minimum requirement of resources.After this step do the
configuration with number of selected nodes and perform the mapreduce job.
Figure 5.2: Flow chart
5.3 Data Flow Design
A data flow diagram(DFD) is a graphical representation of the ”flow” of data through an
information system .DFDs can also be for the visualization of data processing.On a DFD,
data items flow from an external data source or an internal data store to an internal data
store or an external data sink, via an internal process. A DFD provides no information
about the timing or ordering of processes, or about whether processes will operate in
sequence or in parallel.It is therefore quite different from a flowchart , which shows the
flow of control through an algorithm, allowing users to determine what operations will be
performed, in what order, and under what circumstances, but not what kinds of data will
be input to and output from the system,nor where the data will come from and go to, nor
where the data will be stored.
5.4 Sequence Diagram
A sequence diagram in Unified Modeling Language(UML) is a kind of interaction diagram
that shows how processes operate with one another and in what order .It is a construct of a
Message Sequence Chart. A sequence diagram shows , as parallel vertical lines (”lifelines”)
,different processes or objects that live simultaneously ,and ,as horizontal arrows. the
Department of Computer Science and Engineering, SCEM, Mangaluru Page 11
Project Title Chapter 5
Figure 5.3: Data Flow Design
messages exchanged between them , in the order in which they occur. Following Diagram
shows the sequence of steps for the proposed system. First diagram shows the sequence of
activities for the different entities of the system. Second diagram shows the sequence of
activities which is happens between admin and cluster server.
Figure 5.4: Sequence diagram for the proposed system
5.5 Use case Diagram
Use case diagram shows the interaction between user and the system. Use case diagram
captures goals of the user and responsibility of system to its users. Use case diagram shows
various functions that can be performed by various actors.
A use case is an interaction between users and a system. It captures the goal of the users
and the responsibility of the system to its users . A user case diagram is a group of actors
Department of Computer Science and Engineering, SCEM, Mangaluru Page 12
Project Title Chapter 5
Figure 5.5: Sequence diagram for the admin and cluster server
, a set of use cases enclosed by a system boundary ,communication associations between
the actors and use cases and generalization among the use cases.
An actor specifies the role played by the person or thing when interacting with the system.
An actor is someone or something outside the system that either acts on the system- a
primary actor - or is acted on by a system- a secondary actor. Actors represent the different
roles that something outside has in its relationship with the system whose functional
requirements are being specified.
A use case describes a sequence of actions between system and actors which is drawn
as a horizontal ellipse. Associations between actors and use cases are indicated in use
case diagrams by solid lines .An association exists whenever an actor is involved with an
interaction described by a use case.
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals(represented as use cases), and any dependencies between those use cases. The main
purpose of a use case diagram is to show what system functions are performed for which
actor. In this proposed system there are several functions for user and system are shown
below.
Department of Computer Science and Engineering, SCEM, Mangaluru Page 13
Project Title Chapter 5
Figure 5.6: Use case diagram for customer
Figure 5.7: Use case diagram for customer
Department of Computer Science and Engineering, SCEM, Mangaluru Page 14
Project Title Chapter 5
5.6 Class Diagram
Class diagrams provide a graphic notation for modelling classes and their relationships,
their by describing possible objects. Class diagrams are useful both for abstract modelling
and for design for designing actual programs. They are concise, easy to understand, and
work well in practice.
Figure 5.8: Class diagram for the system
5.7 Activity Diagram
Figure 5.9: Activity diagram for proposed system
An activity diagram shows the sequence of steps that make up a complex process, such
as an algorithm or work flow. an activity diagram show of flow of control, similar to a
Department of Computer Science and Engineering, SCEM, Mangaluru Page 15
Project Title Chapter 5
sequence diagram, but focuses on operations rather than objects. Activity diagrams are
most useful during the early stages of designing algorithms and wok flows.
The above digram shows the activity digram for proposed system. The elongated ovals
show activities and the arrows show their sequencing and the diamond shows a decision
point. Here once customer submit the job, system will calculate the requirements and
assign the job for processing. But the problem is if requested resources are not available
need to wait until it available. Some time interval need to calculate resources once it
available assign job and execute.
Department of Computer Science and Engineering, SCEM, Mangaluru Page 16
Chapter 6
Implementation
Explain modules with psuedocode
α is the first letter of the Greek alphabet.
n−1
xn − 1 X k
= x
x−1 k=0
x
y
17
Chapter 7
System Testing
Testing is a procedure of executing the program with unequivocal intension of [1] discover-
ing mistakes, assuming any, which makes the program, fall flat. This stage is an essential
piece of the product improvement.
It plays out an exceptionally basic part for quality affirmation and for guaranteeing
unwavering quality of programming. It is the way toward finding the mistakes and missing
operation and furthermore an entire confirmation to decide if the targets are met the client
prerequisites are fulfilled.
The objective of testing is to reveal prerequisites, outline or coding blunders in the
projects. Therefore, unique levels of testing are utilized in programming frameworks. The
testing results are utilized amid upkeep [2].
This area manages the points of interest in the various classes of the test which should
be directed to approve capacities, imperatives and execution. This can be accomplished
fundamentally by using the methods for testing, which assumes a crucial part in the im-
provement of a product.
The structure of the program is not being considered in useful testing. Test cases
are exclusively chosen on the premise of the prerequisites or particulars of a program or
module of program but the internals of the module or the program are not considered for
determination of experiments[3].
The program to be tried is executed with an arrangement of experiments and the yield
of the program for the experiments is assessed to decide whether the program is executing
not surprisingly. The accomplishment of testing in uncovering mistakes in projects depends
basically on the experiments. There are two fundamental ways to deal with testing Black
Box or functional Testing and White Box or structural testing.
18
Project Title Chapter 7
Table 7.1: Work Flow
Sl No Work Duration(in Weeks)
1 Information Collection on DFB & VNC 1
2 Information collection on development tools 2
3 Integrating DirectFB & VNC 8
4 Cross Compiling & Porting 2
5 Building JPEG libraries 2
6 Testing 2
Table 7.2: Test cases
TC# Description Expected Result Actual Result Status
TC-1 Drag Drag Drag Pass
TC-2 Drag Display Node Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
TC-3 Select Removal Selected Pass
Department of Computer Science and Engineering, SCEM, Mangaluru Page 19
Chapter 8
Results and Disscussion
Snapshots with explanation
20
Chapter 9
Conclusion and Future work
21
References
[1] S. Awatade and S. Joshi, “Improved eaack: develop secure intrusion detection system
for manets using hybrid cryptography,” in 2016 International Conference on computing
communication control and automation (ICCUBEA), pp. 1–4, IEEE, 2016.
[2] O. A. Mohamad, R. T. Hameed, and N. Ţăpuş, “Smart home security based on optimal
wireless sensor network routing protocols,” in 2015 7th International Conference on
Electronics, Computers and Artificial Intelligence (ECAI), pp. SSS–17, IEEE, 2015.
[3] S. Banerjee and A. Misra, “Minimum energy paths for reliable communication in multi-
hop wireless networks,” in Proceedings of the 3rd ACM international symposium on
Mobile ad hoc networking & computing, pp. 146–156, ACM, 2002.
22
Appendix