43 research outputs found

    Sales Management Portal

    Get PDF
    The sales management portal: The sales management portal is mostly used to process and store the data of the client and the staff this helps us in maintaining the records and manage the sales environment in the most proper way this portal helps us to have a better communication with the client and help the client to know about the services we provide This portal helps the employees to make proposals that could increase the sales and help them to work with the other staff towards the project this is also essential for the managers to organize the work force and manage the resources There are different modules in this portal they are as follows Client module Administrator Module Search Module Client Module: The client has a module he could login and see the opportunities i.e. products and services provided to the client and he could opt in for the newsletter and have the project updates and he could see the project status and progress reports and log out Administrator Module: The Administrator has a module giving him a complete access to the project reports proposals, client details, employee details and manager details he manages the project reports, client reports, project status and progress reports, project duration and Amount details have been accessed and regulated by the administrator the user/employee and the manager login and profile details and access information and adding and deleting employees, client and managers is also been processed by the administrator. Search Module: This module helps the user and administrator to search the opportunity’s and filter them and give us the appropriate and precise search results based on the key words entered in the search bar this helps the users and the administrator to sort the client list carefully and they don’t have to browse through the entire database to look for one client. Sub Forms: In the sale project we have sub forms which has been divided into 5 categories General info: This form consists of general information of the client. Contacts: This from consists of the contact information of the client. Notes: This form consists of the special required information of the client. Opportunities: This form consists of the required opportunities of the client. Proposal: This form consists of proposal required for the clients. Project: This form consists of the information of the projects. All the above sub forms have different sub categories in their form which can added, deleted and can be modified by the admin only. These forms give us a clear idea about the information that has been gathered for the project by the client. Security: The above Processes have the two step verifications for the login processes for security purposes and the manager, employee and the client have the mobile friendly applications that could easily work with their respective portable devices Technical Details UI: HTML 5, CSS3 Tools: Microsoft Visual Studio 2015 Database: My SQL Operating System: Windows 10 Web Application Tools: JavaScript, JS

    Peer-to-Peer Distributed SyD Directory Synchronization in a Proximity-based Environment

    Get PDF
    Distributed directory services are an evolving paradigm in the distributed computing arena. They are a shift from the centralized directory that causes delay and does not scale well to widespread peer-to-peer networks. With networking becoming more pervasive, there is a need to integrate the heterogeneity of device, data and network with the applications that are built on them. SyD or System on Mobile Devices is a middleware that is being used to implement such a distributed directory service. To provide a persistent global view of data, we serialize and synchronize the distributed directories. The SyD APIs provide a high-level environment to rapidly develop collaborative applications for such networks in a systematic manner. An intervehicle communication application that notifies the driver of a vehicle of the available parking spots in the vicinity, allows us to see the practical working and benefits of the distributed directory paradigm

    GSU Event Portal

    Get PDF
    The GSU Events website will solve a major problem with the current student portal - GSU student boredom. The current GSU Student portal is lacking entertainment, and the GSU Events website will fill that gap. The entertainment piece is currently not available on the GSU Student Portal, and this feature will hopefully be added to the GSU Student Portal in the near future. It will be a way for students to communicate and advertise music, theater, conferences, and entertainment in the surrounding area. It could also be used and advertised for new students to explore the area and get to know their new environment. The GSU Events website will be an excellent addition to the existing GSU Student Portal, and will be used by all GSU students. The GSU Events feature will be ready for release December 4th, 2017

    Better Reviews

    Get PDF

    Developing Reactive Distributed Aerial Robotics Platforms for Real-time Contaminant Mapping

    Get PDF
    The focus of this research is to design a sensor data aggregation system and centralized sensor-driven trajectory planning algorithm for fixed-wing aircraft to optimally assist atmospheric simulators in mapping the local environment in real-time. The proposed application of this work is to be used in the event of a hazardous contaminant leak into the atmosphere as a fleet of sensing unmanned aerial vehicles (UAVs) could provide valuable information for evacuation measures. The data aggregation system was designed using a state-of-the-art networking protocol and radio with DigiMesh and a process/data management system in the ROS2 DDS. This system was tested to consistently operate within the latencies and distances tolerated for the project while being highly extensible to sensor configurations. The problem of creating optimal trajectory planning for exploration has been modelled accurately using partially-observable Markov decision processes (POMDP). Deep Reinforcement learning (DRL) is commonly applied to approximate optimal solutions within a POMDP as it can be analytically intractable for complex state spaces. This research produces a POMDP that describes this exploration problem and applies the state-of-the-art soft actor-critic (SAC) reinforcement learning algorithm to create a policy that produces near-optimal trajectories within this new POMDP. A subset of the spatially relevant inputis used instead of complete state during training and a turn-taking sequential planner is designed for using multiple UAVs to help mitigate scalability problems that come with multi-UAV coordination. The learned policy from SAC can outperform a greedy and fixed trajectory on 1, 2, and 3 UAVs by a 30% margin on average. The turn-taking strategy provides small, but repeatable scaling benefits while the windowed input results in a 50%-60% increase in reward versus trained networks without windowed input. The proposed planning algorithm is effective in dynamic map exploration and has the potential to increase UAV effectiveness in atmospheric contaminant leak monitoring as it is expanded to be integrated on real-world UAVs

    Distributed Web Service Coordination for Collaboration Applications and Biological Workflows

    Get PDF
    In this dissertation work, we have investigated the main research thrust of decentralized coordination of workflows over web services. To address distributed workflow coordination, first we have developed “Web Coordination Bonds” as a capable set of dependency modeling primitives that enable each web service to manage its own dependencies. Web bond primitives are as powerful as extended Petri nets and have sufficient modeling and expressive capabilities to model workflow dependencies. We have designed and prototyped our “Web Service Coordination Management Middleware” (WSCMM) system that enhances current web services infrastructure to accommodate web bond enabled web services. Finally, based on core concepts of web coordination bonds and WSCMM, we have developed the “BondFlow” system that allows easy configuration distributed coordination of workflows. The footprint of the BonFlow runtime is 24KB and the additional third party software packages, SOAP client and XML parser, account for 115KB

    Collaborative Edge Computing in Mobile Internet of Things

    Get PDF
    The proliferation of Internet-of-Things (IoT) devices has opened a plethora of opportunities for smart networking, connected applications and data driven intelligence. The large distribution of IoT devices within a finite geographical area and the pervasiveness of wireless networking present an opportunity for such devices to collaborate. Centralized decision systems have so far dominated the field, but they are starting to lose relevance in the wake of heterogeneity of the device pool. This thesis is driven by three key hypothesis: (i) In solving complex problems, it is possible to harness unused compute capabilities of the device pool instead of always relying on centralized infrastructures; (ii) When possible, collaborating with neighbors to identify security threats scales well in large environments; (iii) Given the abundance of data from a large pool of devices with possible privacy constraints, collaborative learning drives scalable intelligence. This dissertation defines three frameworks for these hypotheses; collaborative computing, collaborative security and collaborative privacy intelligence. The first framework, Opportunistic collaboration among IoT devices for workload execution, profiles applications and matches resource grants to requests using blockchain to put excess capacity at the edge to good use. The evaluation results show app execution latency comparable to the centralized edge and an outstanding resource utilization at the edge. The second framework, Integrity Threat Identification for Distributed IoT, uses a new spatio-temporal algorithm, based on Local Outlier Factor (LOF) uniquely using mean and variance collaboratively across spatial and temporal dimensions to identify potential threats. Evaluation results on real world underground sensor dataset (Thoreau) show good accuracy and efficiency. The third frame- work, Collaborative Privacy Intelligence, aims to understand privacy invasion by reverse engineering a user’s privacy model using sensors data, and score the level of intrusion for various dimensions of privacy. By having sensors track activities, and learning rule books from the collective insights, we are able to predict ones privacy attributes and states, with reasonable accuracy. As the Edge gains more prominence with computation moving closer to the data source, the above frameworks will drive key solutions and research in areas of Edge federation and collaboration

    FPGA Based Binary Heap Implementation: With an Application to Web Based Anomaly Prioritization

    Get PDF
    This thesis is devoted to the investigation of prioritization mechanism for web based anomaly detection. We propose a hardware realization of parallel binary heap as an application of web based anomaly prioritization. The heap is implemented in pipelined fashion in FPGA platform. The propose design takes O(1) time for all operations by ensuring minimum waiting time between two consecutive operations. We present the various design issues and hardware complexity. We explicitly analyze the design trade-offs of the proposed priority queue implementations

    The Internet of Things: Multi-faceted Research Perspectives

    Get PDF
    Living beyond the hype, the Internet of things (IoT) continues to grow and has clearly emerged as a leading-edge topic in information systems. As the IoT moves beyond novel technologies and exploratory sandbox initiatives to ubiquitous technologies and full production, understanding the phenomenon surrounding IoT challenges and issues has become even more important. In this paper, we explore the critical issues and challenges currently facing IoT adoption and implementation in order to identify areas that require further study. Specifically, we discuss IoT from several key perspectives including IoT connectivity, platforms and 5G, IoT analytics, IoT privacy, security, and litigation risks, IoT business value and monetization, and human interaction with IoT and design considerations Finally, through identifying the current state of IoT and IoT research, we identify potential areas of contribution and future directions for IoT research

    Advanced Applications in the Field of Structural Control and Health Monitoring After the 2009 L’Aquila Earthquake

    Get PDF
    The earthquake, which has been occurred on 6 April 2009, has been a catastrophic event for both the city and the University of L’Aquila [1]. Nevertheless, the disaster have to be trans‐ formed in a tremendous opportunity to revitalize the area, with important benefit for the national and international scientific community to experience the effectiveness of new system
    corecore