Image Gallery
#1

[attachment=11139]
1. Introduction
1.1. Outline of the Project Report

Visitors belonging to access category which has access permission "Read" are allowed: to show images in the album, to post a comment to an image, to start slide show
Visitors belonging to access category which has access permission "Write" are allowed: to post images in the album.
This is special access permission rights. Only one of registered user accounts can be owner of the album at the same time. When user account is set as owner of particular album it has "Read", "Write" access permission rights and is allowed to control access permission rights to the access categories but not allowed to control "Owner" right and "Primary Group". "Owner" access permission right and "Primary Group" is controlled by visitor or visitors with Administration authorization only
Group
All visitors which user accounts are members of the "Primary Group" and fulfill conditions of Authorized authorization belong to this access category.
Other
All visitors which user accounts are not members of the "Primary Group" and fulfill conditions of Authorized authorization belong to this access category.
Unregistered
All visitors who fulfill conditions of unauthorized authorization belong to this access category.
1.2 Modules
2.SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:

System Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. Here the key question is what all problems exist in the present system? What must be done to solve the problem? Analysis begins when a user or manager begins a study of the program using existing system.
During analysis, data collected on the various files, decision points and transactions handled by the present system. The commonly used tools in the system are Data Flow Diagram, interviews, etc. Training, experience and common sense are required for collection of relevant information needed to develop the system. The success of the system depends largely on how clearly the problem is defined, thoroughly investigated and properly carried out through the choice of solution. A good analysis model should provide not only the mechanisms of problem understanding but also the frame work of the solution. Thus it should be studied thoroughly by collecting data about the system. Then the proposed system should be analyzed thoroughly in accordance with the needs.
2.2 PROPOSED SYSTEM:
Proposed system is an Image Gallery. According to designate we can create an account. Our proposed system has the following advantages.
 User friendly Interface
 Fast access to database
 Less error
 Storage Capacity
2.3 Feasablity Study
Administrator has the highest authority to edit/delete/create database
Unauthorized This is minimal authorization assigned to a user who is not restricted in access to the site containing the gallery at all. The categories of visitors are the following: all visitors who don't have any user account; all visitors who have user account but still have not logged in; all visitors who have performed logoff process. Typically this mode is used for public access.
Authorized This authorization mode is for ordinary users of PHP Image Gallery. The categories of visitors are the following: all visitors who have logged in and belong to one of the registered groups with the exception of visitors with Administration authorization. This is general authorization mode and it very useful when you as gallery administrator need to allow or to restrict access for some users to part of the gallery. Permission management in Authorization mode is more flexible than in Unauthorized
Administration This authorization mode can have users who belong to one specific group only. Normally, these users have exclusive (administrative) privileges to perform maintenance tasks within PHP Image Gallery. The group is one of the registered groups. The categories of visitors are the following: all users that have an account and have successfully performed login process and the user account belongs to a group which is assigned as Admin group in Site settings. How to configure this group will be discussed in Site Setup section.
Reliability
Data validation and verification needs to be done at every stage of activity.
• Validating user input
• Use of locking mechanism while updating database like transaction processing
• Recovering the transaction using rollback.
Portability
• The web application will be built using PHP which has support to run on any platform provided the required compilers are available.
• For database either XML or MySQL would be used, that too has extensive support over many popular architectures and operating systems.
SYSTEM SPECIFICATION
HARDWARE REQUIREMENTS

Processor : Intel Pentium IV 2.4 GHZ or above
Clock speed : 500 MHZ
System bus : 32 bits
RAM : 256MB of RAM
HDD : 40 GB or higher
Monitor : SVGA COLOR
Keyboard : 108Keys
Mouse : 2 button mouse
SOFTWARE REQUIREMENTS
OS : MS WINDOWS XP SP2
Environment : Java Runtime Environment 1.5
Front end : ASP
Back end : Microsoft Access 2003
ABOUT MS-ACCESS
Access is a relational database program .Access is used to enter, edit, and analyze lists of data. Relational databases minimize redundant data
Advantages of Access
• Duplicate data is minimized
• Information is more accurate
• Data entry is faster and easier
• Information can be viewed and sorted in multiple ways.
• Information is more secure
• Information can be shared among several users
• Information retrieval is faster and easier
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hand water pump with pendulam hd gallery images, powered by mybb photo gallery, fakes forgeries national gallery, forgeries national gallery, arts gallery dfd leval 0, image gallery code, bbc album charts,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Online Art Gallery project topics 2 5,011 12-09-2017, 01:27 PM
Last Post: Mohankumari
  Content-based image retrieval (CBIR) System project topics 15 13,792 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  image processing projects ideas project topics 4 5,062 05-01-2016, 02:22 PM
Last Post: seminar report asees
  Image Processing - Noise Reduction project topics 3 3,778 26-08-2015, 02:55 PM
Last Post: dhivya srinivasan
  Developing a web application to transfer image and patient information project report maker 2 3,680 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,898 22-07-2013, 09:37 PM
Last Post: Guest
  Image Transfer Protocol for Internt project topics 3 2,285 26-03-2013, 07:42 PM
Last Post: vvk chary
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,804 04-02-2013, 04:49 PM
Last Post: seminar details
  Efficient Graph-Based Image Segmentation seminar class 2 3,362 02-02-2013, 01:58 PM
Last Post: seminar details
  IMAGE SEGMENTATION full report seminar class 5 5,516 30-11-2012, 01:03 PM
Last Post: seminar details

Forum Jump: