Real-Estate Property Management
Real-Estate Property Management
V. RAJYALAKSHMI K.RADHIKA
External Signature
ACKNOWLEDGEMENT
B. Siva Prasant
DECLARATION
I hereby declare that this project report entitled
‘’REAL-ESTATE PROPERTY MANAGEMENT’’ is the
result of the original work done by us and to the best
of my knowledge a similar work has not been
submitted previously to any other University or
published any time before. This project is submitted on
the partial fulfilment or the requirement for the award
of Bachelor of Sciences.
J. Bhanu Prakash
ABSTRACT
In the present paper we propose a model for a
Steganography with Cryptography based on
digital success control system. It is suited for
digital content creator who store their digital
works in their computers want to see over the
internet where they make a complete local access
control to their works. We have developed a
prototype system for windows and tested its basic
performance. It worked well from a technical
point of view. We are convinced that this model
will serve as a new content distribution scheme
for content creators in the internet age for today
and tomorrow.
The system design is implemented with using
JAVA language for coding and Sublime text editor.
Thus, above features of this project will keep the
messages that are confidential very secret
without third-party entrance in the messages.
INDEX
1.Introduction
1.1 About the system
1.2Objectives
2.System Configuration
2.1 Software requirements
2.2 Hardware requirements
3.System analysis
3.1 Current system
3.2 Proposed system
3.3 Software requirements specifications
3.3.1 Purpose
3.3.2 Scope
3.3.3 Requirement study:
Iterative incremental model:
3.3.4 The Requirement Process
3.3.5 Project Schedule Study Phase
3.3.6 Development Phase
3.3.7 Implementation Phase
3.4 Feasibility Study
3.4.1 Feasibility study
3.4.2 Economic Feasibility
3.4.3 Technical feasibility
3.4.4 Operational Feasibility
4.Software Description
5.System Design
5.1 Design phase
5.2 UML Diagrams
5.2.1 Interaction Diagrams
a. Sequence Diagram
b. Collaboration Diagram
6.Coding
6.1 Code Efficiency
6.2 Sample Code
7.Screenshots
8.Testing and validation
8.1.1 Software Testing Techniques
8.1.2 Test case Design
8.1.3 Software testing Strategies
8.1.4 Validation Testing
8.1.4.1 Validation Test Criteria
8.1.5 Configuration Reviews
8.1.6 Implement
8.2 Test cases
8.2.1 cases for the image sixe and message length
8.2.2 cases for the key and the message
9. Conclusion
10.Biblography Books