SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Modern Engineering Research (IJMER)
                   www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-436-438      ISSN: 2249-6645

         Emailing System as the basis for making automation of email
                                   System

                                     Manumeet Mukund1, Rana Majumdar2
              1
                  Final Year Student (M.Tech.), Computer Science and Engineering, Amity University, UP, India
                                    2
                                      Asst. Prof., IT Department, Amity University, UP, India

Abstract: This thesis presents an analysis of a capability to employ email System as the basis for making automation of
email System. My project covers all the aspects of the related database technologies, such as JSP with SQL Server 2000
architecture to help determine how enterprises can implement this approach in the real insecure world, with commercial off
-the-self products, to meet their needs. There were many concerns about using the JSP and servlets with SQL Server 2000 as
the basis for using records of database, due to a trusted environment. By using appropriate trusted parts, when really
necessary, and new technologies, we can find secure solutions for creating, storing and disseminating records.
          The potential benefits of automating the service of email System is extensive especially with regard to better
utilization of time, efficiency, space and safety. Now, new advances in technology have brought a practical system within
reach. This project discusses the potential benefits of email automation, the associated technology requirements, and
cost/benefit trades.
     In order to implement the above, products, such as JSP and SQL Server 2000, are used. These are not only available
free, easily testable and commonly used, but they provide us with a great interoperability among almost all the GUI
platforms. The implementation can also be done by using other competitive technologies or platforms or can even use
similar or related commercial products.

                                                  I. INTRODUCTION
          EMailing system is a web application, which can be developed by using various web technologies such as
ASP.NET, VC++, PHP and JSP etc. Computer and communication technologies have brought revolutionary changes in the
information acquisition, processing, storage, retrieval and propagation. Keeping in view of the latest trend in Information
Technologies (IT), I have developed windows-based software called EMailing system, which provides the total solutions for
Intranet communication. EMailing system is designed using Client-Server Architecture, which imparts extra strength to
storage capacity, multiple accesses to single database, backup and restore facilities. This software has been designed after a
comprehensive study of different related functions practiced by several mail servers. The user-friendly GUI software is quiet
easy to work with.
          EMailing system is a mail tracing utility. It can receive mails from mail account and can send mail to other mail
users. It can handle received mail efficiently with tracking each mail, its recipients and messages. It also has reporting of
these mails. Mail accounts can be added and removed very easily and has many more features. It can also edit, modify, erase
or view any user‟s mail account or can assign any user any authenticity or can change the preference of mails to and from
users.


                                              II. FIGURES AND TABLES
                                                            DFDs




                                  Fig (1): Physical Context Diagram for Emailing System:
                                                             www.ijmer.com                                         436 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-436-438      ISSN: 2249-6645

Note: The Administrator is only a conceptual part of the system. The system is fully automated in itself.




                               Fig (2): First Level Logical Diagram for Emailing System:




                               Fig (3): Second Level Logical Diagram for Emailing System




                               Fig (4): Third Level Logical Diagram for Emailing System:


                                                             www.ijmer.com                                  437 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com          Vol.3, Issue.1, Jan-Feb. 2013 pp-436-438      ISSN: 2249-6645

                                                         Mail table
        Field name                                             Data type
        uid                                                    varchar(20)
        mdate                                                  datetime
        msub                                                   varchar(50)
        msize                                                  numeric
        mailin                                                 varchar(1000)
        mailout                                                varchar(1000)

                                                           User
        Field name                                            Data type
        uid                                                   varchar(20)
        pass                                                  varchar(20)
        seq                                                   varchar(100)
        ans                                                   varchar(100)
        occu                                                  varchar(50)

                                                  III. CONCLUSION
         The EMailing system is developed on the top of SQL Server 2000 RDBMS using Integrated Development
Environment provided by Java. It is Windows based software, which provides multiprogramming and multi-tasking
environment. Thus EMailing system is using built in security and recovery feature of SQL Server 2000 RDBMS. Also since
the „EMailing system‟ is developed using Java (JSP) and therefore it has used event driven and modular programming style.
Thus it facilitates for extendibility i.e. activities for new establishment can be easily added without affecting the main
program with less effort and cost. An email System capable of delivering on the promises outlined above would necessarily
have to be sophisticated and presumably involve substantial electronics, computers, and software. But, EMailing system is a
very time critical function. We certainly aren‟t going to deploy a new system that we couldn‟t prove is more accurate and
timely than the existing system. At the same time, cost is going to be a major factor.
         To explore this issue, let‟s examine some other transportation systems. The elevator was first automated in
approximately 1940. Because elevators are mechanically guided except for one degree of freedom and other simplifying
circumstances, automation could be accomplished without electronics, much less computers. Train automation is somewhat
more difficult but also involves mechanical guidance. Mechanically guided email Systems have actually been proposed but
would be much too limited.
Keep in mind that the potential benefits of EMailing system are large. The savings in time, cost, efficiency, promptness, and
reduced manpower burden, man-to-man enquiry will justify rather large development and deployment costs.
         EMailing system is "network enabled" to connect to any other service center of the same company and “web
enabled” to enable the customers to get the status of their mails from any part of the world.

                                            IV. ACKNOWLEDGEMENT
         With profound sense of gratitude and regard, I convey my sincere thanks to my guide and mentor, for their valuable
guidance and the confidence they instilled in me, that helped me in successful completion of the project report.
         This acknowledgement would be incomplete without thanking the college faculty, who helped me in all possible
ways with their wholehearted co-operation.
Last but not the least I am ever grateful to my friends for their help and support in completing my project

                                                     REFERENCES
Books
[1] Ram Krishnamurthy, Java Programming
[2] Wrox Publication, Professional Java Server Programming
[3] Hans Bergstein, Java Server Pages
[4] SAMS Publication, JSP in 21 days




                                                             www.ijmer.com                                        438 | Page

More Related Content

Viewers also liked

Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...
Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...
Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...IJMER
 
Strehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterStrehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterIJMER
 
Image Denoising Using Non Linear Filter
Image Denoising Using Non Linear FilterImage Denoising Using Non Linear Filter
Image Denoising Using Non Linear FilterIJMER
 
Novel mechanical Whistle Counter Device for Pressure Cooker
Novel mechanical Whistle Counter Device for Pressure CookerNovel mechanical Whistle Counter Device for Pressure Cooker
Novel mechanical Whistle Counter Device for Pressure CookerIJMER
 
ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56andrea_matinfo56ETM
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSRicardo Vega Gonzalez
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryIJMER
 
Environment and Development (ENP33306) Lecture
Environment and Development (ENP33306) LectureEnvironment and Development (ENP33306) Lecture
Environment and Development (ENP33306) LectureFrazen Tolentino-Zondervan
 
Iθάκη του Κ.Καβάφη.
Iθάκη του Κ.Καβάφη.Iθάκη του Κ.Καβάφη.
Iθάκη του Κ.Καβάφη.Popi Kaza
 
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapSome Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapIJMER
 

Viewers also liked (14)

Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...
Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...
Scope of Improving Energy Utilization in Coal Based Co-Generation on Thermal ...
 
Hobbes
HobbesHobbes
Hobbes
 
Strehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterStrehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic Filter
 
Image Denoising Using Non Linear Filter
Image Denoising Using Non Linear FilterImage Denoising Using Non Linear Filter
Image Denoising Using Non Linear Filter
 
Novel mechanical Whistle Counter Device for Pressure Cooker
Novel mechanical Whistle Counter Device for Pressure CookerNovel mechanical Whistle Counter Device for Pressure Cooker
Novel mechanical Whistle Counter Device for Pressure Cooker
 
ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56
 
Numerasi
NumerasiNumerasi
Numerasi
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industry
 
Environment and Development (ENP33306) Lecture
Environment and Development (ENP33306) LectureEnvironment and Development (ENP33306) Lecture
Environment and Development (ENP33306) Lecture
 
Iθάκη του Κ.Καβάφη.
Iθάκη του Κ.Καβάφη.Iθάκη του Κ.Καβάφη.
Iθάκη του Κ.Καβάφη.
 
ελενη
ελενηελενη
ελενη
 
Reality tv
Reality tvReality tv
Reality tv
 
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapSome Dynamical Behaviours of a Two Dimensional Nonlinear Map
Some Dynamical Behaviours of a Two Dimensional Nonlinear Map
 

Similar to Cx31436438

Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...IRJET Journal
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningIRJET Journal
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
Development of email notification system based on user criteria
Development of email notification system based on user criteriaDevelopment of email notification system based on user criteria
Development of email notification system based on user criteriaIRJET Journal
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET Journal
 
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...IRJET Journal
 
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Database Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring ConfigurationDatabase Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring ConfigurationIRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network SecurityIRJET Journal
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement PortalIRJET Journal
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_SynopsisManmeet Sinha
 

Similar to Cx31436438 (20)

50120140505007
5012014050500750120140505007
50120140505007
 
As4301234238
As4301234238As4301234238
As4301234238
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
IRJET- Providing In-Database Analytic Functionalities to Mysql : A Proposed S...
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
Development of email notification system based on user criteria
Development of email notification system based on user criteriaDevelopment of email notification system based on user criteria
Development of email notification system based on user criteria
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
publishable paper
publishable paperpublishable paper
publishable paper
 
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
SQL Injection and HTTP Flood DDOS Attack Detection and Classification Based o...
 
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Database Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring ConfigurationDatabase Engine Control though Web Portal Monitoring Configuration
Database Engine Control though Web Portal Monitoring Configuration
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement Portal
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Cx31436438

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-436-438 ISSN: 2249-6645 Emailing System as the basis for making automation of email System Manumeet Mukund1, Rana Majumdar2 1 Final Year Student (M.Tech.), Computer Science and Engineering, Amity University, UP, India 2 Asst. Prof., IT Department, Amity University, UP, India Abstract: This thesis presents an analysis of a capability to employ email System as the basis for making automation of email System. My project covers all the aspects of the related database technologies, such as JSP with SQL Server 2000 architecture to help determine how enterprises can implement this approach in the real insecure world, with commercial off -the-self products, to meet their needs. There were many concerns about using the JSP and servlets with SQL Server 2000 as the basis for using records of database, due to a trusted environment. By using appropriate trusted parts, when really necessary, and new technologies, we can find secure solutions for creating, storing and disseminating records. The potential benefits of automating the service of email System is extensive especially with regard to better utilization of time, efficiency, space and safety. Now, new advances in technology have brought a practical system within reach. This project discusses the potential benefits of email automation, the associated technology requirements, and cost/benefit trades. In order to implement the above, products, such as JSP and SQL Server 2000, are used. These are not only available free, easily testable and commonly used, but they provide us with a great interoperability among almost all the GUI platforms. The implementation can also be done by using other competitive technologies or platforms or can even use similar or related commercial products. I. INTRODUCTION EMailing system is a web application, which can be developed by using various web technologies such as ASP.NET, VC++, PHP and JSP etc. Computer and communication technologies have brought revolutionary changes in the information acquisition, processing, storage, retrieval and propagation. Keeping in view of the latest trend in Information Technologies (IT), I have developed windows-based software called EMailing system, which provides the total solutions for Intranet communication. EMailing system is designed using Client-Server Architecture, which imparts extra strength to storage capacity, multiple accesses to single database, backup and restore facilities. This software has been designed after a comprehensive study of different related functions practiced by several mail servers. The user-friendly GUI software is quiet easy to work with. EMailing system is a mail tracing utility. It can receive mails from mail account and can send mail to other mail users. It can handle received mail efficiently with tracking each mail, its recipients and messages. It also has reporting of these mails. Mail accounts can be added and removed very easily and has many more features. It can also edit, modify, erase or view any user‟s mail account or can assign any user any authenticity or can change the preference of mails to and from users. II. FIGURES AND TABLES DFDs Fig (1): Physical Context Diagram for Emailing System: www.ijmer.com 436 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-436-438 ISSN: 2249-6645 Note: The Administrator is only a conceptual part of the system. The system is fully automated in itself. Fig (2): First Level Logical Diagram for Emailing System: Fig (3): Second Level Logical Diagram for Emailing System Fig (4): Third Level Logical Diagram for Emailing System: www.ijmer.com 437 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-436-438 ISSN: 2249-6645 Mail table Field name Data type uid varchar(20) mdate datetime msub varchar(50) msize numeric mailin varchar(1000) mailout varchar(1000) User Field name Data type uid varchar(20) pass varchar(20) seq varchar(100) ans varchar(100) occu varchar(50) III. CONCLUSION The EMailing system is developed on the top of SQL Server 2000 RDBMS using Integrated Development Environment provided by Java. It is Windows based software, which provides multiprogramming and multi-tasking environment. Thus EMailing system is using built in security and recovery feature of SQL Server 2000 RDBMS. Also since the „EMailing system‟ is developed using Java (JSP) and therefore it has used event driven and modular programming style. Thus it facilitates for extendibility i.e. activities for new establishment can be easily added without affecting the main program with less effort and cost. An email System capable of delivering on the promises outlined above would necessarily have to be sophisticated and presumably involve substantial electronics, computers, and software. But, EMailing system is a very time critical function. We certainly aren‟t going to deploy a new system that we couldn‟t prove is more accurate and timely than the existing system. At the same time, cost is going to be a major factor. To explore this issue, let‟s examine some other transportation systems. The elevator was first automated in approximately 1940. Because elevators are mechanically guided except for one degree of freedom and other simplifying circumstances, automation could be accomplished without electronics, much less computers. Train automation is somewhat more difficult but also involves mechanical guidance. Mechanically guided email Systems have actually been proposed but would be much too limited. Keep in mind that the potential benefits of EMailing system are large. The savings in time, cost, efficiency, promptness, and reduced manpower burden, man-to-man enquiry will justify rather large development and deployment costs. EMailing system is "network enabled" to connect to any other service center of the same company and “web enabled” to enable the customers to get the status of their mails from any part of the world. IV. ACKNOWLEDGEMENT With profound sense of gratitude and regard, I convey my sincere thanks to my guide and mentor, for their valuable guidance and the confidence they instilled in me, that helped me in successful completion of the project report. This acknowledgement would be incomplete without thanking the college faculty, who helped me in all possible ways with their wholehearted co-operation. Last but not the least I am ever grateful to my friends for their help and support in completing my project REFERENCES Books [1] Ram Krishnamurthy, Java Programming [2] Wrox Publication, Professional Java Server Programming [3] Hans Bergstein, Java Server Pages [4] SAMS Publication, JSP in 21 days www.ijmer.com 438 | Page