SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 142
“Clipboard Manager”
Ms. Kiran Bahaniya1, Ms. Komal Dhote2, Ms. Laxmi ogale3, Prof. Ashish Palandurkar4,
Prof. Mahvash Khan5
1,2,3 Students, Dept of Computer Science & Engineering, Nagpur institute of technology,
Nagpur, Maharashtra, India
4,5 Professor, Dept of Computer Science & Engineering, Nagpur institute of technology,
Nagpur, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The most important characteristic of a clipboard
manager is its ability to save time. Clipboard managers allow
users to store a history of previously copied content such as
text, files, Rigid and images—whereas the built in Windows
Clipboard only allows for storage of one item at a time—thus
allowing for speedy access of such content. This comes in
especially handy when carrying out repetitive dataentrytasks
such as entering repeat formula as well as storing images in a
database for further processing. Other uses include storing
common sections of code (for programmers) and storing
online form information. Some of us routinely carry out such
repetitive tasks given our professions, habits or hobbies and
the ability to cut down on the monotony of switching backand
forth between desired content is a valuable asset. Users can
choose exactly how many clips they want to be stored in the
history. There is a choice of how many clips are storedbybeing
made immediately available on the popup menu and, how
many are stored out of sight but still remain in the program
cache. This is useful as not all of the clips need to be
immediately available for pasting and can be adjusted based
on the habits of users. Users can also make certain clips
permanently available and store them in different groups.
Basic cut and paste gets the job done, but if you're going for
speed and efficiency, you'll need a clipboard manger to keep
your copy-full strong. Keeping all the most frequentlyusedtext
snippets in the Windows clipboard does make sense.
Key Words: Clipboard, Clips, Clipboardmanager, Buffer,
Copy-Cut-Paste, Logs.
1. INTRODUCTION:
The clipboard is a software facility used for short-
term data storage and/or data transfer between documents
or applications, via copy and paste operations. It is most
commonly a part of a GUI environment and is usually
implemented as an anonymous, temporary data buffer that
can be accessed from most or all programs within the
environment via defined programming interfaces. A typical
application accesses clipboard functionalitybymappinguser
input (key bindings, menu selections, etc.) to these
interfaces.
The default Windows clipboard has two very obvious
limitations: it can store only one item at a time and it is
cleared every time the computer restarts. Clipboard
replacement utilitieswill notonly solvethoseproblems,they
will give you much more power over your clipboard.
These utilities provide a clipboard history and they come
with additional features such as built-in text editor,
additional information about the clip (date & time, origin,
user name), launch actions (such as Google search) and
more.
Because they replace such a basic system function,clipboard
managershave to be simple to use, but that dependson how
you use your computer. There is no one-size-fits-all when it
comes to clipboard managers, so I suggest you try some of
those freeware products for yourself and find the one that
suits you the best.
Here I came up with a list of specifications to evaluate
clipboard managers:
 Simple: Easy to setup and use. It should work as
intended right out of the box, without any tweaks.
 Reliable: It can handle everything the default
Windowsclipboard can handle. It should belighton
resources and fully compatible with the latest
versions of Windows.
 Accessible: Easy to use with cursor-only,keyboard-
only or a mix of both. It also needs a nice and clear
interface.
 Powerful and customizable: Provide extra
featuresfor advanced userswho needmoreoptions
than simply copy, cut and paste.
2. Methodology:
Modern GUIs often provide a clipboard manager
which supports multiple cut and paste transactions. In this
model the clipboard is treated as a stack or scrap book, with
new cuts and copies being placed on top of the list of recent
transactions. The standard paste operation copies the most
recent transaction, while specialized pastes provide access
to the other stored transactions. These managers generally
also provide a window that displays the transaction history
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 143
and allows the user to select earlier copies,editthem,change
their format and even search amongst them.
In Windows Clipboard Utility like Clip diary in which it
maintain the history of copied files and when user want to
paste any files from diary of the copied files firstly you need
to open the diary by pressing the key ctrl+D thenitwillshow
you all copied files.
So here I am going to overcome this limitations by providing
Buffer for copy data whatever the user copied data it stored
into a buffer with additional features such as built-in text
editor, additional information about the clip(date & time,
origin, user name), launch actions (such as
Fig 1.1 clipboard operations
3. Literature Survey:
In human-computer interaction, cut and paste and copyand
paste are related commands that offer a user-
interface interaction technique for transferring
text, data, files or objects from a sourcetoadestination.Most
ubiquitously, users require the ability to cut and paste
sections of plain text. The cut command removes
the selected data from its original position, while
the copy command creates a duplicate; in both cases the
selected data is placed in a clipboard. The data in the
clipboard is later inserted in the position where
the paste command is issued.
This interaction technique has close associations with
related techniques in graphical user interfaces that
use pointing devices such as a computermouse (by dragand
drop, for example).The capability to replicate information
with ease, changing it between contexts and applications,
involves privacy concerns because of the risks of disclosure
when handling sensitive information Terms
like cloning, copy forward, carry forward, or re-use refer to
the dissemination of such information through documents,
and may be subject to regulation by administrative bodies
The term "cut and paste" comesfrom the traditionalpractice
in manuscript-editing’s whereby people would literally cut
paragraphs from a page with scissors and physically paste
them onto another page. This practice remained standard
into the 1980s. Stationery stores formerly sold "editing
scissors" with blades long enough to cut
An 8½"-wide page. The advent of photocopiers made the
practice easier and more flexible.
The act of copying/transferring text from one part of a
computer-based document ("buffer") to a different location
within the same or different
The act of copying/transferring text from one part of a
computer-based document ("buffer") to a different location
within the same or different Computer-based documentwas
a part of the earliest on-line computer editors. As soon as
computer data entry moved from punch-cardsto onlinefiles
(in the mid/late 1960s) there were "commands" for
accomplishing this operation. This mechanism was often
used to transfer frequently-used commandsor text snippets
from additional buffers into the document, as was the case
with the QEDeditor.
The earliest editors, since they weredesignedfor"hardcopy"
terminal, provided keyboard commands copy "Terminals,
provided keyboard commands to delineate contiguous
regions of text, remove such regions, or move them to some
other location in the file. Since moving a region of text
required first removing it from its initial location and then
inserting it into its new location various schemes had to be
invented to allow for this multi-step process to be specified
by the user.
Often this was done by the provision of a 'move' command,
but some text editors required that the text be first put into
some temporary location for later retrieval/placement. In
1983, the Apple Lisa became the first text editing system to
call that temporary location "the clipboard".
4. Data Extraction Process by using Clipboard:
The below figure definesstagesrequired for extractingdata.
 First, clipboard can identify the relevant functions.
 Secondly, by according to its functions data can be
extracted from those functions.
 Then data retrieved is classified in differentformats
and if the required format is found in the clipboard
then it is appended.
 Finally the identified data is extracted and used
depending on applications.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 144
5. Implementation:
Using above classes and methods the data can be
obtained from the clipboard. [1] The below algorithmcanbe
used as the basic layout for the working of extraction.
Clipboard c; c=getSystemClipboard (); if (Data Flavor is
Available) Get data (Data Flavor);
e.g.
Clipboard c;
StringSelectioncnt= new String Selection (“Data”);
6. Analysis of problem:
Clipboard has very obvious different issues [3] firstly it
store one item at a time on clipboard memory if you had
copy another item it overwritten on previous item.
 If you turn off or rest art the system it clears
memory every time if in case you want previous
copied contents you will be miss that contents.
 Clipboard is a temporary storage [3] area for
information that enables applications to transfer
data or moved one place and plan to use
somewhere else.
 You can select text, graphics or anything and then
use the cut or copy commands to move your
selection to the clipboard whatever information is
copy is store on the clipboard memory, whereitwill
be stored until youuse the paste command toinsert
elsewhere.
 If you had copy another item it overwritten on
previous item.
7. Features
Features of Clipboard
 Multiple buffersand ability to combinesplitandrun
their contents.
 Choosing which buffer “cut or copy operations
should store data in”.
 Clipboard can save different types of data like
handling formatted text tabular data, data objects
media contents and URLs searching of saved data.
 Choosing which buffer (s) “paste “operations.
 Permanent storage for copy data.
 Need not concern about loss of data because data is
located on hard disk.
8. Limitations of Clipboard:
Copy operation does not copy all sub-folders when
undertaking very large partitions, of 400 GBormore. Firstly
it can store only one item at a time.
 Secondly it is erased every time the computer
restarts.
 Clipboard saves temporary data while operating
system is running. After that each shut down
process, the content of clipboard are removed for
maintaining efficiency of operating system.so that,
the users are unable to retrieve data of preceding
copied data.
 Windows clipboard cannot be used to process text
that contains null character.
9. Existing work:
 Clipboard has the mechanism of share the
information between the applications.[1]
 It first seemed in Windows 3.1, after that working
has greatly increased.
 After that copying more complex data than text to
the clipboard, Windows varieties available several
APIs which make extraction much more difficult.
 Dynamic data exchange (DDE) is very useful
method for extracting the data.
 In 1990, Microsoft windowsreleased object linking
and embedding (OLE) enabling compound files.
Compound files have most of the file in primary
format (for e.g. a Microsoft Word 2.2 Clipboard
classes and Methods: While there is a large amount
of documentation on how to use and access the
windows clipboard via application program
interfaces (APIs), [1] there is document on the
methods used other than APIs. Extending classes
like Clipboard we can access the data stored in the
clipboard using its different methods like as:
 GetSystemClipboard () is called to retrieve the
pointer to the clipboard data. This provides handle
to the or during drag and drop operation.
 Flavor Listeners() may be registered onaninstance
of the Clipboard properties.
 The Toolkit ass is the main class which is use to get
the system clipboard.
 A Data Flavor () provides Meta information about
data. Data Flavors is typically used to flavors are
classified those depending on file formats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 145
 Data Flavor Available method is method to check
whether the data flavor of the data in the clipboard
is in the list of valid data flavors.
 Logger and clipboard manager which fulfils user
requirements with easy interface.
11. References:
[1]Ganesh N. Nadargi1, Zakir M. Shaikh2,”Identifying and
Extracting Data from Clipboard”, International Journal of
Computer Science and Information Technologies,Volume.6,
Issue 6, 2015, PP 2127-2129.
[2]Pratik R. Tambekar, T. R. Ravi,” Clipboard Logger-For
Windows Platform”, International Journal of Science and
Research (IJSR) Volume 3, Issue 12, December2014,PP732-
734.
[3]Pratik R. Tambekar, “Clipboard Organizer and Manager-
For Windows Platform” International Journal onRecentand
Innovation Trends in Computing and Communication ISSN:
2321-8169 Volume: 3 Issue 2, PP 383– 386.
[4]Mark Apperley, Dale Fletcher, Bill Rogers, “Breaking the
Copy/Paste Cycle: The StretchableSelectionTool”,Computer
Science Department, Waikato University Hamilton, New
Zealand, PP
[5] "Clipboard Operations",http://msdn.microsoft.Com/en-
us/library/ms649016 (VS. 85). aspx
[6]K. C. Lam, W. C. Lau, O. Yue "Hitchbot - Delivering
Malicious URLs via Social Hitch-hiking" published in IEEE
Globecom 2011 Proceedings.
[7]S. Li, S. Lv, X. Jia and Z. Shao "Application of Clipboard
Monitoring Technology in Graphic and Document
Information Security Protection System" published in Third
International Symposium on Intelligent Information
Technology and Security Informatics, IEEE 2010.
[8]K. T. Stolee, S. Elbaum, and G. Rothermel "Revealing the
Copy and Paste Habits of End Users" Symposium on Visual
Languages and Human-Centric Computing (VL/HCC) IEEE
2009.
[9]M. Wang and Z. Qui "Research of Anti-copyandPlagiarism
Monitoring System" First International Workshop on
Education Technology and Computer Science, IEEE 2009.
[10]"GoogleForum"https://groups.google.com/forum/#!topi
c/keepassdroid discuss/w1x6pFUSexw
[11]"MALWAREHELP.org"http://www.malwarehelp.
Org/malware-new-attack-hijacks-the-clipboard-2008.Html
[12]"Clipboards hijacked in web attack" http://news. bbc.
Co. uk/2/hi/technology/7567889. Stm
[13]"Clipboard Snooping Malware" http://www. InfoSec
Island. Com/blogview/22429-detecting-Window-Stations-
and-Clipboard-Monitoring-Malware-with-Volatility.

More Related Content

What's hot

Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
ijtsrd
 

What's hot (19)

Ch 7 io_management & disk scheduling
Ch 7 io_management & disk schedulingCh 7 io_management & disk scheduling
Ch 7 io_management & disk scheduling
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
operating system lecture notes
operating system lecture notesoperating system lecture notes
operating system lecture notes
 
Presentation1
Presentation1Presentation1
Presentation1
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
 
Basic os-concepts
Basic os-conceptsBasic os-concepts
Basic os-concepts
 
Os unit 2
Os unit 2Os unit 2
Os unit 2
 
Process creation and termination In Operating System
Process creation and termination In Operating SystemProcess creation and termination In Operating System
Process creation and termination In Operating System
 
Os unit 3 , process management
Os unit 3 , process managementOs unit 3 , process management
Os unit 3 , process management
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 
Os notes 1_5
Os notes 1_5Os notes 1_5
Os notes 1_5
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating System
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
 
Operating systems1[1]
Operating systems1[1]Operating systems1[1]
Operating systems1[1]
 
Unit 2 part 2(Process)
Unit 2 part 2(Process)Unit 2 part 2(Process)
Unit 2 part 2(Process)
 
Operating systems types, spooling and buffering
Operating systems types, spooling and bufferingOperating systems types, spooling and buffering
Operating systems types, spooling and buffering
 
Mis unit iii by arnav
Mis unit iii by arnavMis unit iii by arnav
Mis unit iii by arnav
 
OSCh4
OSCh4OSCh4
OSCh4
 
Operating System
Operating SystemOperating System
Operating System
 

Similar to IRJET-Clipboard Manager

Operating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdfOperating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdf
rishabjain5053
 

Similar to IRJET-Clipboard Manager (20)

intro to OS
intro to OSintro to OS
intro to OS
 
computer notes - Introduction to operating system
computer notes - Introduction to operating systemcomputer notes - Introduction to operating system
computer notes - Introduction to operating system
 
Computers in management
Computers in managementComputers in management
Computers in management
 
MYSQL DATABASE Operating System Part2 (1).pptx
MYSQL DATABASE Operating System Part2 (1).pptxMYSQL DATABASE Operating System Part2 (1).pptx
MYSQL DATABASE Operating System Part2 (1).pptx
 
Os
OsOs
Os
 
Unit 1
Unit 1Unit 1
Unit 1
 
Google File System
Google File SystemGoogle File System
Google File System
 
MIS assignement
MIS assignementMIS assignement
MIS assignement
 
191
191191
191
 
Linux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop ComputerLinux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop Computer
 
Linux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop ComputerLinux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop Computer
 
HiPEAC 2019 Tutorial - Maestro RTOS
HiPEAC 2019 Tutorial - Maestro RTOSHiPEAC 2019 Tutorial - Maestro RTOS
HiPEAC 2019 Tutorial - Maestro RTOS
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
Operating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdfOperating Systems Structure1- Explain briefly why the objectives o.pdf
Operating Systems Structure1- Explain briefly why the objectives o.pdf
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle database
 
IT130 - U1L1.pptx
IT130 - U1L1.pptxIT130 - U1L1.pptx
IT130 - U1L1.pptx
 
IETM Development Process.pdf
IETM Development Process.pdfIETM Development Process.pdf
IETM Development Process.pdf
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher
 
IRJET - Automation in Python using Speech Recognition
IRJET -  	  Automation in Python using Speech RecognitionIRJET -  	  Automation in Python using Speech Recognition
IRJET - Automation in Python using Speech Recognition
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 

IRJET-Clipboard Manager

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 142 “Clipboard Manager” Ms. Kiran Bahaniya1, Ms. Komal Dhote2, Ms. Laxmi ogale3, Prof. Ashish Palandurkar4, Prof. Mahvash Khan5 1,2,3 Students, Dept of Computer Science & Engineering, Nagpur institute of technology, Nagpur, Maharashtra, India 4,5 Professor, Dept of Computer Science & Engineering, Nagpur institute of technology, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The most important characteristic of a clipboard manager is its ability to save time. Clipboard managers allow users to store a history of previously copied content such as text, files, Rigid and images—whereas the built in Windows Clipboard only allows for storage of one item at a time—thus allowing for speedy access of such content. This comes in especially handy when carrying out repetitive dataentrytasks such as entering repeat formula as well as storing images in a database for further processing. Other uses include storing common sections of code (for programmers) and storing online form information. Some of us routinely carry out such repetitive tasks given our professions, habits or hobbies and the ability to cut down on the monotony of switching backand forth between desired content is a valuable asset. Users can choose exactly how many clips they want to be stored in the history. There is a choice of how many clips are storedbybeing made immediately available on the popup menu and, how many are stored out of sight but still remain in the program cache. This is useful as not all of the clips need to be immediately available for pasting and can be adjusted based on the habits of users. Users can also make certain clips permanently available and store them in different groups. Basic cut and paste gets the job done, but if you're going for speed and efficiency, you'll need a clipboard manger to keep your copy-full strong. Keeping all the most frequentlyusedtext snippets in the Windows clipboard does make sense. Key Words: Clipboard, Clips, Clipboardmanager, Buffer, Copy-Cut-Paste, Logs. 1. INTRODUCTION: The clipboard is a software facility used for short- term data storage and/or data transfer between documents or applications, via copy and paste operations. It is most commonly a part of a GUI environment and is usually implemented as an anonymous, temporary data buffer that can be accessed from most or all programs within the environment via defined programming interfaces. A typical application accesses clipboard functionalitybymappinguser input (key bindings, menu selections, etc.) to these interfaces. The default Windows clipboard has two very obvious limitations: it can store only one item at a time and it is cleared every time the computer restarts. Clipboard replacement utilitieswill notonly solvethoseproblems,they will give you much more power over your clipboard. These utilities provide a clipboard history and they come with additional features such as built-in text editor, additional information about the clip (date & time, origin, user name), launch actions (such as Google search) and more. Because they replace such a basic system function,clipboard managershave to be simple to use, but that dependson how you use your computer. There is no one-size-fits-all when it comes to clipboard managers, so I suggest you try some of those freeware products for yourself and find the one that suits you the best. Here I came up with a list of specifications to evaluate clipboard managers:  Simple: Easy to setup and use. It should work as intended right out of the box, without any tweaks.  Reliable: It can handle everything the default Windowsclipboard can handle. It should belighton resources and fully compatible with the latest versions of Windows.  Accessible: Easy to use with cursor-only,keyboard- only or a mix of both. It also needs a nice and clear interface.  Powerful and customizable: Provide extra featuresfor advanced userswho needmoreoptions than simply copy, cut and paste. 2. Methodology: Modern GUIs often provide a clipboard manager which supports multiple cut and paste transactions. In this model the clipboard is treated as a stack or scrap book, with new cuts and copies being placed on top of the list of recent transactions. The standard paste operation copies the most recent transaction, while specialized pastes provide access to the other stored transactions. These managers generally also provide a window that displays the transaction history
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 143 and allows the user to select earlier copies,editthem,change their format and even search amongst them. In Windows Clipboard Utility like Clip diary in which it maintain the history of copied files and when user want to paste any files from diary of the copied files firstly you need to open the diary by pressing the key ctrl+D thenitwillshow you all copied files. So here I am going to overcome this limitations by providing Buffer for copy data whatever the user copied data it stored into a buffer with additional features such as built-in text editor, additional information about the clip(date & time, origin, user name), launch actions (such as Fig 1.1 clipboard operations 3. Literature Survey: In human-computer interaction, cut and paste and copyand paste are related commands that offer a user- interface interaction technique for transferring text, data, files or objects from a sourcetoadestination.Most ubiquitously, users require the ability to cut and paste sections of plain text. The cut command removes the selected data from its original position, while the copy command creates a duplicate; in both cases the selected data is placed in a clipboard. The data in the clipboard is later inserted in the position where the paste command is issued. This interaction technique has close associations with related techniques in graphical user interfaces that use pointing devices such as a computermouse (by dragand drop, for example).The capability to replicate information with ease, changing it between contexts and applications, involves privacy concerns because of the risks of disclosure when handling sensitive information Terms like cloning, copy forward, carry forward, or re-use refer to the dissemination of such information through documents, and may be subject to regulation by administrative bodies The term "cut and paste" comesfrom the traditionalpractice in manuscript-editing’s whereby people would literally cut paragraphs from a page with scissors and physically paste them onto another page. This practice remained standard into the 1980s. Stationery stores formerly sold "editing scissors" with blades long enough to cut An 8½"-wide page. The advent of photocopiers made the practice easier and more flexible. The act of copying/transferring text from one part of a computer-based document ("buffer") to a different location within the same or different The act of copying/transferring text from one part of a computer-based document ("buffer") to a different location within the same or different Computer-based documentwas a part of the earliest on-line computer editors. As soon as computer data entry moved from punch-cardsto onlinefiles (in the mid/late 1960s) there were "commands" for accomplishing this operation. This mechanism was often used to transfer frequently-used commandsor text snippets from additional buffers into the document, as was the case with the QEDeditor. The earliest editors, since they weredesignedfor"hardcopy" terminal, provided keyboard commands copy "Terminals, provided keyboard commands to delineate contiguous regions of text, remove such regions, or move them to some other location in the file. Since moving a region of text required first removing it from its initial location and then inserting it into its new location various schemes had to be invented to allow for this multi-step process to be specified by the user. Often this was done by the provision of a 'move' command, but some text editors required that the text be first put into some temporary location for later retrieval/placement. In 1983, the Apple Lisa became the first text editing system to call that temporary location "the clipboard". 4. Data Extraction Process by using Clipboard: The below figure definesstagesrequired for extractingdata.  First, clipboard can identify the relevant functions.  Secondly, by according to its functions data can be extracted from those functions.  Then data retrieved is classified in differentformats and if the required format is found in the clipboard then it is appended.  Finally the identified data is extracted and used depending on applications.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 144 5. Implementation: Using above classes and methods the data can be obtained from the clipboard. [1] The below algorithmcanbe used as the basic layout for the working of extraction. Clipboard c; c=getSystemClipboard (); if (Data Flavor is Available) Get data (Data Flavor); e.g. Clipboard c; StringSelectioncnt= new String Selection (“Data”); 6. Analysis of problem: Clipboard has very obvious different issues [3] firstly it store one item at a time on clipboard memory if you had copy another item it overwritten on previous item.  If you turn off or rest art the system it clears memory every time if in case you want previous copied contents you will be miss that contents.  Clipboard is a temporary storage [3] area for information that enables applications to transfer data or moved one place and plan to use somewhere else.  You can select text, graphics or anything and then use the cut or copy commands to move your selection to the clipboard whatever information is copy is store on the clipboard memory, whereitwill be stored until youuse the paste command toinsert elsewhere.  If you had copy another item it overwritten on previous item. 7. Features Features of Clipboard  Multiple buffersand ability to combinesplitandrun their contents.  Choosing which buffer “cut or copy operations should store data in”.  Clipboard can save different types of data like handling formatted text tabular data, data objects media contents and URLs searching of saved data.  Choosing which buffer (s) “paste “operations.  Permanent storage for copy data.  Need not concern about loss of data because data is located on hard disk. 8. Limitations of Clipboard: Copy operation does not copy all sub-folders when undertaking very large partitions, of 400 GBormore. Firstly it can store only one item at a time.  Secondly it is erased every time the computer restarts.  Clipboard saves temporary data while operating system is running. After that each shut down process, the content of clipboard are removed for maintaining efficiency of operating system.so that, the users are unable to retrieve data of preceding copied data.  Windows clipboard cannot be used to process text that contains null character. 9. Existing work:  Clipboard has the mechanism of share the information between the applications.[1]  It first seemed in Windows 3.1, after that working has greatly increased.  After that copying more complex data than text to the clipboard, Windows varieties available several APIs which make extraction much more difficult.  Dynamic data exchange (DDE) is very useful method for extracting the data.  In 1990, Microsoft windowsreleased object linking and embedding (OLE) enabling compound files. Compound files have most of the file in primary format (for e.g. a Microsoft Word 2.2 Clipboard classes and Methods: While there is a large amount of documentation on how to use and access the windows clipboard via application program interfaces (APIs), [1] there is document on the methods used other than APIs. Extending classes like Clipboard we can access the data stored in the clipboard using its different methods like as:  GetSystemClipboard () is called to retrieve the pointer to the clipboard data. This provides handle to the or during drag and drop operation.  Flavor Listeners() may be registered onaninstance of the Clipboard properties.  The Toolkit ass is the main class which is use to get the system clipboard.  A Data Flavor () provides Meta information about data. Data Flavors is typically used to flavors are classified those depending on file formats.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 145  Data Flavor Available method is method to check whether the data flavor of the data in the clipboard is in the list of valid data flavors.  Logger and clipboard manager which fulfils user requirements with easy interface. 11. References: [1]Ganesh N. Nadargi1, Zakir M. Shaikh2,”Identifying and Extracting Data from Clipboard”, International Journal of Computer Science and Information Technologies,Volume.6, Issue 6, 2015, PP 2127-2129. [2]Pratik R. Tambekar, T. R. Ravi,” Clipboard Logger-For Windows Platform”, International Journal of Science and Research (IJSR) Volume 3, Issue 12, December2014,PP732- 734. [3]Pratik R. Tambekar, “Clipboard Organizer and Manager- For Windows Platform” International Journal onRecentand Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue 2, PP 383– 386. [4]Mark Apperley, Dale Fletcher, Bill Rogers, “Breaking the Copy/Paste Cycle: The StretchableSelectionTool”,Computer Science Department, Waikato University Hamilton, New Zealand, PP [5] "Clipboard Operations",http://msdn.microsoft.Com/en- us/library/ms649016 (VS. 85). aspx [6]K. C. Lam, W. C. Lau, O. Yue "Hitchbot - Delivering Malicious URLs via Social Hitch-hiking" published in IEEE Globecom 2011 Proceedings. [7]S. Li, S. Lv, X. Jia and Z. Shao "Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System" published in Third International Symposium on Intelligent Information Technology and Security Informatics, IEEE 2010. [8]K. T. Stolee, S. Elbaum, and G. Rothermel "Revealing the Copy and Paste Habits of End Users" Symposium on Visual Languages and Human-Centric Computing (VL/HCC) IEEE 2009. [9]M. Wang and Z. Qui "Research of Anti-copyandPlagiarism Monitoring System" First International Workshop on Education Technology and Computer Science, IEEE 2009. [10]"GoogleForum"https://groups.google.com/forum/#!topi c/keepassdroid discuss/w1x6pFUSexw [11]"MALWAREHELP.org"http://www.malwarehelp. Org/malware-new-attack-hijacks-the-clipboard-2008.Html [12]"Clipboards hijacked in web attack" http://news. bbc. Co. uk/2/hi/technology/7567889. Stm [13]"Clipboard Snooping Malware" http://www. InfoSec Island. Com/blogview/22429-detecting-Window-Stations- and-Clipboard-Monitoring-Malware-with-Volatility.