Skip to main content

Freelancer Job


Freelancer Job

Abstract:
A business relies on users every day to operate and grow. But the value of those users comes from productivity, not owning them. By contract work, a company can transfer the commitment and long term responsibility of a full time employee and all the risks and legal attachments that go along with being an employer. It allows you to concentrate on using those workers as a productive part of the business rather than a never ending HR responsibility.        
   The application is reduced as much as possible to avoid errors while entering the data. It also provides error message while entering invalid data.  No formal knowledge is needed for the user to use this system.  Thus by this all it proves it is user-friendly.
EXISTING SYSTEM       

The Freelance uses the Sanchez application which is a single user system to find the Freelance information.
·         The important and the most significant drawback is that the system is manual.  There are errors due to carelessness or oversight that may result in loss to the data and as to the organization.  For an organization, time is very important factor.
·         The Freelance information are stored in the Sanchez application which is like a excel sheet. This makes it impossible to search for Freelance information in such a long table manually and to add a new query if the searched query is not available.

         

PROPOSED SYSTEM

           The proposed system is designed to eliminate all the drawbacks of the existing system. The system is part of a large Freelance Application and shall be responsible for maintaining information about users,
·         Forum,
·         User, Freelancer Post New Project,
·         Admin Post New Project,
·         Post Buyer Project,
·         Buy a Project,
·         Freelancer Commit Project,
·         User Registration,
·         Contact Admin,
·         Administration,
Work changes and several ad hoc reports.

The major advantage of the proposed system is,
  • It’s online, so that information is available anytime.
  • High integrity and security.
  • Ability to incorporate newly available data.
  • It is user friendly
  • Speed and accuracy is increased
  • Fully automated.
  • Security is associated with user authentication
  • Duplication of information is curbed.

7. System Specification:  

  H/W System Requirement

        Processor               -    Pentium –III


Speed                                -    1.1 Ghz
RAM                                 -    256  MB(min)
Hard Disk                          -   20 GB
Floppy Drive                     -    1.44 MB
Key Board                         -    Standard Windows Keyboard
Mouse                                -    Two or Three Button Mouse
Monitor                              -    SVGA

S/W System Requirement


S/W System Configuration

v   Operating System               :   Windows 95/98/2000/NT4.0.
v   Application  Server  :   Wamp2.2e

v   Front End                               :   HTML, PHP.
v   Scripts                                   :   JavaScript.
v   Server side Script                :   PHP.
v   Database                               :   Mysql.
v   Database Connectivity       :   PhpMyAdmin.


Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...