Professional Documents
Culture Documents
USER
• Authentication
• Select The Files
• Get The Files
• View And Download the Files
• Send request to admin
Module Description & Diagrams:
ADMIN
1. Authentication
Login: The user has to provide exact username and password which was
provided at the time of registration, if login success means it will take up to main
page else it will remain in the login page itself .
Database
File Uploading
The admin will upload The New Files In To That Application Admin
Select The Files After That Admin will upload.
View All the Files:
The Admin will view uploaded file
details which includes file uploaded
time.
Check Users Activates
The admin will view the user requested service and
downloaded file details which includes the file retrieve
time and keys.
USER
Login
The user has to provide exact username and password which provide at the time of
registration, if login success means it will take up to main page else it will remain
in the login page itself
DB
Select the Devices
In this module User can select The What Are the Available In That
Application User Will Select.
Get The Files
In this module user get The Files before that users select the
category’s after that user will get files.
View The Files And Download:
This is the main phase of the project. In this module User can view the
file and download the files and users will get the all information on
that files.
GIVEN INPUT AND EXPECTED OUTPUT:
1. ADMIN
Authentication
Input: Provide username and password to get permission for access.
Output: Became authenticated person to request and process the request.
File Uploading
Input: Insert any Multimedia file to the server.
Output: It will be stored in the Cloud
View All the Files
Input: Check the Files from Cloud
Output: Admin Will Get All the Files from Cloud
View Users activities
Input: In that admin will verify the users activates
Output: This detail will get from database
Users Requests:
Input: in that admin will get the users request
Output: these requests given by users only
2. USER
Authentication
Input: Provide username and password to get permission for access.
Output: Became authenticated person to request and process the request.
View Files
Input: Select any multimedia Service from the cloud
Output: It will show the multimedia file which has been uploaded by the cloud user
Get the Files
Input: In That Users Select the Category after that they will get files
Output: These files will come from cloud.
Request:
Input: in that users can send request to admin these details will store in database
Output: these details admin will verify.
TECHNIQUE USED OR ALGORITHM USED:
Fast methodology
To explore and exploit the semantic Correlation property within and among datasets via
correlation aware hashing and flat-structured addressing to significantly reduce the
processing latency, while incurring acceptably small loss of accuracy
HARDWARE AND SOFTWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS
Operating system : Windows8,8.1
Coding Language : C#
HARDWARE REQUIREMENTS
Processor : Pentium Dual Core 2.00GHZ
Hard disk : 40 GB
Mouse : Logitech.
RAM : 2GB(minimum)
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50– 58, 2010.
[2] [3] P. Nath, B. Urgaonkar, and A. Sivasubramaniam, “Evaluating the usefulness of content addressable storage for high-
performance data intensive applications,” Proc. HPDC, 2008.
[4] Gartner, Inc., “Forecast: Consumer digital storage needs, 2010-2016,” 2012.
[5] Storage Newsletter, “7% of consumer content in cloud storage in 2011, 36% in 2016,” 2012.
[6] J. Gantz and D. Reinsel, “The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the
Far East,” International Data Corporation (IDC) iView, December 2012.
[7] Y. Ke and R. Sukthankar, “PCA-SIFT: A more distinctive representation for local image descriptors,” Proc. CVPR, 2004.
[8] Y. Ke, R. Sukthankar, and L. Huston, “Efficient near-duplicate detection and sub-image retrieval,” Proc. ACM
Multimedia, 2004.
[9]R. Pagh and F. Rodler, “Cuckoo hashing,” Proc. ESA, pp. 121–133, 2001.
THANK YOU