Java Abstracts

download Java Abstracts

of 24

Transcript of Java Abstracts

  • 8/2/2019 Java Abstracts

    1/24

    PRIVATE INSTANT MESSAGING

    Abstract

    Instant messaging (IM) and chat are technologies that facilitate near real-

    time text based communication between two or more participants over a network.

    It is important to understand that what separates chat and instant messaging from

    technologies such as e-mail is the perceived synchronicity of the communication

    by the user - Chat happens in real-time before your eyes. For this reason, some

    people consider communication via instant messaging to be less intrusive than

    communication via phone. However, some systems allow the sending of messages

    to people not currently logged on (offline messages), thus removing much of the

    difference between Instant Messaging and e-mail.

    Instant Messaging allows instantaneous communication between a numberof parties simultaneously, by transmitting information quickly.

    IM allows effective and efficient communication, featuring immediate

    receipt of acknowledgment or reply. In certain cases Instant Messaging involves

    additional features, which make it even more popular.

    The project deals with the development of small instant messaging tool over the

    intranet. This will be used with in the small private network.

    Requirements

    HARDWARE

    Processor: Intel Core 2 Duo

    RAM: 2 GB

    Hard Disk: 120 GB

    SOFTWARE

    Operating System: Microsoft Windows Vista Home Premium

    Programming Language: Java (JSDK 1.6)

    Modules:

    User Interface Module

    Network Module

  • 8/2/2019 Java Abstracts

    2/24

    Activity Control system

    Abstract

    Activity Control System (ACTITIME) is a time collection software that is streamlined

    for billing and invoicing purposes. ACTITIME allows time tracking for customer andproject related tasks. After being collected the data can then be exported for invoicegeneration.

    The major tasks, which are performed by the current project are:

    1. Create user accounts2. Register billing types (optionally)3. Register customers4. Register projects

    5. Add tasks

    After completion of these steps we will be ready to submit time-track.

    Create user accounts

    Login as the Root system user for initial set up of user accounts. To log inprovide username 'root' and password 'manager'.

    The Root is a pre-defined system user that always has all access rights exceptthe right for time-track submission. Access rights of the Root user cannot be modified.

    The Root user cannot be deleted.

    For security purposes change the predefined password of the Root user beforeproceeding with data setup. To change password of the Root user follow theinstructions listed in the section

    Add system users and grant them access rights necessary for their everydaywork.

    Each user can be granted one or more access rights. The role executed by auser, as well as the category a user belongs to, depend on the access rights granted tothe user. There are no pre-defined user categories (or roles) in ACTITIME. We need togrant a user those access rights that are necessary for his/her everyday work, and thatis all.

  • 8/2/2019 Java Abstracts

    3/24

    If you are going to track overtime, enable overtime tracking when creating useraccounts. Otherwise it is recommended to keep overtime tracking disabled because thiswill simplify interfaces for the time-track submission.

    Register billing types (optionally)

    If you are going to classify tasks using billing types, create the necessary billingtypes now.

    You can skip this step and return to creation of billing types later. In this case allcreated tasks will be associated with the default billing type. If you decide to use non-default billing types, you will have to update this association for all existing tasks aftercreation of the billing types. ,Register customers

    ACTITIME collects time expenses for tasks associated with particular project andcustomer. So before creation of tasks you should register at least one customer andone project.

    Register projects

    Before adding tasks you should create at least one project associated with a customerregistered on the previous step.

  • 8/2/2019 Java Abstracts

    4/24

    ABSTRACT

    Attendance through SMS

    This system helps the college management to communicate the details of

    the attendance and marks to the parents through SMS. This system makes use of

    the database built using biometric finger print reader for the attendance.

    Then by generating reports on each day it will identify the students who

    have less percentage of attendance than the required aggregate percentage .It sends

    the messages to the mobiles of the parents about the attendance and marks details.

    Apart from this whenever the parents want to know about their students

    attendance and marks they can directly login into the site or they can send

    message to the administrator by giving that particular students registration number

    and they can get return message.

  • 8/2/2019 Java Abstracts

    5/24

    ABSTRACT

    AJAX BROWSER

    We propose a new web browser for Ajax approach with asynchronous communication

    model. Our web browser can improve the operationality that is equivalent to the operationality of

    desktop applications without revising program codes of the web applications.

    When the user requests for a page, the browser displays the HTML page according to the

    source code given by the server. When we click Refresh button, the browser does not load the

    whole page again as in classic web application model. Instead, the server compares the existing

    page and the requested page and maintains the differences in a difference table. Only those parts

    of the page where changes occurred are loaded.

    Our browser has the following features

    (1) No change of client programs and server programs of web applications,

    (2) Asynchronous communication with web servers,

    (3) Partial screen update replaces click, wait and refresh user interaction model.

    MODULES:

    1. Parsing:

    HTML source is analyzed by a parser based on HTML tags. Syntax trees are

    generated by the parser. Nodes of the syntax tree mean HTML tags; leaves of the syntax tree

    mean text contents such as String, numerical, and JavaScript codes.

    2. Generating JavaScript:

    The original HTML source does not have a function of partial updating.

    Therefore, new JavaScript codes are added to the original HTML source. The JavaScript codes

  • 8/2/2019 Java Abstracts

    6/24

    refer to the difference table. JavaScript codes including innerHTML method are inserted to the

    original HTML source.

    3. Searching difference:

    With comparing the two syntax trees, difference between the two web pages is detected. If

    partial update of the web page is required, a difference table is generated. The difference table

    includes the difference node information such as tag name, ID, tags properties, text

    4. Updating partially:

    According to the difference table, a current web page added JavaScript codes updates

    partially. In order to update, the current web page accesses to the difference table at constant

    intervals. The reason of the constant accessing to the difference table is that the current web page

    in the Main block is executed independently from the communication with a web server in the

    Sub block. In the Sub block in the model, communication with the web server occurs

    corresponding to events such as clicking reload button or automatic reload. In short, the

    Main block and the Sub block in the model are executed independently each other. Only

    accessing to the difference table is a relationship between the two blocks. Therefore, the

    asynchronous communication with web servers can be achieved.

    TECHNOLOGIES USED:

    Java script

    HTML

    Java Swings

  • 8/2/2019 Java Abstracts

    7/24

    ABSTRACT

    COLLEGE ADMINISTRATION SYSTEM

    College administration led by the administrator works with students, academic and supportstaff to ensure the effective administration of all matters of students admission, fee details,

    contact details, transfer of students.

    The administrator assigns different userids and passwords to clerk and accountant so that he

    shares his work These are the people responsible for entering and making changes to the entered

    data.so,the username and password are highly secured.

    The administrator have all rights over the system.clerk is responsible for contact details and

    transfer of student modules.He can update the contact details and checks the availability for

    transfer of students in the beginning of second year.

    Accountant is responsible for fee module.He enters the fee details into the database.

    It is easy for the college administration to know the students dues and send particular notice to

    them.

  • 8/2/2019 Java Abstracts

    8/24

    Abstract

    Title: Compressor and De-Compressor

    In computer science and information theory, data compression or source coding is the

    process of encoding information using fewer bits (or other information-bearing units) than anunencoded representation would use through use of specific encoding schemes. One popularinstance of compression with which many computer users are familiar is the ZIP file format,

    which, as well as providing compression, acts as an archiver, storing many source files in a

    single destination output file.

    As with any communication, compressed data communication only works when both the

    sender and receiver of the information understand the encoding scheme. For example, this text

    makes sense only if the receiver understands that it is intended to be interpreted as charactersrepresenting the English language. Similarly, compressed data can only be understood if the

    decoding method is known by the receiver.

    Compression is useful because it helps reduce the consumption of expensive resources,

    such as hard disk space or transmission bandwidth. On the downside, compressed data must be

    decompressed to be used, and this extra processing may be detrimental to some applications. For

    instance, a compression scheme for video may require expensive hardware for the video to bedecompressed fast enough to be viewed as it's being decompressed (the option of decompressing

    the video in full before watching it may be inconvenient, and requires storage space for the

    decompressed video). The design of data compression schemes therefore involves trade-offsamong various factors, including the degree of compression, the amount of distortion introduced

    (if using a lossy compression scheme), and the computational resources required to compress and

    uncompress the data.

    Modules:

    Compression Module: This module is used to compress any file to save the disk space. This

    includes the usage and implementation of data compression algorithm for the compression of the

    files.

    De compression Module: This module will take the compressed file as the input and generates or

    rebuilds the original file by the implementation of de compression algorithm.

    Technologies Used:

    Programming Language: Java (Java SDK version 1.5.0)

    Operating System: Microsoft Windows Xp with Service Pack 2

  • 8/2/2019 Java Abstracts

    9/24

    ABSTRACT

    CRYPTOGRAPHY

    When a number of computers are interconnected to form a network, the protectmechanisms within the individual computers become inadequate to ensure the security of data

    communications across the network. Preventing the disclosure of original message is not the only

    aspect of security in data communication systems; others include protection against alterationsand introduction of false messages.

    Cryptography has appeared as the best measure for data security in computer

    communication systems by transforming the original data into an unintelligible form. It servesas a countermeasure to passive wiretapping attacks and also as a foundation on which

    countermeasures against active wiretapping can be constructed.

    There is a strong need for the general tools of utility, which can convert a plain text-fileinto a cipher file and vice-versa, for every user who intend to transfer/ receive text/data on the

    network. For this purpose, I implemented the cryptographic techniques as general tools of utility,

    which can be used to encrypt / decrypt the files, which roam on the network.

    In this project "Implementation of cryptographic techniques for secure file

    transfer" three very popular cryptographic techniques: /. Transposition Cipher 2. SubstitutionCipher and 3. RSA (Rivest, Shamir & Adleman) public key cryptographic scheme are

    implemented in software written in 'C'.

    1. Implementation of Transposition Cipher

    In this implementation, the original plain text is transformed by changing the

    positions of characters of message plain text. A keyword of 8 characters length is used

    to transform the message text and written to the destination file.

    The encrypted file may be transferred to the destination where the file is read and arranged

    according to the 8-character-key, which is then written on to a file. This file contains the original

    message plain text.

    2.Implementation of Substitution Cipher

    In this implementation, the original plain text is transformed by substituting each character ofthe message plain text by another character. A mono-alphabetic substitution is used in this

    implementation.

  • 8/2/2019 Java Abstracts

    10/24

    Here the key taken is 52 characters length, which contains all the small case and capital

    letters of English text, which are used for substitution.

    3.Implementation of RSA (Rivest, Shamir & Adleman) public key Cryptographic scheme

    Firstly, two large prime numbers p and q, each about 100 decimal digits long are selected and

    their product n = p*q is obtained. Then Eulers function z = (p -1) (q - 1) is computed.Choose a number relatively prime to z and call it d. Find e such that e x d = 1 mod z.

    To encrypt a message P, compute C = Pe

    (mod n). To decrypt C, compute P = Cd

    (mod n).

    The pair of positive integers (e, n) is termed as the encryption key and the corresponding pair of

    integers (d, n) as the decryption key. Each user makes his encryption key public, i.e., known to

    everyone on the network and keeps the corresponding decryption key secret with himself

    This program is used to encrypt data files and decrypt the encrypted files. As data securitymechanisms can generally be developed independently of

  • 8/2/2019 Java Abstracts

    11/24

    Defect Tracking for Improving Product Quality and Productivity

    Vision This project is aimed at developing a Defect Tracking for Improving

    Product Quality and Productivity useful for applications developed in anorganization. The Defect Tracking for Improving Product Quality and

    Productivity is a web based application that can be accessed throughoutthe organization. This system can be used for logging defects against an

    application/module, assigning defects to individuals and tracking thedefects to resolution. There are features like email notifications, user

    maintenance, user access control, report generators etc in this system.

    Project

    Specification

    This system can be used as an application for the any product based

    company to reduce the defects in products quality and productivity. Userlogging should be able to upload the information of the user.

    Functional

    Components

    Following tasks can be performed with the application:

    (a)User Maintenance: Creating, Granting & Revoking access anddeleting users from application.

    (b)Component Maintenance: Creating a component (application beingdeveloped / enhanced), Granting & Revoking access oncomponents to Users and Marking a component as Active orClosed.

    (c)Defect Tracking: Creating, Assigning defects to users, Modifyingand Closing a defect. A defect screen should at least havefollowing details

    Defect Number and Title

    Defect priority

    Date created

    Defect description Defect diagnosis

    Name of originator

    Name of Assignee

    Status

    Resolution(d)Find User: A search screen to find users and display results(e)Find component: A search screen to find components and display

    results

    (f) Find defect: A search screen to find defects and display results(g)Report: Generate reports on defects

    Accordingly there would be following levels of user privileges:

    Application admin having all privileges.

    Component admin having privileges (b),(d),(e),(f) for thecomponents they own.

    Users having privileges for (b),(d),(e),(f) for components they haveaccess to.

    All should have privileges for (c).

  • 8/2/2019 Java Abstracts

    12/24

  • 8/2/2019 Java Abstracts

    13/24

    Oracle/SQL Server/Access (Database)

    Windows XP/2003 or Linux/Solaris (Operating System)

    BEA WebLogic/JBoss/WebSphere (Server Deployment)

    Other Details The application should be highly secured and with different levels &

    categories of access control.

  • 8/2/2019 Java Abstracts

    14/24

    ABSTRACT

    Electronic descriptive examination managing system is a computerized way of

    conducting present day paper-based descriptive examinations in a university byproviding much user-friendliness to students, staff, invigilators and administrator.

    Every student has to submit his user-id, course, year of study, branch, and subject-

    code details before taking the exam. This system eliminates the use of paper from

    question paper setting to viewing results by the student and also provides the

    security to the answer sheets from illegal modifications.

    The actors involved are:

    1. Student

    2. Staff

    3. Invigilator

    4. Administrator.

    After entering into the system, student has to answer the question paper in

    the text area provided to him for each question. After writing the exam, the student

    submits the exam. To protect the answer sheet from illegitimate modifications, the

    system converts it into PDF before storing in the server. Depending on the subject

    code, answer sheets belonging to a particular subject are automatically uploaded to

    corresponding staffs user. Staff member who is going to correct this particular

    subject can access these answer sheets by logging into his user-id. After evaluating

    the paper, marks are allotted for each answer depending on his performance. These

    marks will be entered into the database by the staff after correcting the paper.

    Invigilator logs into the system to authenticate the exam written by the student. He

    gives feedback regarding absentees, debarred candidates, technical problems etc to

    the system.

    After evaluation is carried out, students can view the marks obtained for

    each subject, and for each question in each subject.

    Administrator is the main person who maintains the system. He performs

    main functions like entering and maintaining student details, staff details,invigilator details and exam settings. This system enables us to conduct the exam

    process completely from the allocation of invigilators, allocation of staff for

    evaluating each subject, allotting marks, viewing marks etc. The main advantage of

    the system is that it provides security to the answer sheets written by students.

  • 8/2/2019 Java Abstracts

    15/24

    E-Procurement System

    ABSTRACT

    The proposed system is a 24*7 online solution, which provides thetraditional tendering process in an electronic form. It should provide an

    easy way of tendering and these should not be any difficulty in the usage

    of the system even in the absence of the person. It is meant for use by

    the department people and contractors. The department people are

    responsible to invite and evaluate the tenders where as the contractors

    are responsible to download and submit the tenders. Further the

    proposed system should be in such a way that it need to be accessed

    from anywhere.

    Advantages of Proposed System:

    Provides an easy way of selecting a tender.

    Able to access the information from anywhere in the world.

    Minimum effort is needed

    Data consistency is maintained.

    Requirements Specification:

    SOFTWARE SPECIFICATION

    Operating System: Windows XP

    Front End: J2EE

    Back End: Oracle 10g

    HARDWARE SPECIFICATION

    Pentium III processor

    128 MB RAM

    Hard disk 40 GB

    Microsoft Compatible 101 or more Key Board

  • 8/2/2019 Java Abstracts

    16/24

    E-Zest

    The system aims at the maintenance and management of the different

    accommodations that are available in the different parts of the world. It

    mainly takes care of the resort management at the core area of the database.

    The system provides the information regarding the different resorts that are

    available and their status specific to availability. The database also manages

    the atomic information regarding the different units that are available under

    one resort and the architectural details of the Unit facilities that are available.

    Each unit is well furnished and is well designed for the basic flexibility of the

    tourists who are expected to stay.

    The guests can visit the site and register themselves with the required

    information that is expected by the system. Each registered guest can raise a

    request for the unit bookings. The Guests are scheduled with the information

    of the availability of the units for they have requested the time. The Units

    maintenance is automated for proper management of the availability status of

    the units or the scheduled expected date of their availability in near future.

    The system provides the facility for booking of the required available units as

    per the number that is available.

    The system totally built upon the standards of Three Tier Architecture with

    Client, Business and Data Tiers associated as separate layers, with

    specification to high cohesion and loose Coupling Standards for easy

    maintenance.

  • 8/2/2019 Java Abstracts

    17/24

  • 8/2/2019 Java Abstracts

    18/24

    Abstract

    Hiding Info using Video Steganography

    The project entitled Video Steganography is the application developed to embed an video file in

    another video signal. It is concerned with embedding information in an innocuous cover Speech

    in a secure and robust manner. This system makes the Files more secure by using the concepts

    Steganography and Cryptography.

    Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages

    such that the very existence of the message is unknown to third party. The goal of cryptography

    is to make data unreadable by a third party, the goal of Steganography is to hide the data from a

    third party Through the use of advanced computer software, authors of images and software can

    place a hidden trademark in their product, allowing them to keep a check on piracy. This is

    commonly known as watermarking. Hiding serial numbers or a set of characters that

    distinguishes an object from a similar object is known as finger printing. Together, these two are

    intended to fight piracy. The latter is used to detect copyright violators and the former is used to

    prosecute them. But these are only examples of the much wider field of Steganography.

    The cover data should not be significantly degraded by the embedded data, and the embedded

    data should be as imperceptible as possible. The embedded data should be as immune as possible

    to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that

    the hidden message should be encrypted.

  • 8/2/2019 Java Abstracts

    19/24

    Abstract

    HRMS

    The main aim of the project is to develop a Human Resource Management system

    for the Intranet Automation of HR Software .HR system provides the information

    regarding the employees I the company. The system has been to facilitate good

    Interaction/ communication facilities between the employees and HR

    Administration.

    The web pages about an employee are created dynamically based on the user id

    and password and links are provided to web pages containing information about

    employee General details , Contact details ,skill details etc., he also has the facilityof viewing a summary report of all the projects done by a particular employee. A

    list of all employees is provided along with employees Designation and

    Department.

  • 8/2/2019 Java Abstracts

    20/24

    Job Scheduling and Status Tracking

    ABSTRACT

    Job scheduling & Status tracking system is a web based application which helps a

    workgroup to keep track of tasks (jobs) via a shared central resource.

    Job Management is todays most advanced job scheduling application designed to automate

    critical IT processes and workloads intelligently across disparate systems and applications to

    render business processes securely and reliably.

    The data is stored centrally on the server, which make it especially suitable for distributed

    teams who can use just the web browser to access it. No local software needs to be installed on

    the client system and all web browsers are support.

    The main objective of the system is to prioritize the job schedules and allow us to meet

    promise dates. Status tracker focuses on workers report on what they have completed, and the

    materials they have used in real time. Using terminals out on the shop floor, bar coding, or web-

    based reporting, employees can directly enter their time and materials for the jobs they are

    working on.

    The actual cost of the employees time, materials cost and status of a job is available for

    management analysis. Exception reporting when a job is not running as scheduled.Inventory is

    also updated.The application itself can be installed virtually on webserver.

  • 8/2/2019 Java Abstracts

    21/24

    Mobile Banking

    In todays age of new opportunities and emerging technologies, there is

    a new communications infrastructure to transform the way business is

    done. Using simple and cheaper hardware such as mobiles and handhelddevices we can communicate & also we can do business transactions. It

    provides much better mobility than PCs. Technology is moving towards

    mobiles which has wide spread usage and acceptability. Lot of protocols

    and softwares has been developed. We are connecting the mobile to

    bank database using WML (Wireless Markup Language) scripts and java

    technology.

    This opportunity is mobile commerce, and it will drive new levels ofintense competition in the finance industry. Mobile commerce achieves

    this by removing the traditional restrictions of geographical location and

    high entry costs. This time the result on the finance industry will be led

    by a new weapon i.e., the mobile phone.

    We are providing a wide range of mobile banking for individual clients,

    including balance checking, amount transfer, stop payment, request

    check book, mini statement, etc.

  • 8/2/2019 Java Abstracts

    22/24

  • 8/2/2019 Java Abstracts

    23/24

    Repository and Alumuni Search Engine

    Abstract

    Alumni are the former students of the college. Once a studentgraduates from the institute, his/her professional life or career begins. Themain purpose of this project is to provide a platform for the studentsthrough which they can be in contact with the administration of the collegeand friends after passing out from the college.

    1.2 Overview:

    The Repository and Search Engine is an Internet based applicationthat can be accessed throughout the World. Anyone can access the SearchEngine to know about any Alumni of that college.The main functional components of this system are:

    1. Administrator2. Student/Alumni3. Guest User

    Administrator can perform the following functions:

    Responsible for the accounts of all students.

    Add new event details.

    Add campus interviews details.Student can perform the following functions:

    Can register into system.

    Students can login into the system.

    Update the profile.

    Can search any registered student. Can see the events details.

    Students also can see the campus interview details.Guest user can just view the various details of the college and can search

    the details of any student.

  • 8/2/2019 Java Abstracts

    24/24