Java Abstracts
-
Upload
rama-krishna-inya-ramidi -
Category
Documents
-
view
217 -
download
0
Transcript of Java Abstracts
-
8/2/2019 Java Abstracts
1/24
PRIVATE INSTANT MESSAGING
Abstract
Instant messaging (IM) and chat are technologies that facilitate near real-
time text based communication between two or more participants over a network.
It is important to understand that what separates chat and instant messaging from
technologies such as e-mail is the perceived synchronicity of the communication
by the user - Chat happens in real-time before your eyes. For this reason, some
people consider communication via instant messaging to be less intrusive than
communication via phone. However, some systems allow the sending of messages
to people not currently logged on (offline messages), thus removing much of the
difference between Instant Messaging and e-mail.
Instant Messaging allows instantaneous communication between a numberof parties simultaneously, by transmitting information quickly.
IM allows effective and efficient communication, featuring immediate
receipt of acknowledgment or reply. In certain cases Instant Messaging involves
additional features, which make it even more popular.
The project deals with the development of small instant messaging tool over the
intranet. This will be used with in the small private network.
Requirements
HARDWARE
Processor: Intel Core 2 Duo
RAM: 2 GB
Hard Disk: 120 GB
SOFTWARE
Operating System: Microsoft Windows Vista Home Premium
Programming Language: Java (JSDK 1.6)
Modules:
User Interface Module
Network Module
-
8/2/2019 Java Abstracts
2/24
Activity Control system
Abstract
Activity Control System (ACTITIME) is a time collection software that is streamlined
for billing and invoicing purposes. ACTITIME allows time tracking for customer andproject related tasks. After being collected the data can then be exported for invoicegeneration.
The major tasks, which are performed by the current project are:
1. Create user accounts2. Register billing types (optionally)3. Register customers4. Register projects
5. Add tasks
After completion of these steps we will be ready to submit time-track.
Create user accounts
Login as the Root system user for initial set up of user accounts. To log inprovide username 'root' and password 'manager'.
The Root is a pre-defined system user that always has all access rights exceptthe right for time-track submission. Access rights of the Root user cannot be modified.
The Root user cannot be deleted.
For security purposes change the predefined password of the Root user beforeproceeding with data setup. To change password of the Root user follow theinstructions listed in the section
Add system users and grant them access rights necessary for their everydaywork.
Each user can be granted one or more access rights. The role executed by auser, as well as the category a user belongs to, depend on the access rights granted tothe user. There are no pre-defined user categories (or roles) in ACTITIME. We need togrant a user those access rights that are necessary for his/her everyday work, and thatis all.
-
8/2/2019 Java Abstracts
3/24
If you are going to track overtime, enable overtime tracking when creating useraccounts. Otherwise it is recommended to keep overtime tracking disabled because thiswill simplify interfaces for the time-track submission.
Register billing types (optionally)
If you are going to classify tasks using billing types, create the necessary billingtypes now.
You can skip this step and return to creation of billing types later. In this case allcreated tasks will be associated with the default billing type. If you decide to use non-default billing types, you will have to update this association for all existing tasks aftercreation of the billing types. ,Register customers
ACTITIME collects time expenses for tasks associated with particular project andcustomer. So before creation of tasks you should register at least one customer andone project.
Register projects
Before adding tasks you should create at least one project associated with a customerregistered on the previous step.
-
8/2/2019 Java Abstracts
4/24
ABSTRACT
Attendance through SMS
This system helps the college management to communicate the details of
the attendance and marks to the parents through SMS. This system makes use of
the database built using biometric finger print reader for the attendance.
Then by generating reports on each day it will identify the students who
have less percentage of attendance than the required aggregate percentage .It sends
the messages to the mobiles of the parents about the attendance and marks details.
Apart from this whenever the parents want to know about their students
attendance and marks they can directly login into the site or they can send
message to the administrator by giving that particular students registration number
and they can get return message.
-
8/2/2019 Java Abstracts
5/24
ABSTRACT
AJAX BROWSER
We propose a new web browser for Ajax approach with asynchronous communication
model. Our web browser can improve the operationality that is equivalent to the operationality of
desktop applications without revising program codes of the web applications.
When the user requests for a page, the browser displays the HTML page according to the
source code given by the server. When we click Refresh button, the browser does not load the
whole page again as in classic web application model. Instead, the server compares the existing
page and the requested page and maintains the differences in a difference table. Only those parts
of the page where changes occurred are loaded.
Our browser has the following features
(1) No change of client programs and server programs of web applications,
(2) Asynchronous communication with web servers,
(3) Partial screen update replaces click, wait and refresh user interaction model.
MODULES:
1. Parsing:
HTML source is analyzed by a parser based on HTML tags. Syntax trees are
generated by the parser. Nodes of the syntax tree mean HTML tags; leaves of the syntax tree
mean text contents such as String, numerical, and JavaScript codes.
2. Generating JavaScript:
The original HTML source does not have a function of partial updating.
Therefore, new JavaScript codes are added to the original HTML source. The JavaScript codes
-
8/2/2019 Java Abstracts
6/24
refer to the difference table. JavaScript codes including innerHTML method are inserted to the
original HTML source.
3. Searching difference:
With comparing the two syntax trees, difference between the two web pages is detected. If
partial update of the web page is required, a difference table is generated. The difference table
includes the difference node information such as tag name, ID, tags properties, text
4. Updating partially:
According to the difference table, a current web page added JavaScript codes updates
partially. In order to update, the current web page accesses to the difference table at constant
intervals. The reason of the constant accessing to the difference table is that the current web page
in the Main block is executed independently from the communication with a web server in the
Sub block. In the Sub block in the model, communication with the web server occurs
corresponding to events such as clicking reload button or automatic reload. In short, the
Main block and the Sub block in the model are executed independently each other. Only
accessing to the difference table is a relationship between the two blocks. Therefore, the
asynchronous communication with web servers can be achieved.
TECHNOLOGIES USED:
Java script
HTML
Java Swings
-
8/2/2019 Java Abstracts
7/24
ABSTRACT
COLLEGE ADMINISTRATION SYSTEM
College administration led by the administrator works with students, academic and supportstaff to ensure the effective administration of all matters of students admission, fee details,
contact details, transfer of students.
The administrator assigns different userids and passwords to clerk and accountant so that he
shares his work These are the people responsible for entering and making changes to the entered
data.so,the username and password are highly secured.
The administrator have all rights over the system.clerk is responsible for contact details and
transfer of student modules.He can update the contact details and checks the availability for
transfer of students in the beginning of second year.
Accountant is responsible for fee module.He enters the fee details into the database.
It is easy for the college administration to know the students dues and send particular notice to
them.
-
8/2/2019 Java Abstracts
8/24
Abstract
Title: Compressor and De-Compressor
In computer science and information theory, data compression or source coding is the
process of encoding information using fewer bits (or other information-bearing units) than anunencoded representation would use through use of specific encoding schemes. One popularinstance of compression with which many computer users are familiar is the ZIP file format,
which, as well as providing compression, acts as an archiver, storing many source files in a
single destination output file.
As with any communication, compressed data communication only works when both the
sender and receiver of the information understand the encoding scheme. For example, this text
makes sense only if the receiver understands that it is intended to be interpreted as charactersrepresenting the English language. Similarly, compressed data can only be understood if the
decoding method is known by the receiver.
Compression is useful because it helps reduce the consumption of expensive resources,
such as hard disk space or transmission bandwidth. On the downside, compressed data must be
decompressed to be used, and this extra processing may be detrimental to some applications. For
instance, a compression scheme for video may require expensive hardware for the video to bedecompressed fast enough to be viewed as it's being decompressed (the option of decompressing
the video in full before watching it may be inconvenient, and requires storage space for the
decompressed video). The design of data compression schemes therefore involves trade-offsamong various factors, including the degree of compression, the amount of distortion introduced
(if using a lossy compression scheme), and the computational resources required to compress and
uncompress the data.
Modules:
Compression Module: This module is used to compress any file to save the disk space. This
includes the usage and implementation of data compression algorithm for the compression of the
files.
De compression Module: This module will take the compressed file as the input and generates or
rebuilds the original file by the implementation of de compression algorithm.
Technologies Used:
Programming Language: Java (Java SDK version 1.5.0)
Operating System: Microsoft Windows Xp with Service Pack 2
-
8/2/2019 Java Abstracts
9/24
ABSTRACT
CRYPTOGRAPHY
When a number of computers are interconnected to form a network, the protectmechanisms within the individual computers become inadequate to ensure the security of data
communications across the network. Preventing the disclosure of original message is not the only
aspect of security in data communication systems; others include protection against alterationsand introduction of false messages.
Cryptography has appeared as the best measure for data security in computer
communication systems by transforming the original data into an unintelligible form. It servesas a countermeasure to passive wiretapping attacks and also as a foundation on which
countermeasures against active wiretapping can be constructed.
There is a strong need for the general tools of utility, which can convert a plain text-fileinto a cipher file and vice-versa, for every user who intend to transfer/ receive text/data on the
network. For this purpose, I implemented the cryptographic techniques as general tools of utility,
which can be used to encrypt / decrypt the files, which roam on the network.
In this project "Implementation of cryptographic techniques for secure file
transfer" three very popular cryptographic techniques: /. Transposition Cipher 2. SubstitutionCipher and 3. RSA (Rivest, Shamir & Adleman) public key cryptographic scheme are
implemented in software written in 'C'.
1. Implementation of Transposition Cipher
In this implementation, the original plain text is transformed by changing the
positions of characters of message plain text. A keyword of 8 characters length is used
to transform the message text and written to the destination file.
The encrypted file may be transferred to the destination where the file is read and arranged
according to the 8-character-key, which is then written on to a file. This file contains the original
message plain text.
2.Implementation of Substitution Cipher
In this implementation, the original plain text is transformed by substituting each character ofthe message plain text by another character. A mono-alphabetic substitution is used in this
implementation.
-
8/2/2019 Java Abstracts
10/24
Here the key taken is 52 characters length, which contains all the small case and capital
letters of English text, which are used for substitution.
3.Implementation of RSA (Rivest, Shamir & Adleman) public key Cryptographic scheme
Firstly, two large prime numbers p and q, each about 100 decimal digits long are selected and
their product n = p*q is obtained. Then Eulers function z = (p -1) (q - 1) is computed.Choose a number relatively prime to z and call it d. Find e such that e x d = 1 mod z.
To encrypt a message P, compute C = Pe
(mod n). To decrypt C, compute P = Cd
(mod n).
The pair of positive integers (e, n) is termed as the encryption key and the corresponding pair of
integers (d, n) as the decryption key. Each user makes his encryption key public, i.e., known to
everyone on the network and keeps the corresponding decryption key secret with himself
This program is used to encrypt data files and decrypt the encrypted files. As data securitymechanisms can generally be developed independently of
-
8/2/2019 Java Abstracts
11/24
Defect Tracking for Improving Product Quality and Productivity
Vision This project is aimed at developing a Defect Tracking for Improving
Product Quality and Productivity useful for applications developed in anorganization. The Defect Tracking for Improving Product Quality and
Productivity is a web based application that can be accessed throughoutthe organization. This system can be used for logging defects against an
application/module, assigning defects to individuals and tracking thedefects to resolution. There are features like email notifications, user
maintenance, user access control, report generators etc in this system.
Project
Specification
This system can be used as an application for the any product based
company to reduce the defects in products quality and productivity. Userlogging should be able to upload the information of the user.
Functional
Components
Following tasks can be performed with the application:
(a)User Maintenance: Creating, Granting & Revoking access anddeleting users from application.
(b)Component Maintenance: Creating a component (application beingdeveloped / enhanced), Granting & Revoking access oncomponents to Users and Marking a component as Active orClosed.
(c)Defect Tracking: Creating, Assigning defects to users, Modifyingand Closing a defect. A defect screen should at least havefollowing details
Defect Number and Title
Defect priority
Date created
Defect description Defect diagnosis
Name of originator
Name of Assignee
Status
Resolution(d)Find User: A search screen to find users and display results(e)Find component: A search screen to find components and display
results
(f) Find defect: A search screen to find defects and display results(g)Report: Generate reports on defects
Accordingly there would be following levels of user privileges:
Application admin having all privileges.
Component admin having privileges (b),(d),(e),(f) for thecomponents they own.
Users having privileges for (b),(d),(e),(f) for components they haveaccess to.
All should have privileges for (c).
-
8/2/2019 Java Abstracts
12/24
-
8/2/2019 Java Abstracts
13/24
Oracle/SQL Server/Access (Database)
Windows XP/2003 or Linux/Solaris (Operating System)
BEA WebLogic/JBoss/WebSphere (Server Deployment)
Other Details The application should be highly secured and with different levels &
categories of access control.
-
8/2/2019 Java Abstracts
14/24
ABSTRACT
Electronic descriptive examination managing system is a computerized way of
conducting present day paper-based descriptive examinations in a university byproviding much user-friendliness to students, staff, invigilators and administrator.
Every student has to submit his user-id, course, year of study, branch, and subject-
code details before taking the exam. This system eliminates the use of paper from
question paper setting to viewing results by the student and also provides the
security to the answer sheets from illegal modifications.
The actors involved are:
1. Student
2. Staff
3. Invigilator
4. Administrator.
After entering into the system, student has to answer the question paper in
the text area provided to him for each question. After writing the exam, the student
submits the exam. To protect the answer sheet from illegitimate modifications, the
system converts it into PDF before storing in the server. Depending on the subject
code, answer sheets belonging to a particular subject are automatically uploaded to
corresponding staffs user. Staff member who is going to correct this particular
subject can access these answer sheets by logging into his user-id. After evaluating
the paper, marks are allotted for each answer depending on his performance. These
marks will be entered into the database by the staff after correcting the paper.
Invigilator logs into the system to authenticate the exam written by the student. He
gives feedback regarding absentees, debarred candidates, technical problems etc to
the system.
After evaluation is carried out, students can view the marks obtained for
each subject, and for each question in each subject.
Administrator is the main person who maintains the system. He performs
main functions like entering and maintaining student details, staff details,invigilator details and exam settings. This system enables us to conduct the exam
process completely from the allocation of invigilators, allocation of staff for
evaluating each subject, allotting marks, viewing marks etc. The main advantage of
the system is that it provides security to the answer sheets written by students.
-
8/2/2019 Java Abstracts
15/24
E-Procurement System
ABSTRACT
The proposed system is a 24*7 online solution, which provides thetraditional tendering process in an electronic form. It should provide an
easy way of tendering and these should not be any difficulty in the usage
of the system even in the absence of the person. It is meant for use by
the department people and contractors. The department people are
responsible to invite and evaluate the tenders where as the contractors
are responsible to download and submit the tenders. Further the
proposed system should be in such a way that it need to be accessed
from anywhere.
Advantages of Proposed System:
Provides an easy way of selecting a tender.
Able to access the information from anywhere in the world.
Minimum effort is needed
Data consistency is maintained.
Requirements Specification:
SOFTWARE SPECIFICATION
Operating System: Windows XP
Front End: J2EE
Back End: Oracle 10g
HARDWARE SPECIFICATION
Pentium III processor
128 MB RAM
Hard disk 40 GB
Microsoft Compatible 101 or more Key Board
-
8/2/2019 Java Abstracts
16/24
E-Zest
The system aims at the maintenance and management of the different
accommodations that are available in the different parts of the world. It
mainly takes care of the resort management at the core area of the database.
The system provides the information regarding the different resorts that are
available and their status specific to availability. The database also manages
the atomic information regarding the different units that are available under
one resort and the architectural details of the Unit facilities that are available.
Each unit is well furnished and is well designed for the basic flexibility of the
tourists who are expected to stay.
The guests can visit the site and register themselves with the required
information that is expected by the system. Each registered guest can raise a
request for the unit bookings. The Guests are scheduled with the information
of the availability of the units for they have requested the time. The Units
maintenance is automated for proper management of the availability status of
the units or the scheduled expected date of their availability in near future.
The system provides the facility for booking of the required available units as
per the number that is available.
The system totally built upon the standards of Three Tier Architecture with
Client, Business and Data Tiers associated as separate layers, with
specification to high cohesion and loose Coupling Standards for easy
maintenance.
-
8/2/2019 Java Abstracts
17/24
-
8/2/2019 Java Abstracts
18/24
Abstract
Hiding Info using Video Steganography
The project entitled Video Steganography is the application developed to embed an video file in
another video signal. It is concerned with embedding information in an innocuous cover Speech
in a secure and robust manner. This system makes the Files more secure by using the concepts
Steganography and Cryptography.
Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages
such that the very existence of the message is unknown to third party. The goal of cryptography
is to make data unreadable by a third party, the goal of Steganography is to hide the data from a
third party Through the use of advanced computer software, authors of images and software can
place a hidden trademark in their product, allowing them to keep a check on piracy. This is
commonly known as watermarking. Hiding serial numbers or a set of characters that
distinguishes an object from a similar object is known as finger printing. Together, these two are
intended to fight piracy. The latter is used to detect copyright violators and the former is used to
prosecute them. But these are only examples of the much wider field of Steganography.
The cover data should not be significantly degraded by the embedded data, and the embedded
data should be as imperceptible as possible. The embedded data should be as immune as possible
to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that
the hidden message should be encrypted.
-
8/2/2019 Java Abstracts
19/24
Abstract
HRMS
The main aim of the project is to develop a Human Resource Management system
for the Intranet Automation of HR Software .HR system provides the information
regarding the employees I the company. The system has been to facilitate good
Interaction/ communication facilities between the employees and HR
Administration.
The web pages about an employee are created dynamically based on the user id
and password and links are provided to web pages containing information about
employee General details , Contact details ,skill details etc., he also has the facilityof viewing a summary report of all the projects done by a particular employee. A
list of all employees is provided along with employees Designation and
Department.
-
8/2/2019 Java Abstracts
20/24
Job Scheduling and Status Tracking
ABSTRACT
Job scheduling & Status tracking system is a web based application which helps a
workgroup to keep track of tasks (jobs) via a shared central resource.
Job Management is todays most advanced job scheduling application designed to automate
critical IT processes and workloads intelligently across disparate systems and applications to
render business processes securely and reliably.
The data is stored centrally on the server, which make it especially suitable for distributed
teams who can use just the web browser to access it. No local software needs to be installed on
the client system and all web browsers are support.
The main objective of the system is to prioritize the job schedules and allow us to meet
promise dates. Status tracker focuses on workers report on what they have completed, and the
materials they have used in real time. Using terminals out on the shop floor, bar coding, or web-
based reporting, employees can directly enter their time and materials for the jobs they are
working on.
The actual cost of the employees time, materials cost and status of a job is available for
management analysis. Exception reporting when a job is not running as scheduled.Inventory is
also updated.The application itself can be installed virtually on webserver.
-
8/2/2019 Java Abstracts
21/24
Mobile Banking
In todays age of new opportunities and emerging technologies, there is
a new communications infrastructure to transform the way business is
done. Using simple and cheaper hardware such as mobiles and handhelddevices we can communicate & also we can do business transactions. It
provides much better mobility than PCs. Technology is moving towards
mobiles which has wide spread usage and acceptability. Lot of protocols
and softwares has been developed. We are connecting the mobile to
bank database using WML (Wireless Markup Language) scripts and java
technology.
This opportunity is mobile commerce, and it will drive new levels ofintense competition in the finance industry. Mobile commerce achieves
this by removing the traditional restrictions of geographical location and
high entry costs. This time the result on the finance industry will be led
by a new weapon i.e., the mobile phone.
We are providing a wide range of mobile banking for individual clients,
including balance checking, amount transfer, stop payment, request
check book, mini statement, etc.
-
8/2/2019 Java Abstracts
22/24
-
8/2/2019 Java Abstracts
23/24
Repository and Alumuni Search Engine
Abstract
Alumni are the former students of the college. Once a studentgraduates from the institute, his/her professional life or career begins. Themain purpose of this project is to provide a platform for the studentsthrough which they can be in contact with the administration of the collegeand friends after passing out from the college.
1.2 Overview:
The Repository and Search Engine is an Internet based applicationthat can be accessed throughout the World. Anyone can access the SearchEngine to know about any Alumni of that college.The main functional components of this system are:
1. Administrator2. Student/Alumni3. Guest User
Administrator can perform the following functions:
Responsible for the accounts of all students.
Add new event details.
Add campus interviews details.Student can perform the following functions:
Can register into system.
Students can login into the system.
Update the profile.
Can search any registered student. Can see the events details.
Students also can see the campus interview details.Guest user can just view the various details of the college and can search
the details of any student.
-
8/2/2019 Java Abstracts
24/24