You are on page 1of 39

JAVA APPLICATION PROJECS ADVANCED SECURED SYSTEM Abstract: ADVANCED SECURED SYSTEM deals with the Server based

Information and Maintenance of the Server. This system is used to reduce the workload of the server. It provides mail services, chat services between the clients and it also response to the client requests. This system is designed as a middleman between the client and the server. This system provides all kinds of services to the clients like file transfer, mail, chat etc... This system is cost-effective and provides a security like firewall to the server. Though there are any software available in the market there is no popular server in terms of cost and providing services. eveloped in !ava platform will be an advantage to this software. This can be used in various platforms. The main ob!ective of this software is to Speed up the data transfer "heck for virus file #rovide mail, chat services Strong authentication Sharing resources $le%ibility

Bug Track !g S"st#$ Abstract& This pro!ect is shaped with design and development of ' elibers technologies.', which involved the evelopment, Testing and Maintains, the process of software efect tracking for both development document and development, Test case and

also reports are included. It(s prepared in )indows(*# +nvironment by ,sing Simplest, $le%ible and compact -.++ with MSS/0 Server.111. This system provides all details about the Testing, 2ug tracking and 3eports. That is first we receive the requirement from customers or 4ew "lients, this is entered into the #rocess Instruction, then it is divided into many operations for processing the Testing 3eports. O!% !# J&b P&rta%'R#su$# Track !g S"st#$( Abstract 3esume Tracking System is helps human resource professional5s,freshers and !ob seekers for searching !ob. It helps save time and make the recruitment process mare efficient.3esume Tracking System offer widest variety of searches fund in any database program. This search include full-te%t, fu66y wildcard, 2oolean, pro%imity, data and numeric. If the user information is strutted 7like names and address8, users can take advantage of its freeform database capabilities. "reate an entry form for user data. +very time user can add a data to their database, call up the entry form and fill in the field. ,nlike traditional database, 3esume Tracking System does not require pre-defined field lengths or field types. $ields e%pand as enter information(s they never need to worry about running out of room

C% #!t C&!tr&% Abstract: This pro!ect CLICON designated on accessing a remote resource, as its name specifies. 9ere the resource we mean is the desktop screen of a remote system which is connected to the network. Multiple desktop resources visuali6ed in a single Server host, so that live perspective of !obs on each "lient systems could be conquered without knowing to the client. This empowers scrutini6ing of all "lient systems, for their idleness and unnecessary !obs, in a firm with diverse employees as "lients. The idle workers should be controlled for an effective !ob environment: this could be achieved by sending Instance message, chatting with the employees for warning and forced shutdown of "lient system. 2y understanding the value of time, this pro!ect deputi6es to control and organi6e proper functioning of employees;students in firms;institutions respectively. D ss#rtat &! I!tr&)uct &! Abstract: This report describes progress to date in the implementation of a program to play Te%as 9old 5+m poker. It e%plains a variety of things starting with the motivation behind choosing the topic. The rules of poker and the layout of the game then follow. <lso included are specifications regarding how the game will run and the proposed design behind the implementation. The report also contains references to similar e%isting work and finally a plan for the future.

E*Ba!k !g Abstract: )ith rapid advances in telecommunication systems and digital technology, it is difficult to predict how Internet banking will improve and e%pand in coming years. 2ut with the number of computers increasing every year, the electronic delivery of services is becoming popular in the banking sector. The Indian e%perience of + = banking is gradually merging with its international counterparts. )hile the private sector and multi-national banks have been first and fast in adopting internet technology in client servicing, there is a gradual trend for the ma!or public sectors and numerous co-operative units to move in the same direction. < mi% of policy support and security assurance should propel further + = banking adoption in India. + %# Track !g S"st#$ Abstract: $ile Tracking System is used to track the progress of each activity in the software development life cycle, from the inception of a pro!ect until it is discarded. It consists of modules like ata "onversion >perators, ata Management, <dministrator, /uality control, and 3eports etc. The ob!ective is to create a system, which will help the management in the S 0" process starting from 0ogin to 3eports. This system will be "lient;Server based, so that the pro!ect details can be available to the clients and top management easily all the time. )ith this system, the management can track the ata details like ,ploading ownloading, )orking days, etc. effectively and can use these 3eport for future

+IRE,ALL Abstract: $irewalls are core elements in network security. < firewall is a network element that controls the traversal of packets across the boundaries of a secured network based on a specific security policy. < firewall security policy is a list of ordered filtering rules that define the actions performed on matching packets. $irewall filtering rules have to be carefully written and organi6ed in order to correctly im??plement the security policy. Therefore, inserting or modifying filtering rules in any firewall requires thorough intra- and inter-firewall analysis to determine the proper rule placement and ordering in the firewalls. In this paper all anomalies that could e%ist in a single- or multi-firewall environment are identified. < set of techniques and algorithms to automatically discover policy anomalies in centrali6ed and distributed legacy firewalls is also implemented. This technique is implemented using -ava programming and simplifies the management of filtering rules and maintains the security of ne%t-generation firewalls.

I!t#%% g#!c# -!&.%#)g# Bas#) R#t&rt#r Abstract: The #ro!ect @Intelligence Anowledge 2ased 3etorterB is to implement effective communication between software professionals in a software company. 3etorter means a variable that is used to keep track of anything that must be counted. The programming language determines the number of counters 7variables8 that are available to a programmer.

In software company interaction between #ro!ect managers, pro!ect leaders, team leaders and programmers are very essential for successful completion of a pro!ect. This pro!ect enables an effective interaction between them. +very software company maintains the standard code. If a person new to the company, he ; she cannot be able to write code for that company standard. This pro!ect provides the feature of intelligence knowledge based reply of standard code for trainees. So minimum training is enough. This system is implemented with <rtificial Intelligence concept for delivering message to programmers. Some programmer(s may need same concept or source. Such source or concept may have already discussed between previous #0 and #rogrammers, those details are kept automatically through this system and replies when the same standard code is needed. Through this pro!ect daily status of the each programmer is reported to server automatically and also login and logout details are maintained automatically. If server detects any continuous ideal process it reports and shutdowns the system automatically ISO Au) t s"st#$ Abstract: IS> 7International Standards >rgani6ation8 is the International Standards >rgani6ations. They do not create standards but 7as with <4SI8 provide a means of verifying that a proposed standard has met certain requirements for due process, consensus, and other criteria by those developing the standard. Pr&gra$ O/#r/ #. #lan quality audit
#erform quality audit Summari6e audit results +valuate quality audit

#repare audit report 3eview audit file Track implementation

APPLICATION DEVELOPER Abstract: This pro!ect JAD 7-<C< <##0I"<TI>4 +C+0>#+38B is to develop a )i6ard and a Te%t #ad, which has developed using the -ava 0anguage. -ava applet applications are mostly used in the web pages, the coding for applets takes considerable amount of users time. Sun Micro system does not provide any kind of tool for creating the application with out writing source code. This pro!ect provides an intelligent environment containing a number of ready-made tools to create the application with out writing the source code. These ready-made tools may be any of the D,I components that are available in the -ava <)T package. 2y using this )i6ard, users can compile and run the generated source code with out going to the >S prompt. The applet applications generated using the )i6ard can be accessed in the web pages also. The wi6ard can be used to generate screen design for any back end table. The Te%t #ad can be used as a -ava editor where compilation and e%ecution of applications are possible. ,sing the Te%t #ad we can also write source code for the stand alone applications in -ava. The software was successfully implemented and applet applications were created, compiled, and they were successfully used in the web pages.

O!% !# s0ar# tra) !g s"st#$ Abstract: O!% !# s0ar# tra) !g s"st#$ is developed for the share brokerage firm in the process of their activities to automate their operations. The system is dealing with the selling and buying the shares. >nline brokers allow one to buy and sell shares via Internet.

The O!% !# s0ar# tra) !g s"st#$ includes several modules. They are described below as follows. Stock +%change Module "ustomer Information Module Investment Information Module 2ank Transaction Module Trade Management Module 2rokerage Module

PERSONAL Bus !#ss I!t#%% g#!c# OR1ANI2ER Abstract: This pro!ect titled PERSONAL Bus !#ss I!t#%% g#!c# OR1ANI2ER was developed for a software development company. This pro!ect keeps an account of the number of pro!ects handled by the company and their status. Its main ob!ective is the need for monitoring system, which can store the day-to-day activities of the developers and administrators. The system enables to maintain a record and to monitor the progress of the work carried within the organi6ation on daily basis. This pro!ect is developed for the administrative purpose in a software company. The administrator has the full control on the pro!ect status being handled by the company. The administrator monitors the every day report of each pro!ect handled by the company. They can monitor progress of each developer and the current status of each pro!ect individually. The main ob!ective of this pro!ect is to monitor the everyday status of each pro!ect and the developer(s contribution towards it. The following are the modules involved in #ro!ect Monitoring System +mployee etail Module "ustomer etail Module #ro!ect etail Module #ro!ect Scheduling Module +mployee Scheduling Module

3eport Deneration Module

St#ga!&gra30" Abstract: Steganography - derived from the Dreek words meaning @covered )ritingB, is the art of hiding information in ways that prevent its detection. It is a method akin to convert channels, and invisible links, which add another step in security. < message in cipher te%t may arouse suspicion while an invisible message will not. igital steganograpy uses a host data or message, known as a @containerB or @coverB to hide another data or message in it. The conventional way to protecting information was to use a standard symmetric or asymmetric key system in encryption. Steganography can also be used to place a hidden @ TrademarkB in images, music, and software, a technique referred to as watermarking. Steganography, if however used along with cryptography, for e%ample, if a message is encrypted using triple +S 7+ +8 which requires a EE. bit key then the message has become quite secure as far as cryptanalytic attack are concerned. 4ow, if this cipher te%t is embedded in an image, video, voice, etc., it is even more secure. If an encrypted message is intercepted, the interceptor may not know the ob!ect contains message. )hen performing data hiding on audio, one must e%ploit the weaknesses of the 9uman <uditory System 79<S8, while at the same time being aware of the e%treme sensitivity of the human auditory system.

V rtua% 3r /at# !#t.&rk Abstract: < virtual private network 7C#48 provides end users with a way to privately access information on their network 7e%ample an intranet8 over a public network infrastructure such as internet. < C#4 is a connection that has the appearance and many of the advantages of a dedicated link but occurs over a shared network. ,sing a technique called @TunnelingB, data packets are transmitted across a public routed network, such as internet or other commercially available network in a private @TunnelB, that simulates a point-to-point connection. This approach enables network traffic from many sources to travel via separate tunnels across the same infrastructure. C#4 solutions can be built using multiple devices like routers, firewalls , and bandwidth managers or they can be implemented on an integrated C#4 router that provides on board firewall and band width management capabilities . Integrating all C#4 functions on a router reduces network comple%ity and total cost of ownership of the C#4 solution. The advantage of a C#4 are less e%pensive to operate than private networks from management, band width and capital perspectives. "onsequently, the payback period for C#4 equipment is generally measured in months instead of years. #erhaps the most important benefit of all, however is that C#4 enables enterprises to focus on their core business ob!ectives instead of running the corporate network

O!% !# J&b P&rta% 'R#su$# Track !g S"st#$( Abstract: 3esume Tracking System is helps human resource professional5s,freshers and !ob seekers for searching !ob. It helps save time and make the recruitment process mare efficient.3esume Tracking System offer widest variety of searches fund in any database program. This search include full-te%t, fu66y wildcard, 2oolean, pro%imity, data and numeric. If the user information is strutted 7like names and address8, users can take advantage of its freeform database capabilities. "reate an entry form for user data. +very time user can add a data to their database, call up the entry form and fill in the field. ,nlike traditional database, 3esume Tracking System does not require pre-defined field lengths or field types. $ields e%pand as enter information(s they never need to worry about running out of room.

CATALO1 MANA1EMENT SYNOPSIS Abstract: >ur #ro!ect = 2.< Transaction facility deals with a manufacturing firm, basically into the manufacture of cosmetics and supplying to it(s clients. 4ow, as of today, the company would require a lot of manual work to be done regarding generation of enquiries, receipt of quotation, generation of purchase order, confirmation etcF. <ll this can be done in a simplified way by our online facility, allowing an administrator, appointed by the company to access the company data base, interact with clients and suppliers, deal with them and transact accordingly. This enables the company to function in a much smoother way, obtain orders faster and clear off work in a more appropriate manner.

COMCAT Abstract: This #ro!ect +ntitled as 5">M "<T( is used basically for chatting purpose with the remote clients or users on Internet or local networks. 9ere in this pro!ect a !ava client ; server combination is used to chat with remote users. )hen a "lient wants to chat with a user on a remote host, he sends a request to the Server with a identification name like chat-id, the server responds to the request by identifying the client-id which is already registered in the server domain and when matched his request is granted and the client can begin to chat with the remote users present on the internet or local network.

The power of Internet is such that it integrates together 0<4s located across diverse software and hardware forms into a single large communication network that spans the globe. The client needs to have a client software such as 4etscape 4avigator or Internet +%plorer to retrieve information as well as chat on the www. referred to as 4etsurfing. <nd it supports chatting, te%t, video and audio. The benefit of using @">M "<TB over other chatting tools is that, with the help of !ava, the programmer can create applet applications which can be use the internet as a server. <pplets are machine independent and so !ava programs can run on any computer on the internet. The term client;server is used in the conte%t of networking, what it actually means. It is important to understand the terms client;server because the I4T3<4+T "9<TTTI4D pro!ect is supported completely by client;server model. < server is anything that has some resource that can be shared. There are compute servers, which provide computing power, web servers, which store web pages. < client is simply any other entity that wants to gain access to a particular server. The interaction between clientGserver is like an interaction between an electrical socket and a lamp. The server is a permanently available resource while client is free to @unplugB after it has been served. The programHs premier feature is its whiteboard drawing utility. Iou can draw freehand, do circles, squares, lines, te%t, or paste image files to the canvas. This is ideal when users want to 'sketch' concepts for one another. ,sers can interact publicly with everyone else on the server, or they can chat;draw privately using !ava "hatHs 'whisper mode'. ,sers can create and manage chat rooms, which can be either 'public' or 'private'. The server will also store and manage answering

machine-style messages for users who arenHt online, and instant messages can be sent to those who are. <dditionally, users who arenHt watching their screens can be paged with sound. #*Ba!k !g s"!&3s"s Abstract: In the current Internet age, every application is being ported to web and allows the users to connect with the system and work online. It has allowed people to remove the barriers of time and distance. "ompetition and changes in technology and lifestyles have changed the face of banking. 2anking being the main financial backbone of any economy cannot stay behind. 4owadays, banks are seeking alternative ways to provide and differentiate their services. "ustomers, both corporate and retail, are no longer willing to queue in banks, or wait on phones, for the most basic of services. They demand and e%pect to be able to transact their financial dealings where and when they wish. )ith the number of computers increasing every year, the electronic delivery of banking services is becoming the ideal way for banks to meet their client(s e%pectations. >nline banking or e-banking can be defined as online systems which allow customers to plug into a host of banking services from a personal computer by connecting with the bank(s computer over telephone wires. Technology continues to make online banking easier for average consumers. 2anks use a variety of names for online banking services, such as #" banking, home banking, electronic banking or Internet banking. 3egardless of the name, these systems offer certain advantages over traditional banking methods. This application is designed to implement the banking solution on the web to enable the customers to transact, sitting at their #", making their account

available to them .? hours a day. )hile the customer has all the options of transactions online, the administrative functions are still limited to the bank officials. The system should allow the customers to perform the following tasks online& Ciew <ccount 2alance >nline Transfers between account "heque book issue request Issue request "hange the personal details The system should also allow the bank officials to do the following operations& >pen a new account and create a new user Service the cheque book issue request Service the issue request $ree6e ; unfree6e an account.

EPAR Abstract: +#<3, a visual *M0 editor, is a generic -ava application for editing valid *M0 documents derived from any valid T . *M0 files can be created and edited T T . without learning the intricacies of *M0. The editor takes as input a given and automatically builds a palette containing the elements defined in the <ny document derived from that T

by using a visual, tree-directed paradigm

can thus be created, edited, or e%panded. The visual paradigm requires only a minimal learning curve, because only valid constructs or elements are presented to the user in a conte%t-sensitive palette. +#<3 is a -ava application built on top of Swing and *M0 #arser for -ava. The *M0 attributes of the elements are edited via a table. +ach attribute value is entered using an editing D,I component 7such as a combo bo% or te%t field8, which is also derived from the T . The editor guides the user in inserting T 8 by making the elements into the tree in the correct order 7according to the insertion of elements in an invalid order. The editor is a Multiple ocument Interface application 7M I8 with full fledged

elements palette-sensitive to the current selected tree node and by not allowing

support for editing multiple *M0 documents and for copying, cutting, and pasting from one document into another. -ava-based, and thus cross-platform +#<3 undo. has been reported to work on )indowsntGJKGJLG.111. rag-and-drop of nodes in and between files. ,nlimited

Multiple views on one file. +valuation of *#ath e%pressions. This is useful for searching nodes, but also as an *#ath learning and e%perimenting tool. "ustomi6ability through *M0 parsers. Schema support, from T through *M0. +#<3 also has its own simple schema language. +#<3 for -ava is a tool for assisting in migration from a content editing environment and e-business environment. +#<3 for -ava provides a -ava *M0 that simulates the +#<3 editor in a modern e-business environment. +#<3 for -ava supports all the traditional editing commands of +#<3 , as well as some enhancements such as 'cut-and-paste' and 'cancel' features and the full ,nicode character set. 2ecause the +#<3 editing is line-oriented, +#<3 for -ava also treats documents as an array of lines and provides the block-edit commands, handles cursor movements, and e%tends the +#<3 editing with some modern editing )hen +#<3 opens a file, it will strip all te%t nodes that consist of only whitespace 7spaces, tabs, newlines8. >therwise a lot of white bo%es would be displayed in the tree for these nodes.

E,4EEL2 SYNOPSIS Abstract: -ourney became part and parcel of a human being(s life. )ithout moving around, people cannot communicate and share the moments with others. In this busy world, especially when more and more population is seen in the developing nations, it is highly essential to have a comfortable and safe !ourney. )hen a passenger wants to go on a !ourney, he wants to first reserve some seat in a bus and for the intended date. This becomes easy with e)heelM software which helps in obtaining reservations of seats in a bus well before and take the tickets also online by staying at home. )hen a passenger wants to book a ticket in a bus, he need to visit this portal and selects the source and destination points along with the date and type of bus he wants. These details are processed and accordingly bus details are displayed. The passenger should select a bus and then the available seats information is displayed. The passenger can select the seats whatever he likes. In the ne%t screen, he can provide his details along with the credit card number. The amount is calculated and deducted from his account. Then a ticket is generated on the console and the passenger can take a printout of it. The same ticket can be presented at the time of !ourney. >n the other hand, the administrator of this system will be able to add new routes, add pick up points for the e%isting routes and cancel e%isting routes. <lso he can

add new travel, add bus details for the travels and can remove an e%isting travel company(s name from the list. e)heelM software is a globally deployable, integrated, workflow based end-to-end system starting from searching bus routes to book them online. This is a complete application for travelers as well as venders. Cendors provide the information like, available routes, timings, price, etc. "ustomers can book a ticket which is a five step process that includes Search 2us, Select 2us, Select Seats, #rovide "ustomer Information and Make #ayment. This application also provides facility to cancel a booked ticket online. There is also scope to measure the user satisfaction regarding the entire booking process. 9e can e%press his views or grievances through testimonial option in the application so that it reflects the goodwill of the travel company and helps other users to have trust in the company. 1ENCO SYNOPSIS Abstract: The 2asic purpose of this pro!ect is to generate D+4"> 0ibrary using -ava application, by implementing different type of algorithm. It supports number of barcode formats and this application can be use and enhanced for whatever reason you like. These barcodes contain encoded authenticated information, which gives a unique identity to any product, and provide a security labels.

4#a%t0 Car# S"st#$ Abstract: "omplete reference guide of Medical #rofessions, 9ospitals, and the #harmacy across the nation that offer the online discussion 7through phone8, and >nline <ppointment to a patient if necessary to obtain these careers. Iou can look up any of the listed medical careers and find out their roles and responsibilities, facilities, /ualification requirements 7$or #hysicians, 4urses, 0ab Technicians, 9ospitals8, and associated affiliations with your career option. )e also have links to obtain quality #hysician and 9ospitals. )e also have links to great financial advertise sites that can help make your career choice a reality. Throughout our hospitals and our company, weHre focused on two key areas& /uality patient care and "ustomer service. +very Sparsh facility works to make patient care and customer satisfaction its top priority. To find and inquire about a /ualified 9ospital, select your 0ocation and go through the Search once. 4ot all hospitals provide public postings of their openings. 9owever, all hospitals welcome general inquiries.

INSPECTION TOOL SYNOPSIS Abstract: The pro!ect deals with automation of some of the steps involved in inspection process. <s mentioned earlier, inspection is carried out in all ma!or phases of S 0" 7Software evelopment 0ife "ycle8 to ensure the reliability and credibility of software. In this era of software revolution, inspection plays a significant role. <ll the software development firms follow their own stringent policies to ensure software reliability. 9ence, there arose a necessity for such a software to reduce the burden of handling software development in a more easy and user friendly way. The software is used to meet the requirements of >ST#0 7overtake software private limited8in software development .The software is an intranet application which can be e%tended to the Internet with a very few modifications. The employees are provided with a well refined D,I to carry out their operations irrespective of their location along with the greatest security and ease. Thus, the software monitors the software development at a various phases of S 0". +ach user deals with his own duties to accomplish the tedious task of software development in a simple manner, which is the main goal achieved through the software. Carious processes such as selection of members for inspection, conducting meetings, sending and receiving important information(s, operations performed by various personnel(s are automated in the course of this pro!ect . >ther minute information(s of great consideration to the pro!ect leaders such as pro!ect status, inspection dates, employee details etc can be retrieved easily through this intranet site. These are the main ob!ectives attained through this pro!ect.

>rgani6ation wishing to optimi6e their inspection processes should consider this type of estimation tool. Inspections are still the most cost effective way to detect defects in software. <fter the inspectors enter the inspection data into the tool, the output is the number of defects remaining in the inspected software 7assuming all the defects already detected will be fi%ed8.The estimate ad!usts for bad fi%es. The tool also provides a recommendation as to whether the software module should be reinserted or not based on the desired quality levels of the organi6ation.

INTE1RATED DEVELOPMENT ENVIRONMENT SYNOPSIS Abstract: This application @$ront +ditor $or JAVA @is developed using -<C<. It is basically an #) t&r with some additional options. This editor is designed in such a way to fulfill the complete needs of the !ava Integrated evelopment +nvironment or !ava development using SUN JD- under windowsJL and above, "ompilation and e%ecution can be done in command prompt only. This application helps to do compilation and e%ecution in editor itself. So that user can identify the .ar! !g's( a!) #rr&r's( in the editor itself. This editor reduces the users time. It is easy to compile and run the programs. This editor is more fle%ible and user friendly. This application is developed in !ava language using the following concepts <)T 5 +RAME5 S,IN15 a!) IO 6 NET,OR-IN17 J,AVE SYNOPSIS Abstract: -)<C+ is a concept of playing and editing the .wav and .au files and saving into different formats and playing and creating our own play modules and checking out with different environments of balancing, volume, speed etc. This process is used to learn how to work with .wav and .au files in !ava witch will have given features. 0oading saving of any .wav;.au files playing, looping, winding display the wave in any 6oom change frequency, balance and volume while playing handle any frequency in L and EN bit a fancy and functional look speaking O languages 7+nglish, allows to eutsch and $rancis8 a module concept, which own modules . e%tend

MOBILE BAN-IN1 Abstract: The improvement in technologies, lot of traditional works are been done using internet. The systems like reservations, banking and other things wear done using internet. The main advantage of this was person need not be present at the place and was done quickly which saved the time. The main draw back of this was, it compulsorily required the costly pc. 4ow the things had changed, the scenario is changing i.e. using of simple and cheaper hardware such as mobiles and handheld devices. )hich provides much better mobility than #"s. Technology is moving towards mobiles which has wide spread usage and acceptability. 0ot of protocols and software(s are been developed to server the concept. 9ere we !ust are trying to be with the scenario. )e are connecting the mobile to bank database using wml scripts and !ava technology.

In today(s age of new opportunism and emerging technologies, there is a new communications infrastructure on offer to transform the way business is done. This opportunity is mobile commerce, and it will drive new levels of intense competition in the finance industry. Mobile commerce achieves this by removing the traditional restrictions of geographical location and high entry costs. This time the assault on the finance industry will be led by a new weapon, the mobile phone. )e are providing a wise range of mobile banking for individual clients, including balance checking, amount transfer, stop payment, request check book, mini statement, etc.

"heck 2alance& users may check the balance of account and the latest transactions. Transfer $unds& ,ser may transfer the amount to the required customer of his choice. Stop #ayment& user is allowed to stop payment of cheques based on his request. 3equest "heque 2ook& user may request the cheque books according to his requirements 7E1 leaves, K1 leaves, E11 leaves8. Mini statement& user is also allowed to view the transactions made. "onfiguration& ,ser configures the functions concerning account payment and code. +tc. >ne report also suggested that this trend might grow as the number of mobile device users continues to grow, and also those users show more wiling to consider using new applications such as mobile cash and payments.

PASS,ORD PROTECTOR SYNOPSIS Abstract: #assword #rotector is the tool which is used to protect the folders 1r files by setting the password so that un authori6ed users should not hake the files and the folders. The folders are protecting by setting the password and the files are protecting by encrypting and decrypting. This pro!ect is developed by -ava E.K version.

PROJECT TRAC-IN1 SYSTEM SYNOPSIS Abstract: The #ro!ect Tracking System was initially developed to document, prioriti6e and track the progress of internal 3emedy pro!ects by setting milestones and establishing deliverables required to complete a pro!ect. <s the application became more robust, other groups became interested in using #TS to manage their own pro!ects. Today #TS is used by groups across the ,4" "hapel 9ill campus. This document will serve to instruct users in creating, modifying and completing #TS requests. ocumentation includes& ,sing the #ro!ect Tracking System, This document discusses opening #TS, how to create an #TS pro!ects, adding attachments, setting up deliverables, establishing pro!ect members, creating deliverables and milestones to measure progress, pro!ect security features, setting milestone alert notifications, sending email from within a #TS pro!ect and more. The aim of the pro!ect is latest generation web based system for managing and tracking software development pro!ects. It is called '#ro!ect tracking System' for a good reason - it was specifically designed to make software pro!ect management hassle free and straightforward. espite the simplicity of use, +asy #ro!ects is a powerful and sophisticated system based on the -.ee technology . These robust technologies provide you with a scalable and fle%ible solution to manage and track pro!ects of any comple%ity level.

PROJISTICS SYNOPSIS Abstract: >ne of the key points is that somebody needs to take responsibility for a thread. $or any non-trivial si6ed pro!ect, it is impossible that a pro!ect manager takes on this responsibility all by himself. #art of this is to make sure that the state of a thread is accurately known at any time to all people that have a reasonable interest in it. < central repository that is maintained by all people involved in a pro!ect and not !ust by some pro!ect managers greatly supports this kind of model. This technique has been used with good success for several years in software defect tracking and change management, but can and should be employed as well in tracking any thread that is part of a pro!ect. To support the method of managing pro!ects as a bunch of threads the #ro!istics system was designed. < tool of this kind is as essential to pro!ect management as is a word processor to a secretary. The #ro!istics system has been developed with the help of many pro!ect managers and team members, testing it on real pro!ects in several organi6ations. The wide acceptance of this system comes not at last from its simplicity and focus. In particular,

8UERY COM SYNOPSIS Abstract: /,+3I ">M is a graphical -ava program that will allow you to view the structure of a - 2" compliant database, browse the data in tables, issue S/0 commands etc. Iou need to be running recommended that you -ava E.? .There are two pieces of information you need to supply to connect to a database: the driver definition and the alias. The driver definition specifies the - 2" driver to use and the alias specifies the connection parameters. < number of default driver definitions ship with /,+3I ">M. These are added to the rivers 0ist window 7View Drivers option on the Windows menu8 when you first start up /,+3I ">M. <ll of the default driver definitions assume that the - 2" driver classes are in the current class path or in your -3+ e%tensions directory 7consult the documentation for your -ava implementation for more information on this8. If this is not the case you will need to modify the driver definition to point to the !ar file or the classes directory that contains these classes.

8u ck Ma % SYNOPSIS Abstract: ThereHs a new appliance on the hori6on that is going to change how we view networking and networked applications, and thatHs mail-enabled applications. /uick mail 7Mail-enabled application8 delivers a new type of network appliance and new level of functionality. Mail will evolve from messaging to a complete communications medium. Ma %*#!ab%#) A33% cat &!s will deliver the infrastructure for e-mail management applications, chatting, search engine, entertaining games, address book and a help. 9ere I am trying to implement an application through which it is easy to send or receiving messages between "lient;Server <rchitecture, chatting to more friends, search engine, to store contacts to the a))r#ss b&&k, games and there is an &!*% !# 0#%3 window. My /uick mail pro!ect has all S#cur t" $#asur#s by using login and password verifications. <lso, new user can creates its own account by register himself ; herself by filling the registration form containing all validations, assigning its own user and password and can change their username and password any time. So that unauthori6ed access is strictly prohibited and unable to open other one(s account if anyone trying to feed wrong username and password to get it There are lots of ways to communicate through the Internet, ranging from E*Ma % to live audio and video conferencing. This pro!ect focuses primarily on real-time communications. The Internet has opened the door to cost-effective live communications, potentially so revolutionary that nothing but the telephone can compare to the changes it may make. Iou can already communicate - audibly and visually with anyone who has a good modem, a decent computer, and a )eb cam. My /uick mail has a C0att !g 7also known as a 'channel'8 is a place where any number of people can come in, and have a live te%t-based chat. )e can enter chats

using chat software that supports I3"7Internet 3elay "hat8. This is a protocol that is the original means of chatting through the actual Internet. "hatting is very easy to do once youHve logged onto a server and !oined a channel. There are tens of thousands of active channels on I3" at any given time, so, you know there(s a wide variety of a topic to choose from. My /uick mail S#arc0 #!g !# supports several advanced operators, which are query words that have special meaning. Typically these operators modify the search in some way, or even do a totally different type of search. $or instance, 'link&' is a special operator, and the query doesnHt do a normal search but instead finds all web pages that have links to that page. To see a definition for a word or phrase, simply type the word 'define,' then a space, and then the word7s8 you want defined. If /uick mail has seen a definition for the word or phrase on the database server, it will retrieve that information and display it at the top of your search results

DATA RECOVERY MANA1EMENT Abstract: In today(s Internet driven world, every application is being ported to web so as to allow the users to connect with the system and access the respective data;information online .?;P. It has thus been a catalytic force that has reali6ed the removal of barriers of time and distance. Industries;personnel operating in general commercial arena including 2anking, Insurance, etc., 7being the main financial backbone of any economy8 have also followed suit to keep themselves up-to-date in the latest of trends and to reap the benefits offered by internet.

$or most of such Internet-driven applications, standard database systems from the default repository mechanism. "onsidering run-time load for these applications, additional support;tools that provide application reliability and graceful <T< 3+">C+3I M<4<D+M+4T, becomes mandatory. $or every application atabase we need to have ata 3ecovery

Management concepts. If the current data base has corrupted or affected by virus or damaged by any person, then we need to recovery the details by using the ata 3ecovery Management concept. This component allows the 3ecovering techniques for all kind of data and files. )e are keeping our information on the files or databases. If need to the current

database has corrupted or affected by virus or damaged by any person, then we recover by using the some concepts. This is the pinpoint to ponder about and we provided a service that can recover our data and files. The main aim of the pro!ect is to develop software that recovers all the data and files that we want.

REMOTE MET4OD INVOCATION Abstract: -ava(s 3MI 73emote Method Invocation8 feature enables a program running on a client compute to make method calls on an ob!ect located on a remote server machine. The 3MI feature gives !ava programmers the ability to distribute computing across a networked environment. >b!ect Q>riented design requires that every task be e%ecuted by the ob!ect most appropriate that task.

3MI defines a set of remote interfaces that can be used to create remote ob!ects client can invoke the methods of a remote ob!ect with the same synta% that it uses to invoke, methods on a local ob!ect. The 3MI <#I #rovides classes and methods that handle all of the underlying communication and parameter referencing requirements of accessing remote methods. 3MI also 9andles the seriali6ation of ob!ects that are passes as arguments to methods of remote ob!ects. The !ava.rmi and !ava.rmi.server packages contain the interfaces and classes that defines the functionality of the !ava 3MI system. These packages and interfaces provide the building blocks for creating serverQside ob!ect Skeltons and client Qside ob!ect stubs. #rimitive values can simply besent byte by byte. 9owever,passing ob!ects either as parameters or return values presents a #roblem. >b!ect persistence is a useful featutre, which is also remote method indispensable for remote invocation. The ServerQside ob!ect needs access to a parameter ob!ect(s entire graph of referenced ob!ects. The might construct and return other ob!ects. If this occurs the entire graph must be returned. a complicated ob!ect that owns references to

SIDBI Abstract: The system mainly deals with the automation of the activities performed at Small Industries evelopment 2ank of India 7SI 2I8, which issued various kinds of loans to their "ustomers and accepts monthly installments from them. <ll the master information is gathered pertaining to the employees working in the organi6ation, Industries to whom the loans are issued. ifferent types of loans available are designed and the interest rates applicable are set in the master tables. Initially after registering the customer, loan is sanctioned according to his requirement and eligibility. etails of a particular loan are gathered such as loan number, customer number, loan code, amount, interest, and number of months, monthly installment and date of sanction. )hen the Industries pay the loan installments, details of loan number, payment id, amount and date of payment are gathered and stored. Simply choosing the appropriate menus such as +mployee details report, "ustomer details report, generates various reports, 0oans detail report, Interest report, "ustomer-loan details report R #ayment details report. The system security is taken care of by a login form, which is allows only authori6ed users to utili6e the system. The main aim;ob!ective is to develop an effective system, which is fast, accurate, consistent, reliable, and fle%ible enough so that it can accommodate any further e%pansion.

S8L ,EBSERVER SYNOPSIS Abstract: S/0 worksheet O111 application is a -ava web application. This means it is meant to run on -ava-based web server 7like& Tomcat, 3esin, >rion, -3un, etc8. It was designed to allow anyone with hopefully any recent browser access ; maintain any S/0-compliant database that has a valid type ? - 2" driver. >ut of the bo%, it supports& >racle L.1S, S/0Server N.KS, Informi% 7not sure of version T8, and MyS/0 O.OS 7U I think8. Diven time, IHd like to add built-in support for other >pen Source atabases or "ommercial atabases that have free - 2" drivers. The S/0 )orksheet allows you to enter, edit, and e%ecute S/0 and #0;S/0 code. Iou can also e%ecute the Server Manager 2< commands. ItHs a )eb <pplication, no need to install anything on anyoneHs machine to use it. <ny -avascript 7or -Script E..8 compliant browser should work fine ... ,ni% 4etscape versions do not work with hot-keys unfortunately.

TEND SYNOPSIS Abstract: This @-$SecurityB is developed to provide security at file content level. It uses "ryptosystems, highly technical systems that provide privacy through secret encoding, have been an important part of the electronic information world for many years. These systems are the foundation for all electronic information e%change. $or e%ample, financial institutions and banks rely upon cryptography to securely transmit critical and private information over the Internet. +specially now, during the e-commerce e%plosion, secure and reliable e%change systems are vital for the world(s economy. These cryptosystems protect data by using hardware and software in a process that protects data by performing mathematical operations;algorithms on it. The result is data rendered unintelligible, which is called cipher te%t. This cipher te%t is then transmitted over insecure phone lines or networks such as the Internet. If someone intercepts this cipher te%t, it is indecipherable and meaningless to him or her. )hen the cipher te%t reaches its final destination, it can be decrypted into the original state of the data. The most widely used encryption algorithm is the 7 +S8. #roposed in EJPK, standard for all 'unclassified computer data'. ata +ncryption Standard +S was adopted by the ,S government as the +S is a symmetric key block

cipher. This means that data to be secured is encrypted with a 'private key' in sections, or blocks, of N?-bits. <nyone who needs the data must then use this key to decrypt it.

V rtua% O99 c# Ma!ag#$#!t S"!&3s s Abstract: The >ffice Management #rogram will prepare students for mid-management positions that will enable them to lead people in attaining the ob!ectives of the organi6ation. #lanning, organi6ing, and controlling the information processing activities of an organi6ation is a ma!or focus of this curriculum. The program will prepare graduates to take advantage of higher level office positions that are beyond the traditional role of secretary or clerk. Specific courses will be offered in business communications, business organi6ation, information processing, computer software applications, office information systems, supervision and administrative support systems, records and information management, and human relations. Training will be conducted on computers and related office equipment.$or students desiring on-the-!ob e%perience prior to graduation, an internship course may be available.Draduates of the program will be prepared to assume positions as office managers, administrative services coordinators or assistants, office supervisors, records and information supervisors, personnel administrators, administrative assistants, or administrative support secretaries.Students may transfer to a four-year institution to pursue a bachelor(s degree in business administration, business education, human resources, advertising, or public relations.

JAVA MAIL SERVER Abstract: esigning is done using 9TM0 .<ll the client side validation are done by ,sing -ava script R "lient side processing are done by using -S# V-ava Server #ageW.<ll server side processing are done by using Servlets R +-2s V+nterprise -ava 2eansW. atabase MySql is used to store user R mail the no. of databases. etails.9ere session plays a ma!or process and thus we can maintain a Session for every user and can reduce

You might also like