Automated Network Administration Tool a Java Project with Code

Automated Network Administration Tool a Java Project (ANAT) is an innovative tool for managing the network automatically and executing the commands on the Gateway machines and restricting access to server machines on the network for different users in the network. Automated-Network-Administration-Tool-a-Java-Project

Now a days, there are many tools available for network monitoring and management. 

But ANAT provides a unique way of managing the network, that is, automatic network management based on the three main constraints like time, host, and user. This automatic administration relieves the administrator from his usual tedious task. 

It is an innovative tool for managing a network automatically in the absence of an administrator. In Automated Network Administration tool an algorithm is developed for the purpose of automatically managing the network based on the criteria like Time, Host and User. This algorithm will restrict the access of the user to applications or resources on a system according to the access control rules set by the administrator. 

As a part of network management packet filtering, packet blocking etc. are done. Firewalls are activated and deactivated and Packet redirecting is developed according to the requirement of the Network administrator. Now a day, the task of controlling the communication across the network is very tedious. 

Network Monitoring Tools: 

There are many network monitoring tools available today which monitor the network host but which cannot restrict the network access based on the three constraints i.e. time, host and user. In the existing system, a network administrator will have to write all such rules in the firewalls of the respective Bastions separately. 

There is no network management or controlling tool, which completely holds the necessities discussed above. The administrator has no tools currently available, which can be used to update the firewall written for a business firm. The proposed system is for a network which consists of different servers connected to a gateway machine and the clients connected to the bastion server through a hub or switch. 

Objectivity: 

The proposed system is expected to rectify all drawbacks of the existing system. The administrator should be able to control and monitor the whole network from a central Bastion. There will be provision for writing the firewall rules in a central Bastion. 

Conclusion: 

The network administrator can write new policies and rules for existing users and for new users, which is accomplished by a well designed user interface for administrator. Even though we have completed this software tool with all our efforts successfully, it is still having some limitations like the disability to restrict the client to client communications, controlling multiple network clients etc.

Hence the system is highly user friendly and is well efficient to make easy interactions with administrator of the network.

download Project Report  of  CSE Automated Network Administration Tool a Java Project .

Customizable and Divisible Card Payments for Online Purchases Java Project Report

Customizable and Divisible Card Payments for Online Purchases java project provides the design a new infrastructure that supports the divisible card payment where a combination of multiple cards can be used for a single purchase. Divisible-Card-Payments-for-Online-Purchases-java-project 

Strength of the virtual card payment infrastructure: 

The main strength of this virtual card payment infrastructure is that it requires only two minor modifications to the existing infrastructure.  

First, the V-Card Manager (VCM) is added to the merchant side to handle the divisible card approval process from respective credit-card issuers. 

Second, the customer is equipped with the V-card Agent (VA) that generates a customized divisible card based on her preferences. 

As a developer of the project, our responsibility was to develop the Virtual Agent and a bank simulation. 

The mission of the project is to provide the customers with a better way of managing their credit cards while minimally modifying the existing infrastructure.  As the customers are better off if they can use a combination of cards for a single purchase, the new infrastructure allows the customers to use a combination of different credit cards for a purchase, i.e. divisible card payment. 

Modifications that may involved: 

To support the divisible card payments, two modifications are made to the existing infrastructure.  The V-card number is generated using the first two card numbers with the current time stamp.  As each card number is unique to each individual, this simple method is sufficient to guarantee the unique V-card number. 

 Conclusion: 

When determining the optimal combination of cards to use, the VA may consider the customer’s preferences over various factors such as interest rates, annual fees, mileage bonus, cash-back bonus, ongoing promotions, etc. Since we don’t have access to the real bank servers during the implementation of the project, bank simulation server has to be implemented. 

For simplicity, a back-end database is created for each bank. For the card issuing banks, when the banks receive the transaction requests, their simulated servers will check in their databases to validate the transactions. After validations, each of the issuing banks will return either a denial message or an approval code back to VCM. For the merchant’s Acquiring Bank, it behaves similar to the card issuing banks, except for sending the request to the issuing banks and then collecting the funds from each of them and updating its own database. 

Hence, payments are done through online and purchases are made happily.

download Project Report  of  CSE Customizable and Divisible Card Payments for Online Purchases java project.

Download Efficient Algorithm for Mining Frequent Patterns Java Project

Mining Frequent Patterns Java project is the most efficient one. Its function is to mine the transactional data which describes the behavior of the transaction. In an online business or in an online shopping the customers can purchase items together. Efficient-Algorithm-for-Mining-Frequent-Patterns-Java-Project

Frequent patterns are patterns such as item sets, sub sequences or substructures that appear in a data set frequently. Many efficient algorithms were developed based on the data structure and the processing scheme. The mining of most efficient algorithms such as Apriori and FP Growth was implemented here. 

Project Details: 

In this paper, we propose the efficient algorithms (Apriori and FP Growth) used to mine the frequent patterns. Frequent patterns are patterns such as item sets, subsequences or substructures that appear in a data set frequently. From the transactional database, we can examine the behavior of the products purchased by the customers. 

For example, a set of items Mobile and SIM card that appear frequently as well as together in a transaction set is a frequent item set. Subsequences mean if a customer buys a Mobile he must also buy a SIM card and then head phone etc. 

From the history of the database, these transactions are happening sequentially is called sequential patterns. The Substructure refers to different structural forms such as sub graphs, sub trees which may be used along with item sets or sequences. 

Many of the algorithms were developed for mining the frequent items. In this paper, we propose the efficient algorithms (Apriori and FP Growth) used to mine the frequent patterns. The Apriori algorithm generates a candidate set during each pass. It reduces the data set by discarding the infrequent item sets that do not meet the minimum threshold from the candidate sets. 

To avoid the generation of candidate set which is expensive the FP Growth algorithm is used to mine the database. The FP Growth does not generate the candidate set instead it generates an optimized data set that is FP tree from the dataset.

 The FP tree is mined to construct a conditional database. FP mining processes use the divide and conquer strategy, so the data set shrinks and gives us quite small conditional frequent pattern base. From this database, the frequent patterns are generated. 

Conclusion: 

A traditional system based on the manual calculation and dynamic counting method. We propose the efficient algorithms used to mine the frequent patterns. We have proposed the implementation of efficient algorithms to find frequent patterns. 

The Apriori algorithm scans the dataset repeatedly whereas the FP growth avoids the costly candidate set procedure and generates the highly condensed database called as FP tree. Implementation of this project shows that the FP Growth method is efficient for mining frequent patterns and it is an order of magnitude faster than Apriori algorithm.

Download an Alumni Association Java Project Report

An alumni association is an association of graduates (alumni) Java Project or, more broadly, of former students. In the alumni of universities, colleges, schools, fraternities and sororities often form groups with alumni from the same organization. alumni-association-Java-Project-Report.

These associations often organize social events; publish newsletters or magazines raise funds for the organization. Many provide a variety of benefits and services that help alumni maintain connections to their educational institution and fellow graduates. 

Additionally, such groups often support new alumni and provide a forum to form new friendships and business relationships with people of similar background.

Alumni associations are mainly organized around universities or departments of universities, but may also be organized among students that studied in a certain country. 

In the past, they were often considered to be the universities or schools old boy network. This project is aimed at developing a repository for the alumni of the college, which is of importance to a college. 

The Repository and Search Engine (RASE) is an Internet based application that can be accessed throughout the World. Anyone can access the Search Engine to know about any Alumni of that college but can’t able to add. Alumni can only update the database when they are in the college. 

The project is envisaged to be completed in two phases. 

The initial phase will be the creation of a simple system that will be used to capture data from current final year students before the end of the term.

The second phase of development will extend the functionality of the system to allow past alumni to register.  It is very tough to find and locate the old students of a particular institution and gather them using the college records. 

Conclusion:  

Searching for the particular batch students is a time taking process. To overcome all the drawbacks of the existing system we go for automate alumni software in which all the data of the members are updated automatically by the student itself. This modification will be updated only with proper validation of the student. The searching for a particular student is done very easily using this software.

Download Air Ticket Reservation a Java Project Report

Description: 

SEA Airlines is a leading travel company offering leisure and business travelers the widest selection of low fares as well as deals on lodging and vacation packages. DOWNLOAD-AIR-TICKET-RESERVATION-A-JAVA-PROJECT-REPORT

The site was created to address the need for an unbiased, comprehensive display of fares and rates in a single location for consumers. SEA Airlines search results are presented in an easy-to-use Matrix that displays a vast array of travel options for you. 

SEA Airlines is the first and only travel site with a seasoned Customer Care Team that monitors nationwide travel conditions for our travelers around the clock, every day. SEA Airlines is a site, which helps the flight travelers. Its mission is to offer flexible leisure travelers a quick and easy way to get better deals on airline tickets. 

All purchases made on SEA Airlines are not final and can be cancelled, refunded or changed. 

If we want, you can also receive your updates by calling Arabian Travels toll-free number and using your personalized PIN. When customers prefer a specific travel itinerary, they offer the widest range of flight options and fares. SEA Airlines is a site, which helps the flight travelers. Its mission is to offer flexible leisure travelers a quick and easy way to get better deals on airline tickets. 

Through partnerships with leading travel companies, it can negotiate special prices that can’t be found anywhere else. About the site; it provides a link to the login page. The existing system is the manual entry of up keeping of the details of the persons who are registered already. And it is very difficult for each person to come to the office. 

Users can also inquire about the tickets through phones. It is very difficult for the user to remember all the details that they received through phones. And it is also very difficult to calculate how many people are registered in a month by hand. This requires quite a lot of time and wastage of money as it requires quite a lot of manpower to do that. 

Advantages: 

The proposed system has got many advantages. People from different parts of the world can register very easily. 

The new system is more personalized. It is made in such a manner that all the new users can understand all the options in it very easily. It is made in a quick and easy referential manner. This system helps the user to go through the rates quoted by different travel agencies and select the convenient rate that is suitable for him. 

Access to all important matters are not always locked and can be opened easily at the time of urgency. The advantages of the proposed system are that security is maintained in the new system. Securities for all important data are maintained confidentially. 

Conclusion: 

The project report entitled “AIR TICKET RESERVATION” has come to its final stage. The system has been developed with much care that it is free of errors and at the same time, it is efficient and less time-consuming. The important thing is that the system is robust. Also, provision is provided for future developments in the system. Hence, the entire system is secured.

Download Add Express Java Project Report

Add Express Java Project is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. The central concept of the “ADD EXPRESS” is to allow the customer to place the ads about their business on the website by contacting the ad agency people who are related to that classifieds site. Download-Add-Express-Java-Project-Report

The information pertaining to member registrations and categories are stored in a Database server at the server side (store). 

The Server will process different requests from their Ad Agencies, manage the ads by placing them in different categories and finally place them in the web site. 

Why Add Express? 

Ad Express is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. Ad Express offers a free world advertising and marketing news email service, ensuring the top global stories are delivered daily to your inbox. 

Free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. Add Express is a full featured classified ad manager web site. Add Express is designed to seamlessly integrate ads in this website. Here the proposed system is to replace an existing system, with a solution called Ad Express, using which we can post the ads in a classifieds portal.

Conclusion: 

Add Express Java Project has designed and developed for placing ads related to different things inside different categories.  A client can place the Ad through an agent. An agent can login into this and post the ads related his customer inside this site. It acts as an interface for the customers (who want to get info through ads) and clients (who want to place an ad). 

It can maintain different categories in which it stores the ads related to that category which helps the customers to find out required information easily. It helps to get posting the important links and yellow pages information also from this site which helps a lot for the customer.

It helps the administrator in tracking tasks related to our ad business also. Finally, it helps in automating the business activities of an Ad company and provides the access to some important information to the customer from online.

Activity Management System a Java Project Report

This is a project of “ACTIVITY MANAGEMENT SYSTEM JAVA PROJECT” for a PRUDENTIAL Bank. The client is the person who comes for the sake of getting premium from the agent of a prudential bank. Here agent is the one who gets the premium from the client. ACTIVITY-MANAGEMENT-SYSTEM-A-JAVA-PROJECT-REPORT

The duty of the agent is not only to get the premium from the client but agent sees how the client can be convinced to pay the premium. In this system we need to automate agent’s reports. 

This can be used for maintaining and evaluation of sales activities. It allows the life advisor to set goals and accomplish them.  It is very useful to motivate the advisor to do better, with reference of his previous progress. Internet working is the live-wire of today’s world, it has ushered in a whole new era of evolution, that has brought about a sea of change to this New World. 

With the advent of new concepts and technologies, the whole world has been linked into one single cobweb of information. Key to this evolution is the developments of Networking and Information Sharing. The main use of this project has been developed as per the general requirements of an Insurance Advisor. But it is going to be at most customized for the Prudential Insurance Adviser. 

Conclusion: 

This software can also be used or modified as per the exact requirements of any particular Insurance company’s Insurance Advisor. In this project JSP is used instead of applets because the agent has to send the information to the server and it processes and sends the information to the client.  And hence this is an online project.

A Signature-free Buffer Overflow Attack Blocker a Java .Net Project Report

Description: 

A Signature-free Buffer Overflow Attack Blocker a Java .Net Project propose SigFree, a real-time, signature-free, out-of the box, application layer blocker for preventing buffer overflow attacks, one of the most serious cyber security threats. SigFree can filter out code-injection buffer overflow attack messages targeting at various Internet services such as web service. Buffer-Overflow-Attack-Blocker-a-Java -Net-Project

Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks attacks by detecting the presence of code. SigFree first blindly dissembles and extracts instruction sequences from a request.

It then applies a novel technique called code abstraction, which uses data flow anomaly to prune useless instructions in an instruction sequence. Finally it compares the number of useful instructions to a threshold to determine if this instruction sequence contains code.

Sigfree Application 

SigFree is signature free, thus it can block new and unknown buffer overflow attacks; SigFree is also immunized from most attack-side code obfuscation methods. Since SigFree is transparent to the servers being protected, it is good for economical Internet wide deployment with very low deployment and maintenance cost. 

We implemented and tested SigFree; our experimental study showed that SigFree could block all types of code injection attack packets (above 250) tested in our experiments. Moreover, SigFree causes negligible throughput degradation to normal client requests. In existing system Detection of Data Flow Anomalies are in static or dynamic methods, to detect data flow anomalies in the software reliability and testing  field.

Conclusion: 

Static methods are not suitable in our case due to its slow speed; dynamic methods are not suitable either due to the need for real execution of a program with some inputs. In our proposed project this SigFree, a real-time, signature free, out of- the-box blocker that can filter code-injection buffer overflow attack messages, one of the most serious cyber security threats, to various Internet services. 

SigFree does not require any signatures, thus it can block new, unknown attacks. It is immunized from most attack-side code obfuscation methods, good for economical Internet wide deployment with little maintenance cost and negligible throughput degradation and can also handle encrypted SSL messages.

A Geometric Approach to Improving Active Packet Loss Measurement a Java Project

A Geometric Approach to Improving Active Packet Loss Measurement a Java Project is for computer science and information technology final year students who are interested in developing packet related final year project. Active-Packet-Loss-Measurement-a-Java-Project

Description:

In geometric approach measuring and analyzing network traffic dynamics between end hosts has provided the foundation for the development of many different network protocols and systems. Despite of efforts on network engineers and operators to limit loss, it will probably never be eliminated due to the intrinsic dynamics and scaling properties of traffic in packet switched network. 

Network operators have the ability to passively monitor nodes within their network for packet loss on routers using SNMP. In an Existing System, they analyze the usefulness of Poisson Arrivals; see time averages in the networking context. Several studies include the use of loss measurements to estimate network properties such as bottleneck buffer size and cross traffic intensity, which is not accurate. Network tomography based on using both multi cast and unicast probes has also been demonstrated to be in-effective for inferring loss rates on internal links on end-to-end paths. 

Objective:  

The purpose of this project is to understand how to measure end-to-end packet loss characteristics accurately with probes and in a way that enables us to specify the impact on the bottleneck queue. This project is to understand how to accurately measure loss characteristics on end-to-end paths with probes. In every application we have our own merits and demerits. 

What is being covered? 

The project has covered almost all the requirements. Further requirements and improvements can easily be done since the coding is mainly structured or modular in nature. Changing the existing modules or adding new modules can append improvements. Further enhancements can be made to the application, so that the web site functions very attractive and useful manner than the present one. Thus, our project implements a tool named BADABING. Specifically, our method entails probe experiments that follow a geometric distribution to enable more accurate measurements than standard Poisson probing and other traditional packet loss measurement tools.

Secured Authentication for Online Banking Using Mobile Phones Java Project

Description: 

Now-a-days security concerns are on the rise in all areas such as banks, governmental applications, health care industry, military organization, educational institutions, etc., Member institutions of Online Banking Association rated Security as the most important issue of online banking. New survey finds that 31% of bank customers avoid online transactions because of security reasons. Secured Authentication for Online Banking using Mobile Phones java project  guarantees authentication to online banking services in a secured manner.Online-Banking-using-Mobile-Phones-java-project

Why so very indispensable? 

Clients perform transactions on a secure website operated by their bank. Transactions in online banking differ from general internet shopping transactions. Attacks on online banking deceive the user to steal the login data. A weak password is easy to remember, but open to potential attacks. It is not secured in many cases and therefore risks are high. 

While digital certificates are used against phishing and pharming, attacks lead to an increasing number of phishing websites which duplicates victim’s passwords. The less the password security relies on human mediation, the more it is secure. Dynamic Key Token is used for performing the banking operation. Protection through single password authentication, as is the case in most secure Internet shopping sites, is not considered secure enough for personal online banking applications in some countries. 

Modern Technological Approach:  

A mobile-based software token system that is supposed to replace existing hardware and computer-based software tokens is proposed. The proposed system is secured. For each and every transaction, a dynamic password token is generated which avoids theft, phishing and hacking attacks. 

Authentication of Online Banking using Mobile phones has both advantages as well as disadvantages too. Its future developments include, a user friendly GUI. The proposed work to be implemented on various mobile phone platforms. Bluetooth and WLAN features on mobile phones can be used for cheaper token generation. Single factor authentication methods, such as passwords, are no longer considered secure in the internet and banking world. 

Conclusion: 

The increase in number of carried tokens and cost of manufacturing and maintaining them is difficult for both the client and organization. Mobile devices and certainly mobile phones are currently widely spread. Many clients carry a mobile phone now at all times.

The proposed system has two ways of implementing, either using a free and fast connection-less method or a slightly more expensive SMS based method. At last it has been concluded that both the methods have been successfully implemented and tested, and are shown to be robust and secure.

download Project Report  of CSE Secured Authentication for Online Banking using Mobile Phones java project .