Hush Up Text Android Project

Existing system

In android there are very few applications regarding the steganography but they are not providing any security to the user any user can encrypt the data at the same time he can decrypt.

Proposed system

In the proposed system we are providing security to the user by using different algorithms like LSB2Bit and Cipher key text

Modules:

Encrypting Text:
By using the cipher key algorithm we encrypt the users text based on the key provided by the user.

Encrypting Image:
By the using the LSB2Bit algorithm we encrypt the encrypted text in the image.

Decrypting Image:
By the using the LSB2Bit algorithm we decrypt the encrypted text from the image.

Decrypting Text:
Once we get the text from the module 3 we decrypt the text by using the cipher key algorithm and the user’s key.

Data Flow diagrams:

Class Diagram
Sender Use case Diagram
Receiver Use case Diagram
Receiver Sequence Diagram
Sender Sequence Diagram
Sender Collaboration Diagram
Receiver Collaboration Diagram
Activity Diagram

Hush Up Text Activity Diagram

Class Diagram

Hush Up Text Class Diagram

Receiver Collaboration Diagram

Receiver Sequence Diagram

Receiver Use case Diagram

Sender Collaboration Diagram

Sender Sequence Diagram

Sender Use case Diagram

Results:

  1. Login Page
  2. Registration page
  3. Password Settings
  4. Selection Page
  5. Text Encryption
  6. Image Encryption
  7. Image Decryption
  8. Text Decryption

Login Page

Hush Up Text Login Page

Registration page

Password Settings Page

Selection Page

Text Encryption Page

Image Encryption Page

Image Decryption Page

Text Decryption Page

Conclusion:

Steganography is the art of hiding data in the images/text/videos/music. In our Hush Up Text Android Project we provided the user to hide his secret data in the image by using LSB2Bit algorithm.We provide more security as we are encrypting the text first and then encrypting it to the image.

Future Work:

We would like to add the facilities like login for multiple users in further.

Software Requirements:

Jdk, Eclipse, SDK, ADT

Download  Hush Up Text Android Project Code, Project Report Documentation.

Online Form Requesting System Java Project

ONLINE FORM REQUESTING SYSTEM

Abstract:

Online form requesting system is a project which is used to request a form from our personal mobile instead of going to the administration offices and filling up all the details and waiting to receive for the forms .BY using this online form requesting system users  can apply  for the form from anywhere. This is controlled by admin. Admin will accept the requests and sends an sms to the user to receive the form needed.

Existing System:

Traditionally, online form request is not existed this form request existed manually in the collage. All the form requesting is done manually which takes lots of time. To apply any form students need to submit application by hand.

Proposed System:

In the proposed system we can implement an android app of requesting for forms(Example: custodian, bonafide and transfer certificate) . In this application a list of passed out students is maintained and students can also apply for transfer certificate online. As soon as they receive sms from the admin they can come and collect the form .

Online_Form_Request

Modules:

Admin:

Admin can get login. Admin can add or change the options in the application. Admin can check and approve or cancel users requirements. Admin will add new questions and new topics. Admin can view the application.

Student:

Student can get login by filling the registration form. Student can apply for any application online. Student can fill the application form, update profile and view status.

Software Requirements:

Operating System                   : Microsoft Windows 2007/XP

Languages                               : Java Programming Language.

Database System                    : MYSQL

Conclusion:

Our project online form requesting system has successful in receiving any type of certificates/forms from the college, we have to do lots of stuff like submitting letters , filling forms etc., but our project has introduced online submission process which saves lot of time.  Our application can help students/users to avoid all these things by implementing an application. Our application has successfully implemented in sending a request to receive any type of forms from the collage.

 

 

Online Project Management System in Educational Institutes

ABSTRACT
“Online Project management system in educational institutes” can act as a bridge between the students and faculty members. Students do number of projects in their academic year to which a lot of faculty support is required. By using web based application, students can know information about their faculty and their area of interest and based on that information students can get registered to the respective faculty members.

Here in this project students can communicate with their faculty at any time through chat communication barriers. Transparency about student project can be obtained by using project management system. All the projects which are performed can be viewed through project management system. Project coordinator acts as admin. Admin has authority over student distribution in project groups.

Online Project Management System

OVERVIEW
“Online project management system” is an education based website, which helps the students and faculty to get all the resources about the projects available online. Students can access this website anytime and from anywhere. It is reliable & time efficient approach compared to all links of the website provided by any search engine while searching for course materials.

EXISTING SYSTEM

In manual system, students can get information about the projects provided by other students manually or through online resources such as Free Engineering Study Materials and Youth4work. But in this system, students may not get the related and sufficient information according to our syllabus. The above resources do not provide discussion forums between student and professor to clarify their doubts. There is no proper guidance to the students.

PROPOSED SYSTEM

The main aim of this system is to provide sufficient resources regarding to our college students projects according to our syllabus from which students can easily download study materials of their relevant course. The first step is to register in order to access this website.

In this system, we are providing discussion forums between student and professor where students can easily clarify their doubts about their projects. Students can upload their report regarding their project where the faculty can have all the detailed information about the project. Modules of this website are Admin, professor, student, mentor, publisher, discussion forum, security and authentications, reports.

 ADVANTAGES

• This creates a user-friendly environment and encourages active learning.
• It provides simple study materials which a student can easily understand.
• This is a student-centered learning.
• Provides quick responses to students in clarifying their doubts.
• Being available to students on an extended basis electronically

Software requirements:-

Operating System : Windows XP/7/8 Programming Language : JAVA Technology : J2EE (Servlets& JSP) Front End : HTML, CSS and JavaScript Data Base : MYSQL 6.0. Web Server : Tomcat 7.0

E Tuitions Java Project

Abstract:

E-Tuitions  is a collaborative teaching tool to assist the students to learn in an interactive manner. The main aim of the E Tuitions Java Project is to complement the efforts of teachers to integrate technology and link the students to the Internet in educationally productive ways. This E Tuitions Java application  also provides students a stimulating, positive and enjoyable environment to study. E-tuitions provides a friendly interactive environment.

E Tuitions Java ProjectExisting System:

In the existing system students cant post their questions or find answers in less time. There is lot of communication gap between student and faculty. Student cant retrieve the information about missed classes. All the data or records are maintained manually which takes lot of time in searching. Information in the ppt’s or video classes can’t be updated or edited. Need special focus on maintaining the records. Misuse or loss of data may cause sometime.

Proposed System:

The proposed system maintains all student information in the database. Information can be entered online. Faculty can post answers online where student can see the answers within no time. Student can save video classes and learn anytime and anywhere. Time can be saved and don’t need any special maintenance. Information once stored can be updated, edited and deleted.

Modules:

Student Login Module:

This module enables students to get logged in or sign up if he/she is not registered . Student can edit their profile. Student can view the details, list, ppt’s  and interactive video lessons categorized by subjects which are posted by faculty. Student can ask questions and find answers for their questions.

Faculty Login Module:

Faculty module  enables a person to login as a faculty member or sign up if he/she has not registered. Faculty can edit their profile. Post  or remove details of the study materials and video lectures.

Administrator Login Module:

Administrator is the ultimate controller of the application with the highest authority. Student/Faculty registration details can be viewed by the admin. Admin will Add or delete the requests send by students/faculty.

Software Requirements:

Language                                :           Java

Web technologies                   :           JEE (Servlets/JSP)

Front-end Design                    :           Html, CSS, JSP, Bootstrap

Database                                 :           MYSQL

Conclusion:

From the above discussion we conclude that Implementation of E Tuitions Java Project has been satisfactorily performed the tack of educating students online. Using this application students can experience online learning effectively. The flexibility and global nature of e-tuition has led an increasing number of e-tuition enrollment. With the progressive form of technology e-tuition has grown tremendously. E-tuition application has some disadvantages as we discussed above. Inspite of certain  defects, e-tuitions is very useful application to students.

B.Tech & M.Tech 2016-2017 Java Projects

JAVA – 2016 – 2017 Final Year Projects for B.Tech/B.E & M.Tech/M.E

The below 2016-2017 projects developed with Java & MySQL/Oracle and these projects categorized under different domains below

  • Cloud computing
  • Data mining
  • Image Processing
  • Networking
  • Secure Computing
  • Mobile Computing
  • Software Engineering
  • Parallel & Distributed Systems
  • Information Forensics & Security
  • Multimedia (Social Networking)
  • Fuzzy Systems
S.No Domain Project Name
1 Cloud Computing A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2 Cloud Computing A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3 Cloud Computing An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
4 Cloud Computing An Efficient Privacy-Preserving Ranked Keyword Search Method
5 Cloud Computing CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
6 Cloud Computing Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
7 Cloud Computing CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
8 Cloud Computing Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9 Cloud Computing Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
10 Cloud Computing DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11 Cloud Computing Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
12 Cloud Computing Dynamic and Public Auditing with Fair Arbitration for Cloud Data
13 Cloud Computing Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
14 Cloud Computing Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
15 Cloud Computing Geometric Range Search on Encrypted Spatial Data
16 Cloud Computing Identity-Based Encryption with Cloud Revocation Authority and Its Applications
17 Cloud Computing Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
18 Cloud Computing Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
19 Cloud Computing Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
20 Cloud Computing Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
21 Cloud Computing Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
22 Cloud Computing TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
23 Cloud Computing A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
24 Cloud Computing DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
25 Cloud Computing Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
26 Cloud Computing SecRBAC: Secure data in the Clouds
27 Data Mining A Novel Recommendation Model Regularized with User Trust and Item Ratings
28 Data Mining Automatically Mining Facets for Queries from Their Search Results
29 Data Mining Booster in High Dimensional Data Classification
30 Data Mining Building an intrusion detection system using a filter-based feature selection algorithm
31 Data Mining Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
32 Data Mining Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
33 Data Mining Crowdsourcing for Top-K Query Processing over Uncertain Data
34 Data Mining Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
35 Data Mining Domain-Sensitive Recommendation with User-Item Subgroup Analysis
36 Data Mining Efficient Algorithms for Mining Top-K High Utility Itemsets
37 Data Mining Efficient Cache-Supported Path Planning on Roads
38 Data Mining Mining User-Aware Rare Sequential Topic Patterns in Document Streams
39 Data Mining Nearest Keyword Set Search in Multi-Dimensional Datasets
40 Data Mining Rating Prediction based on Social Sentiment from Textual Reviews
41 Data Mining Location Aware Keyword Query Suggestion Based on Document Proximity
42 Data Mining Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
43 Data Mining Quantifying Political Leaning from Tweets, Retweets, and Retweeters
44 Data Mining Relevance Feedback Algorithms Inspired By Quantum Detection
45 Data Mining Sentiment Embeddings with Applications to Sentiment Analysis
46 Data Mining Top-Down XML Keyword Query Processing
47 Data Mining TopicSketch: Real-time Bursty Topic Detection from Twitter
48 Data Mining Top-k Dominating Queries on Incomplete Data
49 Data Mining Understanding Short Texts through Semantic Enrichment and Hashing
50 Networking A Stable Approach for Routing Queries in Unstructured P2P Networks
51 Networking iPath: Path Inference in Wireless Sensor Networks
52 Networking Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
53 Networking Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
54 Networking STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
55 Mobile Computing Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
56 Mobile Computing EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
57 Mobile Computing Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
58 Mobile Computing Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
59 Parallel & Distributed Systems A Hop-by-Hop Routing Mechanism for Green Internet
60 Parallel & Distributed Systems Continuous Answering Holistic Queries over Sensor Networks
61 Parallel & Distributed Systems Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
62 Parallel & Distributed Systems The Server Provisioning Problem for Continuous Distributed Interactive Applications
63 Secure Computing Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
64 Secure Computing Data Lineage in Malicious Environments
65 Secure Computing Detecting Malicious Facebook Applications
66 Secure Computing FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
67 Secure Computing Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
68 Secure Computing Resolving Multi-party Privacy Conflicts in Social Media
69 Information Forensics & Security Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
70 Information Forensics & Security Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
71 Information Forensics & Security Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
72 Information Forensics & Security Profiling Online Social Behaviors for Compromised Account Detection
73 Image Processing A Locality Sensitive Low-Rank Model for Image Tag Completion
74 Image Processing A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
75 Image Processing Learning of Multimodal Representations with Random Walks on the Click Graph
76 Image Processing Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
77 Image Processing Tag Based Image Search by Social Re-ranking
78 Multimedia (Social Networking) Social Friend Recommendation Based on Multiple Network Correlation
79 Multimedia (Social Networking) User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
80 Software Engineering Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation
81 Software Engineering Metamorphic Testing for Software Quality Assessment: A Study of Search Engines
82 Software Engineering SITAR: GUI Test Script Repair
83 Fuzzy Systems Answering Approximate Queries over XML Data

Send your queries to info.1000projects@gmail.com