Material Management Project

In our Material Management System project we are having 4 modules:

1) PURCHASE REQUISITION ENTRY (PR-ENTRY)
2) MATERIAL PURCHASE REQUISITION
3) COMPARATIVE STATEMENT GENERATION
4) PURCHASE ORDER GENERATION

NOTE:- For Every Department That Tries To Access These Screens They Need To Initially Login With Their Division Code And Provided User Id, Password

User id:– can be of any format a name or a number or an alphanumeric character
Division:– Suppose in an organization there are 10 divisions, we give a fixed code for each division and this is fixed

For example– DIVISION CODE

  • Sales division 01
  • Production division 02
  • Management division 03

Password– it can be an alphanumeric character

PURCHASE REQUISITION ENTRY (PR-ENTRY)

This screen is used to make a purchase request or simply to make orders. As we mentioned this screen can only be accessed after authentication. The preview of the screen had been already mailed to you.
The screen should exactly look like that.

Here the users will also add vendors/suppliers list. The vendors might be already registered vendors or maybe new vendors. The form should be as below

Now as the vendors will be entered, in the next phase, that is material management phase, the list can be reviewed and some extra vendors can be added by the mm- authority. So the vendor’s list screen should be accessed by both the modules.

At the end of the screen, we need to have clear, save and exit buttons.

MATERIAL PURCHASE REQUISITION

This screen will have some additional fields along with the fields of PR-ENTRY fields. The main purpose of this screen is that this screen will be reviewed by the authority and the form gets approved. If any vendors can be added they will add to the form provided above.

Now as we got approved by the mm department this will be taken as a print and will be sent to the vendors who are listed. Each vendor will receive the form including all the details.

Now The Vendors Will Send The Quotations To The Organization Which Includes The Details Of Our Requirement And Their Response To Our Requirements.

After Receiving the Quotations We Need To Combine All the Quotations to Prepare A Comparative Statement

COMPARATIVE STATEMENT

The comparative statement is used to compare the responses sent by various vendors to have a quick glance to make sure which vendor had made the least quotation and with this, we can finalize the vendor or vendors to whom we can make a purchase order.

After comparing the vendor’s quotations we can make the draft purchase order for the signatures from the authority for approval.

We will generate the purchase order only for those who are selected by the user. Here the selection will be done by the user or who actually requested it.

// so we need to make a print of comparative statement if possible.

PURCHASE ORDER

As I mentioned earlier, the purchase order will be generated for signatures what we actually call as draft purchase order and after all the authorities have signed this draft purchase order we will be the purchase order.

Screens Will be:

Download Material Management System Java Project Code

Free Flow Resource Allocation and Tracking System

Free flow resource allocation and tracking is a web based application proposed to facilitate day-today work allocation in an organization. This Resource Allocation application is more relevant like a project planning tool is used to affect the project plan including a plurality of tasks to be performed by the users in accordance with respective time schedules. This application used to monitor the performance of the individuals and teams.

This application ensures the user that the work is assigned to the resources without any delay or faults. The network is configured for translating the project plan into the master database to affect an assignments table including a list of project tasks assigned for completion by each of the users.

This Resource Allocation and Tracking project is periodically prepared in the master database from the assignments table and include list of the project tasks assigned to a respective user and a time record for recording time entries therein. Actual time expended in performing the tasks is fed back to the project plan for managing completion of the tasks in accordance with the time schedules.

Assign the project into various teams. It maintains the daily reports of the individuals. Increased visibility into actual time spent on tasks and projects.

OBJECTIVE

  • Free Flow resource allocation and tracking is used for maintaining the performance of the individuals and teams
  • Used to maintain the details of project and the users involved in the project
  • Used to assign project to various teams and team members
  • Generates various reports
  • Project and its various tasks are assigned to teams and team members
  • Projects and its tasks are assigned by the team lead/project managers to the team members based on their experience

Asset Management System Project

Asset Management System is an web based application, which is indispensable for all organizations and with an intention of putting the details about all the machinery working in the different assembly lines of a big factory. The Asset management system is primarily implemented in a plant which has multiple assembly lines with heavy machinery working in that.

The machinery will have different characteristics. The attributes related to that machine should be found out and should be entered in the database. The assets can be classified into different type according to the attributes and functions of those machinery. There could be further classification of machines based on their locations also.

The equipment registration takes the details of all the machines in the assembly line. The system may follow a tree structure to classify the types of equipment. The system should be classified to know the correct type pf machinery installed. The levels of classification may vary accordingly as the machine specification varies. The total attribute of the system may be obtained by combining all the information available in the successive layers.

The location of each equipment in a facility can be entered in to the system in hierarchical way. Each equipment should be linked to its own recode. The user can browse through the hierarchical system to identify the particular asset and thereby can access the record related to that asset. The identified machine with a particular specification may be in different locations also. So finding the correct machine and its location is also vital. The data in such hierarchies are stored in linked tables.

The user can first select a system hierarchy and then identify a particular a location of the machine. There shall be no limit to the number of layers in the tree structure. Specific equipment is identified with either number given by the manufacturer in the specification plate given or it can be marked physically. To avoid conflicts an unique ID may be assigned to an asset.

All the technical details regarding the machine are to be entered in the database. Details of the machines have to be entered in the database after designed the tables with all the attributes of the machines.

In this Asset Management System Project having the following modules

1. Decision to Purchase
2. Purchasing and Commissioning
3. Managing the life of the Asset
4. Decommissioning

1. Decision to Purchase

The ability to examine the Asset management database so as to check for

  • Availability of spare assets,
  • Maintenance of an approved Suppliers list
  • Maintenance of an approved Products list

2. Purchasing and Commissioning

In this module the entire stock comes into a business by mode of purchase, purchase department plays a vital role where the needs of other department are to be notified by them. According to each department needs the material (Raw Material / Assets) are purchased by a concern person who is In-charge of the purchase department.

After getting the requirement from the departments ‘Supervisor / In-Charge’ i.e.: home or owner and location, he orders the product to the ‘Vendors’ who provide lesser Quote with Quality.

Then by receiving the ‘Quotation’ from vendor, if he is satisfied with the material and Quality he gives an ‘Order Form’ so that they deliver the material along with “Bill / Invoice and Delivery Challan”.

The products are safe-guarded under Warehouse Department where the each department maintains the details about “Stock In” and “Stock Out”.

Effigy Processing Java Project

Objective:

The purpose of Effigy Processing Java Project is to have a better understanding of the image and to use the image in the relevant applications.

Existing System:

The present image processing algorithms and systems are capable of analyzing the images. But these systems are unable to enhance and alter the images according to the application and domain requirements.

Proposed System:

The proposed Effigy Processing Java Project permits various enhancements on the image. The enhanced images can be stored for further reference and usage. The system allows to change the texture of the image and also allows to generate different views of the image. The dimensions of the image can also be adjusted as per the requirement. Image processing has applications in several fields such as remote sensing, radiology, graphic design, photo editing, character recognition, cytology, finger print matching and other sciences. Image processing systems must be capable of functions such as image acquisition, image storage, image processing using various techniques, image display, and image transfer.

Modules:

The Effigy Processing Java Project is proposed to have the following modules:

Processing Module:

This module allows us to capture the image and process the image by applying various processing techniques. Images can be processed by functions to blur the image, to sharpen the image, to increase or decrease brightness, to detect edges, to change gray scale, to emboss and to generate negative of the image.

Display Module:

This module allows us to increase or decrease the image dimensions along one or two dimensions. It also allows to generate mirror image of a picture or to flip the image. We can also zoom the image in or out.

Storage Module:

This module allows us to save the modified or enhanced images for further usage. This allows us to store the same image in different formats and effects.

Software Requirements:-

• Programming Language : Java
• Java Version : JDK
• Operating System : Windows XP/LINUX

Java Audio MP3 player Project

Objective:-

The objective of the project is to design an audio MP3 player that can be suitable for different level of users. The goals of the application are to: Provide a platform to play audio (MP3) files, Support play lists and Provide play list management.

Existing System:-

The present systems are platform dependent and these plug-in services are not suitable for all types of applications and devices. Often, these systems have difficulties in managing the files and play lists.

Proposed System:-

This mp3 player has inbuilt ID3 tag editor. The benefits of the system are: It is a fast standalone mp3 player; Facility to save play-list files; ID3 tag editor to edit mp3 metadata. The system can be easily integrated into other applications and devices. The system supports features which are platform independent.

Modules:-

The system is proposed to have the following modules or forms:

Main interface (Control panel), Playlist manager and ID3 Tag Editor

Main interface :-

Main interface implements all the basic commands for playback control like play, pause, stop, previous, next and volume control. It provides facilities to open previously saved play lists, show play list manager.

It provides the following functionalities:

Open Play List, Show Play list, play, pause, stop, previous, next,
Song info palette, volume control and exit

Playlist Manager:-

This interface has a menu and a dynamically expandable table in scroll pane. The menu bar in this interface has following commands:

File, New, Save, Save as, Exit, Edit, Add file(s), Add folder, Edit Tags,

Remove File

It has a table which shows list of files that are currently in play list.
Following metadata about mp3 files are shown in this table
Serial Number, Track number, Track Title, Album, Artist, Time

ID3 Tag Editor:-

Id3 tags are meant for metadata about the songs. It saves entered data in mp3 file itself, so that when those files are opened with other media players like winamp or windows media player, then these Id3 tags will be present there.

Software Requirements:-

• Programming Language : Java
• Java Technology : Swings
• Java Version : JDK
• Operating System : Windows XP/LINUX

Fashion Studios Java Project

ABSTRACT

It seems that over the past few decades a new art form has emerged. This is an art form that painters, writers and photographers dive into on a daily basis. A piece of art is considered to be abstract when the image is not clearly defined or visibly noticeable in a quick glance.

The word abstract means “not relating to concrete objects but expressing something that can only be appreciated intellectually.” This is a relatively new art form that takes mundane objects and transfers them to the unknown.

Abstract art is one of the fastest growing fields of photography. A photographer is able to take abstract pictures of people, landscapes, places, animals and much more. A photographer is given a broader range to experiment abstractly when using a digital camera but a regular camera can also be used. There are several hints to help you when taking an abstract picture.

First of all let us discuss what an abstract picture is. An abstract picture can be the wheel of a tractor, a photograph of a blurred chess piece, a screen window, a solitary fork sitting alone atop a table or the face of a person, unrecognizable and changed.

Abstract art allows the photographer to create new images that only they may see or to turn ordinary objects into a spectacular work of art. A graduate student several years ago, who majored in abstract photography, was told to take a picture of her car.

The student then took pictures of different parts of her car and then made a collage of the collection of pictures in the shape of her car. This is considered an abstract piece of artwork. When taking an abstract photograph of a person stop and think before you press the shutter button.

Look at the subject and pick out the physical features, traits or characteristics that you want the abstract photograph to be composed of. If the subject has been through a tragedy, photograph the eyes, to convey this weight of sadness. If a person is joyous or laughing photograph their mouth in order to bring that joy and free spirit to the photograph.

Abstract photography is great for artists who want to broaden and expand their creative range. It is also wonderful for photographers who have a unique eye and find beauty in things that are extraordinary. Next time you have you camera out fool around with a few of these abstract ideas. You might just fall in love with this relatively new art form.

Software requirements:

Operating System                   : Windows

Technology                             : Java

Web Technologies                   : Html, JavaScript

Web Server                             : Tomcat

Database                                 : Oracle

National Parks of India Java Project

 The main objective of “National Parks of India” Java Project is to provide information regarding various National Parks situated in India and animals residing in those parks. This National Parks of India project helps people who are interested in wild animals so that they can visit in right season and right time.

In the existing system people don’t know about those park’s timings and entry fee. And also people don’t know vehicle availability and their charges in the premises of those park’s. If people want to know the information like these things, we have to visit a particular park physically.

If we don’t reach the park at the particular timing, then we may miss the chance to visit park on the same day. We may lose our valuable time and money. So that before entering into the parks we have to know the park details clearly.

The proposed system provides information about park’s timings and charges for adults and children. Various costs of the foreign visitors and Indian visitors. Students may have discount on their id cards.

To enter into the park take permission and tickets from the authorities of parks. Special Safari vehicles only allowed into the parks. In some parks safari will be once in the morning and evening from sunrise to sunset twice a day.

This type of information we are providing by developing “National Parks of India” application.

Time Table Management System Java Project

Abstract:

Time table management system is a project which is developed to provide better support for lecturers and students in a college. This Time Table Management System provides a function to view timetable for the specific lecturer and the master timetable for that semester. Lecturer can inquire about classes availability and can book for the free classes. Students can view their functionality like adding and dropping subjects. Students can view and get the registration slip from the system. Timetable management system also contains a database, which stores the lecturers and students personal details.

Time Table Management System

Existing System:

The existing Time Table Management System contains a manual timetable system which is used by post graduates and under graduates. This manual system may lead to clashes of data in the timetable produced. The existing timetable always change and involved many lecturer to handle it. It’s taking too much of their time. The conclusion is they need a system to help and improve the process of preparing the timetable.

Proposed System:

The proposed Time Table Management System is a automatic timetable management system which generates time table automatically. This java project will help to manage all the periods automatically. This system will also help the faculty to view timetable from anywhere. This system also manages the timetable when any lecture is absent late coming or early going. By using this system lectures can apply online leave.

 

B.Tech & M.Tech 2016-2017 Java Projects

JAVA – 2016 – 2017 Final Year Projects for B.Tech/B.E & M.Tech/M.E

The below 2016-2017 projects developed with Java & MySQL/Oracle and these projects categorized under different domains below

  • Cloud computing
  • Data mining
  • Image Processing
  • Networking
  • Secure Computing
  • Mobile Computing
  • Software Engineering
  • Parallel & Distributed Systems
  • Information Forensics & Security
  • Multimedia (Social Networking)
  • Fuzzy Systems
S.No Domain Project Name
1 Cloud Computing A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2 Cloud Computing A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3 Cloud Computing An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
4 Cloud Computing An Efficient Privacy-Preserving Ranked Keyword Search Method
5 Cloud Computing CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
6 Cloud Computing Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
7 Cloud Computing CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
8 Cloud Computing Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9 Cloud Computing Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
10 Cloud Computing DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11 Cloud Computing Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
12 Cloud Computing Dynamic and Public Auditing with Fair Arbitration for Cloud Data
13 Cloud Computing Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
14 Cloud Computing Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
15 Cloud Computing Geometric Range Search on Encrypted Spatial Data
16 Cloud Computing Identity-Based Encryption with Cloud Revocation Authority and Its Applications
17 Cloud Computing Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
18 Cloud Computing Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
19 Cloud Computing Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
20 Cloud Computing Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
21 Cloud Computing Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
22 Cloud Computing TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
23 Cloud Computing A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
24 Cloud Computing DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
25 Cloud Computing Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
26 Cloud Computing SecRBAC: Secure data in the Clouds
27 Data Mining A Novel Recommendation Model Regularized with User Trust and Item Ratings
28 Data Mining Automatically Mining Facets for Queries from Their Search Results
29 Data Mining Booster in High Dimensional Data Classification
30 Data Mining Building an intrusion detection system using a filter-based feature selection algorithm
31 Data Mining Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
32 Data Mining Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
33 Data Mining Crowdsourcing for Top-K Query Processing over Uncertain Data
34 Data Mining Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
35 Data Mining Domain-Sensitive Recommendation with User-Item Subgroup Analysis
36 Data Mining Efficient Algorithms for Mining Top-K High Utility Itemsets
37 Data Mining Efficient Cache-Supported Path Planning on Roads
38 Data Mining Mining User-Aware Rare Sequential Topic Patterns in Document Streams
39 Data Mining Nearest Keyword Set Search in Multi-Dimensional Datasets
40 Data Mining Rating Prediction based on Social Sentiment from Textual Reviews
41 Data Mining Location Aware Keyword Query Suggestion Based on Document Proximity
42 Data Mining Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
43 Data Mining Quantifying Political Leaning from Tweets, Retweets, and Retweeters
44 Data Mining Relevance Feedback Algorithms Inspired By Quantum Detection
45 Data Mining Sentiment Embeddings with Applications to Sentiment Analysis
46 Data Mining Top-Down XML Keyword Query Processing
47 Data Mining TopicSketch: Real-time Bursty Topic Detection from Twitter
48 Data Mining Top-k Dominating Queries on Incomplete Data
49 Data Mining Understanding Short Texts through Semantic Enrichment and Hashing
50 Networking A Stable Approach for Routing Queries in Unstructured P2P Networks
51 Networking iPath: Path Inference in Wireless Sensor Networks
52 Networking Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
53 Networking Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
54 Networking STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
55 Mobile Computing Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
56 Mobile Computing EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
57 Mobile Computing Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
58 Mobile Computing Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
59 Parallel & Distributed Systems A Hop-by-Hop Routing Mechanism for Green Internet
60 Parallel & Distributed Systems Continuous Answering Holistic Queries over Sensor Networks
61 Parallel & Distributed Systems Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
62 Parallel & Distributed Systems The Server Provisioning Problem for Continuous Distributed Interactive Applications
63 Secure Computing Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
64 Secure Computing Data Lineage in Malicious Environments
65 Secure Computing Detecting Malicious Facebook Applications
66 Secure Computing FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
67 Secure Computing Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
68 Secure Computing Resolving Multi-party Privacy Conflicts in Social Media
69 Information Forensics & Security Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
70 Information Forensics & Security Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
71 Information Forensics & Security Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
72 Information Forensics & Security Profiling Online Social Behaviors for Compromised Account Detection
73 Image Processing A Locality Sensitive Low-Rank Model for Image Tag Completion
74 Image Processing A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
75 Image Processing Learning of Multimodal Representations with Random Walks on the Click Graph
76 Image Processing Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
77 Image Processing Tag Based Image Search by Social Re-ranking
78 Multimedia (Social Networking) Social Friend Recommendation Based on Multiple Network Correlation
79 Multimedia (Social Networking) User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
80 Software Engineering Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation
81 Software Engineering Metamorphic Testing for Software Quality Assessment: A Study of Search Engines
82 Software Engineering SITAR: GUI Test Script Repair
83 Fuzzy Systems Answering Approximate Queries over XML Data

City Life Java Project

Abstract:

City Life is the website which contains relevant information regarding Hyderabad city. This website provides details  about  hotels , restaurants, malls, tourist places, famous spots to visit. It will help the users who want to know the information about Hyderabad city and its visiting places. This website has simple user interface that is easily accessible by the  user.

City Life Java Project1

Existing System:

In the existing system  there are various separate sites in order to know the information  about the historical places, hotels, restaurants and places. The existing sites having various ads and pop-up’s which  makes user uncomfortable.

City Life Java Project

Proposed System:

In the proposed system user can find  different categories available in one site. User can know the information about different places  those want to visit and can plan his schedule based on his knowledge. Ads-Free website & straight forward. Designed to give the feedback by liking and commenting. This website provides short videos on tourist places.

Software Requirements:

Language                                :           Java

Web technologies                   :           JEE (Servlets/JSP)

Front-end Design                    :           Html, CSS, JSP, Bootstrap

Database                                 :           MYSQL

Scripting                                  :           JavaScript

Conclusion:

From the above discussion we conclude that the project city life has successfully satisfied the requirement of the users. This project helps the user to find the popular visiting places in particular city. Users can make the bookings from their location. This projects saves lot of time in searching the places in the city to the visitors.