E-Admissions Project in Java using Servlets and Oracle

ABSTRACT

In present day scenario, a student goes to a counseling center to get admission in an institution. This is time consuming. Moreover the colleges are not able to select the students of their choice. The main aim of this project is to convert the existing paper filling admission process into electronic filling for all new under graduate student admissions.

We create a web application for prospective students to apply for admission into the list of available colleges and courses of desired university and track the status of their application. We create an administrative web interface for the college admissions officers to review, track, and process new student applications.

class diagram of E-ADMISSIONS Project

The visitors to the E-ADMISSIONS can be both students and colleges. The student can search and fill the admission forms of selected colleges. College administration selects the students based on their academic performance and confirms their admissions. Student can also pay the fees through online after receiving the confirmation.

The fees payment can be done in two ways using credit card or DD number through online. There is also an access control system, which prevents unauthorized public to access all the information, whereas subscribed users can have full access to all available information.

MOTIVATION

The colleges for which this application has been developed were facing huge problems in the management of the admission process. Every year, students in thousands queue up for collecting admission forms and then again for submitting them. This leads to problems in managing the applications, resulting in annoyed parents and students (alike). Also, the admission process is not transparent, leading to scope for widespread malpractices.

In order to rectify these shortcomings, the online admissions system is developed. Here students need not collect physical forms, they are required to fill the admission form and submit it online. This saves a lot of time and effort on the part of the college as well as for the students. Since students interact with colleges, only the deserving candidates can get admission into the college.

PROBLEM DEFINITION:

Generally in order to get admission into an institution, the student should definitely go to the Counseling Center. In this process, colleges will not be able to pick the students of their choice. There is no proper scope of interaction between Colleges and Students. This process is quiet time consuming and hectic mainly for the students who come from long distances.

  • Present system involves more human power. As the students who apply for the colleges are not small in number, much coordination is required in order to organize the counseling process.
  • The students coming from long distances cannot afford to stay for long time near the counseling centers.

HARDWARE SPECIFICATIONS

  • Intel P-IV Processor
  •  512 MB RAM
  • 10 GB Hard Disk 

SOFTWARE SPECIFICATIONS

  • Operating System       :   Windows NT/ XP, Windows 98
  •  Languages                  :   JAVA using Servlets,

JSP with JDBC Drivers, JavaScript, HTML

  • Database                     :   Oracle
  • Web server                  :   Tomcat 5.5

Source Code of INBOX file:

[php]
<%@ page import="java.sql.*,java.util.*,Db.*"%>
<%

Connection con=DBConnect.getConnection();

String sname=(String)session.getAttribute("uname");
PreparedStatement pstmt=con.prepareStatement("select cname,status,sdate,code,branch,appid from sinbox where sname=?");
PreparedStatement pstmt1=con.prepareStatement("select appid from sinbox where sname=?");

pstmt.setString(1,sname);
pstmt1.setString(1,sname);
ResultSet rs=pstmt.executeQuery();
ResultSet rs1=pstmt1.executeQuery();
%>
<html>
<title>student inbox</title>
<center>
<font size="5" >
<b><p style="color=’#7c7cba’;font-family:’Perpetua’"><marquee behavior=’alternate’>ONLINE ADMISSIONS SYSTEM</marquee> </p></b></font>
<table width=’100%’>
<tr><td width=’100%’ bgcolor="#a2a2ce"><font size=’5px’><center>
Welcome
<%
out.println(sname);
%></center></font></td></tr><tr align=’left’><a href=’studentlogin.html’>LOGOUT</A></tr></table>

<br><br>
<center>

<table border=1 cellspacing=’0′ cellpadding=’4′ bgcolor=’lightyellow’ style="font-family:’Perpetua’;font-size:’19’">
<tr>
<th align=’center’>CNAME</th>
<th align=’center’>APPLICATION-ID</th>
<th align=’center’>BRANCH</th>
<th align=’center’>SUBJECT</th>
<th align=’center’>DATE</th>
</tr>
<%
while(rs.next()){
%>
<tr><td align=’center’><%=rs.getString(1)%></td>
<td align=’center’><%=rs.getString(6)%><input type=’hidden’ name=’appid’ value='<%=rs.getString(6)%>’ readonly ></td>
<td align=’center’><%=rs.getString(5)%></td>
<td align=’center’><%=rs.getString(2)%></td>
<td align=’center’><%=rs.getString(3)%></td>
</tr>
<%
}
%>
</tbody>
</table>

<form action="link.jsp" method="post">

<b>Application id &nbsp; :&nbsp;&nbsp;&nbsp;</b><select name="appid">

<%
while(rs1.next()){
%>
<option><%= rs1.getString(1)%></option>
<%
}
%>
</select><br>
<br>
<input type="submit" value="select" style="font-size:’16’;font-family:’Times new roman’">
</form>
</center>
</body>
</html>

[/php]

Coach Management System Project in Java

Though, all the user requirement have been meet , the road does not end here. Future development can be undertaken to enhance the functionality and to increase the efficiency of the “Traction Loco Control ”

Poh shop detailas

The fact that this system is going to evolve everyday in the upcoming month. The team can’t just sit back new technologies package has to be incorporated in the system to make it fully secure and full proof. Also additional care has to be take to maintain the database which is going to increase and migrate it to other platform which can handle excessive load.

Coding:

[php]

import javax.swing.*;

import java.awt.*;

import java.awt.event.*;

import java.sql.*;

class help implements ActionListener

{

private JDialog dialog = new JDialog((Frame)null, "Help", true);

JLabel l1=new JLabel("COACH MAINTANANCE SYSTEM");

JLabel l2=new JLabel("Please Contact :- Sujeet Kumar Singh");

JLabel l3=new JLabel("Address             :-  C/O-R.C.Matho,Veer Sivajee path");

JLabel l4=new JLabel("North S.k.puri,dist-Patna");

JLabel l5=new JLabel("Bihar,   pin-800013");

JLabel l6=new JLabel("Contact no        :- 9308105802");

JLabel l7=new JLabel("Special Thanks For Mr. Rajesh Kumar");

JLabel l8=new JLabel("And Logic Solution");

JLabel image=new JLabel(new ImageIcon("logo2.gif"));

JButton b1=new JButton("Ok");

JPanel p=new JPanel();

help()

{

Container Pane=dialog.getContentPane();

dialog.setBounds(200,200,500,400);

p.setLayout(null);

l1.setBounds(50,30,475,30);

l1.setFont(new Font("",Font.BOLD,22));

l2.setBounds(100,75,300,30);

l2.setFont(new Font("",Font.BOLD,16));

l3.setBounds(100,100,400,30);

l3.setFont(new Font("",Font.BOLD,16));

l4.setBounds(230,125,300,30);

l4.setFont(new Font("",Font.BOLD,16));

l5.setBounds(230,150,300,30);

l5.setFont(new Font("",Font.BOLD,16));

l6.setBounds(100,180,300,30);

l6.setFont(new Font("",Font.BOLD,16));

l7.setBounds(95,275,400,25);

l7.setFont(new Font("",Font.BOLD,16));

l8.setBounds(175,300,400,25);

l8.setFont(new Font("",Font.BOLD,16));

image.setBounds(200,225,100,50);

b1.setBounds(210,325,80,30);

p.add(l1);p.add(l2);p.add(l3);p.add(l4);p.add(l5);

p.add(l6);p.add(l7);p.add(image);p.add(l8);p.add(b1);

b1.addActionListener(this);

Pane.add(p,"Center");

dialog.setVisible(true);

}

public void actionPerformed(ActionEvent e)

{

if(e.getSource()==b1)dialog.setVisible(false);

}

public static void main(String sr[])

{

new help();

}

}

[/php]

Future Application

This Project can be easily updated according to the needs of Mechanical Department of any railway zone.  This is made in such a way that it can be easily modified in a more advanced form if there will be such need.  The database of this software maintains the records of the details of Coaches who have been attached to the rake and the details of maintenance schedule of the coach.  These records will have a lot of use in future related to any enquiry.

This database can seamlessly be used by other candidate systems to be developed in future. It can be further developed as a net-centric database. The transactions are also revealed in this project.  Any financial enquiry can be satisfied easily through this software.  Hence, this project covers all-important details regarding the “Number Allocation System for Coach” of the Railway Zone. Therefore in future it will help to provide some important information’s, which may help in development of the company.

The main scopes and future enhancements are as follows

  • Proposed system can be delivered on a 3-tier architecture so as to improve scalability and performance
  • Browser Enabled User Interface for distributed Application
  • Arrangement for automatic back up and replication of database.
  • Enhanced security features like e-signature and public key encryption technology features for secure transfer of confidential data
  • On-Line help feature for “Expert Advice and Error Shooting”.

INTRODUCTION OF THE PROJECT 

Indian Railway is lifeline of India.. Ever Since the evolution of human being on this earth it has been a matter of immense curiosity for them to invent new things in life to make life easier and hassle free. Owing to its nature humans have always kept inventing and discovering for better livelihood. Going back to our past we see some Great inventions of mankind and one such is that of Railway.

The noval plan for the introduction of Indian rail system, Transformed whole history of INDIAN RAILWAY. The innoavative plan was first propsed in 1832, however auxiliary actions were taken for over a decade. In the year 1844, private enterpreneurs were allowed to launch a rail system by lord Hardinge, who was the Governer-Genral of India. By the year 1845, two companies were formed and east India Company was requested to support them in the matter.

  INDIAN RAILWAY have been divide into nine (9) zones- Western, Central, Northan, North Eastern, Northeast, Frontier, Southern, South Central, South-central & South-eastern covering the largest route length of cover 63000 kms of total Indian boundary. The last stations of the four directional boundaries are West-Mumbai South-Kanyakumari, East-Guwahati, and North-Jammu.

There are five types of trains which are running in the Indian Railways that are given below:

  1. Passenger train

                     2. Mail/Express

                     3. Shatabadi train

                     4. Jan-Shatabdi

                     5. Rajdhani

The Shatabdi train is the fastest among all these trains and covering only some of the destination. In the Indian Railway Coach Maintenance Department is the most important. There are many work handles in POH SHOP, these are given below:

  • Carraige Poh Shop
  • Wagon Poh Shop
  • Diesel Poh Shop
  • Production Poh Shop
  • Electric Rolling Poh Shop
  • Electric Shop

There are many production-units from where the coaches are newly manufactured that are:

  • Chittaranjan Locomotive Works
  • Diesel Locomotive Works, Varanasi
  • Integral Coach  Factory, Perambur
  • Rail Coach Factory, Kapurthala
  • Wheel & Axle Plant, Bangalore
  • Diesel Component Works, Patiala
  • The research Design and Standard Organization, Lucknow, provides vital inputs in R&D towards modernization.
  • 6 prestigious public sector undertaking : IRCON, RITES, CRIS, CONCOR, IRFC and Konkan Railway corporation. 

When, the coach is prepared in the POH SHOP. The train go to the yard. A Railway yard is an area having a network of railway tracks and siding for Storage and maintenance of cars and engineers. In the marshalling yard of Indian railway in which trains are assembled and good are loaded. In the marshalling yard railway wagons are Shunted and made up into trains.

In the yard, the  coaches are maintained in 3-schedules namely:-

1.A-Schedule

2.B-Schedule and

3.C-Schedule

  1. A-Schedule:- A Schedule is primary schedule. This schedule is done every month for any coach.
  2. B-Schedule:- This schedule is done in any coach after 3-month in the yard.
  3. C-Schedule:- This schedule is done in any coach after 6-month in the yard.

IOH means intermediate over holding. In this shop the coaches are maintained any time when necessary.

Apart from these register the organization has to publish reports about the coaches to supervisior.

Seceondary Detachment

Some times during running of the train some faults occur in a coach or number of coaches or entire rake. Then coaches are detached from that rake and sent for maintenance. This is called secondary detachment of coach.

My Job is to convert these entire manual jobs to a computerized system. My project work is the outcome as solution to the aforementioned manual jobs. This project is being done under DRM Office, Danapur (ECR).

Enterprise Collaboration Tool Project in Java & Oracle

Code Explanation 

To develop the proposed Enterprise Collaboration Tool system, We have created a java based web application and used Oracle as my database to the application. All the required front end pages are created using jsp files, where the user interface is created. Following are few important jsp files used in this application and the detailed description and coding procedure followed is as discussed below

Login screen shot of the application is as shown below:

Login id and Password fields
Login id and Password fields

Login id and Password fields are created on the html file and the tags like td and tr used to align the text fields in a table. Role based login is provided to the end user, where a user and administrator can login to the system. Different set of activities are designated to the user and admin and they are activated based on the login mode selected by the end user. When the user login to the system, they are provided with some links like Meeting, Scheduling and Calendar. These links are the basic activities that any user can perform related to their enterprise collaboration. If Admin is the user and after the successful login to the system, a welcome page is shown to the user as shown in the below screen.

after the successful login to the system

Administrator is provided with the options like Create user, Update user and deletes an existing user. Admin user can create a new user by clicking on the link Create User and the basic coding logic used is as explained below

A jsp file adduser is created to add a particular user to the database. This jsp holds the logic to enter the required field attributes related to the user details and below code is used to add the user

[php]
}

if(document.form1.fname.value==""){

alert("ENTER FIRST NAME OF THE USER");

document.form1.fname.focus();

return false;

}

if(document.form1.lname.value==""){

alert("ENTER LAST NAME OF THE USER");

document.form1.lname.focus();

return false;

}

if(document.form1.address.value==""){

alert("ENTER ADDRESS OF THE USER");

document.form1.address.focus();

return false;

}

if(document.form1.mailid.value==""){

alert("ENTER MAILID OF THE USER");

document.form1.mailid.focus();

return false;

[/php]

Once the field values are entered to the jsp file, these values are finally added to the database. A database object is created to the Oracle database using Class.forName object and Driver manager is used to establish the connection to the database using thin driver. Below code is used to establish the connection to the database

[php]</pre>
ResultSet rset=null;

DBConnection dbcon=new dbgeneralimpl();

c=dbcon.getConnection();

con=dbcon.getConnection();

st=c.createStatement();
<pre>[/php]

Similar type of coding is implemented to update and delete users. Below screen shot shows the procedure to add a new user.

the procedure to add a new user

Once the users are registered with the database, now the user can login to the system and perform the activities like Sending a message, view the messages and request for a new key as shown in the below screen shot

view the messages and request for a new key

Once the user login is successful, they are navigated to the user home page with a welcome message and then the user can perform the activities mentioned above and the corresponding screen shot is as below

user home page with a welcome message

At the first login of the user, they should raise a request for new private key by clicking on the link at the left frame “Generate a New Private Key”. Once the action is performed, navigation is shifted to new key generation request page and the corresponding code is as discussed below

[php]</pre>
Connection c=null;

Statement st=null;

ResultSet rs=null;

DBConnection dbcon=new dbgeneralimpl();

c=dbcon.getConnection();

st=c.createStatement();

String query="select userid from keygenerate_twm";

rs=st.executeQuery(query);

while(rs.next())

{

uuser1=rs.getString(1);

System.out.println("userid is : " +uuser1);

}

if(uuser.equals(uuser1))

{

%>

<tr><td> U R Already Have a Private Key </td></tr>

<% }

else

{

Random generator = new Random();

int ra = generator.nextInt(50000);

System.out.println("Random Value is : " +ra);

String query1="insert into keygenerate_twm(userid,keyvale,status) values(‘"+uuser+"’,’"+ra+"’,’pending’)";

System.out.println("Query 1 is : " +query1);

int in=st.executeUpdate(query1);

if(in==1)

{ %>

<tr><td> Your Request is Send to Admin </td></tr>

<%}

else

{%>

<tr><td> process is Pending </td></tr>
<pre>[/php]

User session is tracked by the session variable and the corresponding user id is fetched from the user login and based on the id, a query is build to the database table from keygenerate_twm. The coding logic first checks if the user has already a private key and if this is the case, an error message is displayed to the user and if this is the first time a user is requesting the private key, the logic is shifted toward new key generation. Random class is used to generate a random number and the same is updated to the table as the private key of the user and the corresponding status of the key request is updated by the administrator. Below screen shot shows the procedure discussed

status of the key request is updated by the administrator

Once a request is placed for a new Private key, now the users can track the status of the request by clicking on the link Private Key Status and the corresponding code used is explained as below

[php]
String query="select userid,keyvale,status from keygenerate_twm where userid=’"+uuser+"’";

System.out.println("Query is : " +query);

rs=st.executeQuery(query);

while(rs.next())

{

uuser1=rs.getString(1);

System.out.println("userid is : " +uuser1);

key=rs.getString(2);

System.out.println("Key is : " +key);

sta=rs.getString(3);

System.out.println("Status is : " +sta);

}

if(sta.equals(‘pending’))

{

%>

<tr><td> Your Request is Pending </td></tr>

<% }

else if(sta.equals(‘Accept’))

{

%>

<tr><td> Your Request is Accepted </td></tr>
<pre>[/php]

Based on the user id that was fetched from the session attributes, a query is built to the database to know the current status of the private key request. A result set is built from the query statement created and based on the result set; the status is compared with pending and accepts. If and else loops are used to compare the status and the corresponding status is updated to the user as shown in the below screen capture

loops are used to compare the status

Now the administrators can login to the their respective role and can approve the request from the users regarding the private key and coding followed is as explained below

[php]
ResultSet rs=null;

DBConnection dbcon=new dbgeneralimpl();

c=dbcon.getConnection();

st=c.createStatement();

String user=(String)session.getAttribute("user");

rs=st.executeQuery("select * from keygenerate_twm");

while(rs.next()){

String uid=rs.getString(1);

session.setAttribute("usid",uid);

%>

<tr align="center">

<td><font size="3" color="#DF4800"><%=uid%></font></td>

<td><a href="AcceptKey.jsp?id=<%=uid%>"><font size="3" color="#DF4800">Accept</font></a></td>

<td><a href="DeleteKey.jsp?id=<%=uid%>"><font size="3" color="#DF4800">Reject</font></a></td>

</tr>
<pre>[/php]

Below screen shot explains the procedure followed by the administrator

procedure followed by the administrator

Once the requested for private key is accepted by the user, now the users can login back and check the status as shown in the below screen

private key is accepted by the user

Now the users can do rest of the activities like sending or receiving the data from different users and below screen shot shows the procedure to be followed

sending or receiving the data from different users

Once the user click on the Send message, they can select the desire users to whom they want to send the message and the corresponding screen and related code is as explained below

[php]</pre>
Connection c=null;

Statement st=null;

ResultSet rs=null;

DBConnection dbcon=new dbgeneralimpl();

c=dbcon.getConnection();

st=c.createStatement();

rs=st.executeQuery("select * from login_twm");

%>

<select name="receiver">

<%while(rs.next()){%>

<option value="<%=rs.getString(1)%>"><%=rs.getString(1)%></option >

<%}%>

</select>

</td> </tr><tr><td>
<pre>[/php]

A list with the entire existing user is populated at the user interface and this is derived by constructing a query to the database table login_twm and the list values are populated using the option tag. Result set is used to fetch all the results from the users table and the particular user name is fetched using the statement rs.getString(1), where the first column of the row fetched is listed at the user interface and the corresponding screen shot is as shown below

first column of the row fetched is listed at the user interface

Now the user can view the messages in their inbox by clicking on the link view message at the user interface and the corresponding code and screen shot are as shown below

[php]</pre>
onnection c=null;

Statement st=null;

ResultSet rs=null;

DBConnection dbcon=new dbgeneralimpl();

c=dbcon.getConnection();

st=c.createStatement();

String sendid=null;

String user=(String)session.getAttribute("user");

rs=st.executeQuery("select * from messages_twm where receiverid=’"+user+"’");

while(rs.next()){

sendid=rs.getString(1);

System.out.println("SenderId is : " +sendid);

session.setAttribute("sid",sendid);

%>
<pre>[/php]

A session attribute is used to know the sender details and the corresponding receiver id is fetched from this session attribute. A query statement is built on the messages_twm, using the where condition and all the messages related to the current user are fetched from the database and displayed as shown in the below screen

inbox

Now the user can either view or delete the message and if the user clicks on the Open link, they can view the message after entering the valid private key of the user and the related code used to develop this logic is as explained below

[php]</pre>
Connection c=null;

Statement st=null;

ResultSet rs=null;

String key=null;

DBConnection dbcon=new dbgeneralimpl();

c=dbcon.getConnection();

st=c.createStatement();

String senderid=(String)session.getAttribute("sid");

String key1=request.getParameter("key");

System.out.println("Key Value is1 : " +key1);

System.out.println("SEnder is : " +senderid);

String query="select keyvale from keygenerate_twm where userid=’"+senderid+"’";

System.out.println("Query Value is : " +query);

rs=st.executeQuery(query);

while(rs.next()){

key=rs.getString(1);

System.out.println("Key Value is : " +key);

}

if(key.equals(key1))

{%>

<tr><td> Your Key is Validated Plz <a href=./OpenContent?receiver=<%=session.getAttribute("user") %>>Open Message

</a></td></tr>

<%}

else

{%><tr><td> Your Key is Not Validated Plz <a href=./Authenticate.jsp>Re Login</a></td></tr>

<%}%>

</table>
<pre>[/php]

Database connection is established and the corresponding key entered by the current user is validated across the database using the statement by fetching the original key of the sender. If both the keys match, now the user can open the message and Open content attribute is used to achieve this and if the key does not match an error message is displayed as shown in the below screens.

error message is displayed

Management of Lost Private Key using Cache Database concept across Identity Based Encryption systems

Abstract

With the increase in internet and intranet usage across the world, there are many sophisticated security system in existing and each of them have their own pros and corns. Since decades the common approach followed to send the data across any secure network is to encrypt the data and there are many encryption and decryption techniques across the literature. In general encryption process involves the keys, which are always are required to encrypt or decrypt the original message and usually  Public Key and Private Key pair is used proceed with the encryption.

Login id and Password fields
Login id and Password fields

There are many public key encryption techniques and Identity based encryption is one among them. Identity based encryption involves public key encryption, where the required public key is generated using some arbitrary strings or random numbers like users email id, their social security number or their contact number and the job to generated to Private Keys is designated to a trusted third party and they are commonly called Private Key Generators (PKG’s).

These PKG is responsible for the Private Key Management and should hold the private keys of any user using a particular security system. In most of the cases due to lack of intelligence or security breaches, there is a lot of scope to loose the private key of the users and to recover the lost private key, there are some predefined sequence of steps to be followed.

There are many existing techniques to recover the lost private key and most of them are complex in nature and requires lot of computation overhead and to overcome these limitation, I would like to develop a simple and less complex private key generator and private loss recovery system that can be used across Identity based encryption (IBE). My application can prove that its simple in nature and the key recovery can be done using is a simple Cache database implementation.

Introduction:

Project background

Security has become the primary requirement across any organization to protect the data across their internal business relations. There are many security implementations in place to secure the content and messages being transmitted across the network. In general the communication parties relay on many encryption and decryption techniques available to secure the data and each of them have their own pros and corns.

Cryptography is the common technique used across the encryption process, where the entire message is broken to number of chippers. Each and every chipper has a key to encrypt or decrypt. In general all the traditional cryptographic techniques have a single to key to encrypt or decrypt the message. Later in the literature, the concept of two keys has emerged, one is known as public key and former is known as private key.

Public key is commonly public in nature, where it can be shared to any one across the network, where the private key is set as confidential information that can’t be shared publicly and this procedure is known as public key cryptography and is provided across most of the web applications using SSL. In a typical SSL methodology, a server can make its own public and private key.

The server’s public key is advertised across the internet. Senders who wish to send any data to server should know the public key of server and server converts the encrypted chipper text to plain text using the private key. Later digital certificates are introduced to eliminate the hackers to replace the public key of server and this process is known as Signing, where the certificates of the server are verified by a trusted center before sending or receiving any data.

Even there are few flaws across this implementation, where the identity of the user is not revealed and any third party can pretend as the trusted center and replace the confidential information. To avoid these situations, Identity based encryption will be used, where the generation of keys is purely depending on the information related to identity of the sender and receiver.

Motivation

Identity based encryption is proved to be a successful implementation across many communication systems, where the required public or private keys are generated based on the personal identification attributes of the end user like their email id, Social Security Number or contact number.

In general a random number is assigned to their personal identification information. A separate Private Key Generator is used across the Identity based encryption, to issue the confidential private keys. Everything would work fine in the case of positive hypothesis and if in case the private keys issued by the PKG are lost, there are few techniques as well to recover the private key of a particular user.

I had found that all the existing techniques to recover the lost private key are complex in nature and really tedious to implement across small applications like Email or Content management systems. So I would like to extend the research to develop a simple and logical implementation to recover the private key lost by any user using a Cache database concept.

Problem Definition

Identity based encryption is implemented widely across many organizations and Government departments to secure the data and content. In general the public key is generated based on identification information of the end user such as telephone number or email id and the corresponding Private key is generated by a third party know as Private Key Generators (PKG’s). If the Private Key generated by the third party is lost by the user due to any reason, there are many existing techniques to recover them are discussed in Literature and Research analysis.

Most of the existing techniques depend on the User information and Organization information and the users need to answer some questions related to their personal information like Mothers maiden name etc, which are really difficult to remember in some cases. If the questions posed by the existing recovery system are not answerable, then the existing private key is lost permanently and the user should raise a new request to generate the private key again.

If this is the case, there could be chance of complex computation at the PKG side to generate a new private key always. To solve these problems, I would like to develop a Simple Private Key recovery system that uses the Cache database concept as discussed in the Proposed System description.

Proposed System

Based on the problems identified across the project background and problem definition, I would like to develop a less complex Private Key Recovery System. In this application I will provide two different logins, one is for User and one for Administrator. Users to the application are created by the Admin and a separate user id and password is assigned to each and every user.

Users can send message to other users based on the list provided at the user interface and also can raise a request for Private Key. This request is forwarded to Admin, where the admin will approve or reject the request and the status of the request can be tracked at the user side.

If the user forget or lost the private key, they can just click on the link provided to them, where the admin checks the request and sends the existing private key that was saved at the Cache database. Users can send any sort of data to the desired receiver and receiver should know the private key of the sender to view the data. Detailed description of the application is provided at the design chapter of this document.

Online Crime Investigation System Project in Java

Project Abstract: This Online Crime Investigation System software presents the part of an organization’s work as per the requirements, specifications, and conditions mentioned in the user manual. This application s/w has been developed and completed successfully and also tests successfully by taking “Test Cases” It is user-friendly and has all the needed menu options, which can be utilized by the user to perform the desired operations. Moreover, help messages are provided which will help any authorized user from using the system without trouble.

The proposed system is not limited presently. Presently we have to login to the system online and post the complaints. We can further develop the system by using the “Voice Recognition System”. So this project has got scope to get developed in the near future. The scope of the project exists throughout the life of the product development, testing and implementation.

Deployment of  Application:

1) Copy the Online Crime Investigation System application folder to

F:\Tomcat5.5.9\webapps\

2) Click on start.bat in the bin folder of tomcat

3) Create a User in Oracle as follows:

CREATE USER OCR IDENTIFIED BY OCR;

GRANT DBA TO OCR;

CONN OCR/OCR

Now place the all tables in the table.txt file at the SQL Command Line

And type the following command

COMMIT;

4) Create user DataSourceName(DSN) as

click  –> Start —> Control Panel—> Administrative Tools

Software Requirements:

  • Operating System: Windows 98 or above
  • Front end : HTML & JAVA SCRIPT, J2EE(JSP,servlets,Ajax),
  • Back end : Oracle 8i
  • Web Server: Tomcat 5.5.9
  • Front end  : HTML & XML
  • Middleware : J2EE(JSP)
  • Application server : Web logic 7.0

Crime Investigation System Screen Shots:

1.    Crime Investigation System

HomePage

Homepage for the Crime Investigation System Application

Overview

Functional Overview

This module/screen is the Homepage for the Crime Investigation System Application.

Technical Overview

This module Admin or Police Department or Customer can login through screen and customer can register.

Navigations

Customer Login ->Customer LoginScreen

AdminLogin ->Admin Login Screen

Home ->Application Homepage

Department Login ->Department Login Screen

Registration ->Customer Registration Form

ADMIN MODULE

2.    Admin Login Screen

Admin Login Screen

2.1.1    Overview

Functional Overview

This module/screen is used to Admin Login Process.

Technical Overview

  1. This module takes the valid Admin Username and password.
  2. The particulars are valid you will get Admin Homepage otherwise it will displays the message “Invalid Login Information”.

Navigation

AdminLogin->AdminLoginScreen

Action Controls

Control
Name
Type Description Action
       
Login button Gets the particulars of the Admin Login Details. Admin Homepage
Clear Button Clear the fields on the form Login Screen

3.    Admin Home Screen

3. Admin Home Screen

3.1.1    Overview

Functional Overview

This module/screen is used to operate Administration Module.

Technical Overview

  1. This module is used to create new Police Departments and updating the existed department details.
  2. This module is used to create new thief Information and updating the existed thief information
  3. Creating New Caution Information.

Navigation

AdminLoginProcess->AdminHomePage Screen

Action Controls

Control
Name
Type Description Action
       
New Department HyperLink Displays the New Department  registration Form Department Registration Form
All Departments HyperLink Displays the existed department details screen List of departments
New Thief Information Hyperlink Displays the New thief  registration Form Thief  Registration Form
Thief Information HyperLink Displays the existed thief details screen List of Thief Information
Caution HyperLink Displays Caution registration Screen Caution Registration Form

4.    Department Registration Screen

Department Registration Screen

4.1.1    Overview

Functional Overview

This module/screen is used to register New Department Information.

Technical Overview

  1. This module takes the valid new Department Information and Login details.
  2. These New Department particulars will be stored into “POLICE_DEPARTMENT” database table and login details into “LOGIN_MASTER” table.

Navigation

New Department->Department Registration Screen

Action Controls

Control
Name
Type Description Action
       
Register button Gets The new Department    information and login details from the form. Stores the department data into table POLICE_DEPARTMENTlogin details into table LOGIN_MASTER
Clear Button Clears the field in the form New Department Registration form will be displayed

5.    Updating Department Details Screen

SCREEN1

5. Updating Department Details Screen

SCREEN2

Updating Department Details Screen1

5.1.1    Overview

Functional Overview

This module/screen is used to Display the list of Department and Updating the department  Information according  to the Department Id.

Technical Overview

  1. Click on Update then it will takes the Department Id and displays Screen2 (Popup Window).

Navigation

All Departments->Department Details

Action Controls

Control
Name
Type Description Action
       
Update button Displays the Department  information of selected Department Id. Displays the Department Information Screen(Screen2)
Close Button Closes the Department Modification form Displays All Department Screen (Screen1)

6.    Thief Registration Screen

Thief Registration Screen

6.1.1    Overview

Functional Overview

This module/screen is used to register New Thief Information.

Technical Overview

  1. This module takes the valid new Thief Information.
  2. These New Thief particulars will be stored into “THIEVES” database table .

Navigation

New Thieves Information->Thief Registration Screen

Action Controls

Control
Name
Type Description Action
       
Register Button Gets The new Department    information and login details from the form. Stores the thieves data into table THIEVES
Clear Button Clears the field in the form New Thieve Registration form will be displayed

7.    Updating Thief Details Screen

Updating Thief Details Screen

SCREEN1 

7.1.1    Overview

Functional Overview

This module/screen is used to Display the list of Thieves and Updating the thief Information according  to thief Id.

Technical Overview

  1. Click on Update then it will takes the thief Id and displays Screen2 (Popup Window).
  2. If you select thief category then according to the selected Category it will Displays Screen3

Navigation

Thieves Information->Thieved Information

Action Controls

Control
Name
Type Description Action
       
Update button Displays the Thief   information of selected Thief Id. Displays the Thief Information Screen(Screen2)
Close Button Closes the Thief Modification form Displays All Department Screen (Screen1)

8.     Caution Registration Form

Caution Registration Form

7.1.2    Overview

Functional Overview

This module/screen is used to Create New Cautions.

Technical Overview

  1. This module takes the valid caution Information and will be stored into CAUTIONS Data Base Table.

Navigation

Caution->Caution Registration Form

Action Controls

Control
Name
Type Description Action
       
Save button Gets the required input details. caution Information and will be stored into CAUTIONSData Base
Clear Button Clears the fields data New Caution Form will be displayed

DEPARTMENT MODULE 

8.    Department Login Screen

Department Login Screen

8.1.1    Overview

Functional Overview

This module/screen is used Department Login Process.

Technical Overview

  1. This module takes the valid Username and password.
  2. The particulars are valid you will get Department Homepage otherwise it will displays the message “Invalid Login Information”.

Navigation

Department Login->Department Login Screen

Action Controls

Control
Name
Type Description Action
       
Login button Gets the particulars of the Department Login Details. Department   Homepage
Clear Button Clears the Form Details New Login Screen Will be displayed

  

9.    Department HomePage

Department HomePage

9.1.1    Overview

Functional Overview

This module/screen is used to process the Department operations.

Technical Overview

  1. In This module department can see his complaint details and thief information.
  2. Updating complaint status and modifying the selected thief informtaion.

Navigation

Department Login Process -> Department Homepage. 

10.    Requested Complaints

Requested Complaints

10.1.1    Overview

Functional Overview

This module/screen is used Display the complaints Information.

Technical Overview

  1. Updating the complaint status by changing the options in the Modify column.
  2. In options when the complaint status is ‘Closed’ then only you will get new option ‘ReOpen’ in the options

Navigation

Requested Complaints->Complaints Status

Action Controls

Control
Name
Type Description Action
       
Update button Gets the modified details. Changes the status of the complaint in COMPLAINT_REG Table

 

11.    Thief Details Screen

Thief Details Screen

11.1.1    Overview

Functional Overview

This module/screen is used to Display the list of Thieves and Updating the thief Information according  to thief Id.

Technical Overview

  1. Click on Update then it will takes the thief Id and displays Screen2 (Popup Window).
  2. If you select thief category then according to the selected Category it will Displays Screen3

Navigation

Thieves Information->Thieve Information

Action Controls

Control
Name
Type Description Action
       
Update button Displays the Thief   information of selected Thief Id. Displays the Thief Information Screen(Screen2)
Close Button Closes the Thief Modification form Displays All Department Screen (Screen1)

 

12. Customer Information

Customer Information

11.1.2    Overview

Functional Overview

This module/screen is used to Display all registered Customer Details

Navigation

Customer Information->Customers Information Screen

CUSTOMER MODULE 

12.    Customer Registration Screen

Customer Registration Scree

12.1.1    Overview

Functional Overview

This module/screen is used to Customer Registration.

Technical Overview

  1. This module takes the valid new Customer Information and Login details.
  2. These New Customer particulars will be stored into “CUSTOMER_MASTER” database table and login details in “LOGIN_MASTER”.

Navigation

Registration->Customer Registration Screen

Action Controls

Control
Name
Type Description Action
       
Register Button Gets The new Customer information and login details from the form. Stores the employee data into table CUSTOMER_MASTER
Clear Button Clears the field in the form New Registration form will be displayed

13.    Customer Login Screen

13. Customer Login Screen

13.1.1    Overview

Functional Overview

This module/screen is used Customer Login Process.

Technical Overview

  1. This module takes the valid Username and password.
  2. If The particulars are valid you will get Department Homepage otherwise it will displays the message “Invalid Login Information”.
  3. If you forgot your password then click on Forget Password option.

Navigation

Customer Login->Customer Login Screen

Action Controls

Control
Name
Type Description Action
       
Login button Gets the particulars of the Customer  Login Details. Customer    Homepage
Clear Button Clears the Form Details New Login Screen Will be displayed

 

14.    Customer HomePage

Customer HomePage

14.1.1    Overview

Functional Overview

This module/screen is used to process the Customer operations.

Technical Overview

  1. In this module customer can register his complaints and update the complaints.
  2. Customer can modify the complaint information, if the status is “Pending”.
  3. Checking the status of the complaints.
  4. Displaying all department details.
  5. Displaying all thief information.
  6. Changing the personal details.
  7. changing the password.

Navigation

Customer  Login Process -> Customer  Homepage

15.    Complaint Registration Screen

Complaint Registration Screen

15.1.1    Overview

Functional Overview

This module/screen is used to register the new Complaint

Technical Overview

  1. This module takes the valid new Complaint Information.
  2. These New Complaint particulars will be stored into “COMPLAINT_REG” database table.

Navigation

Complaint Registration->Complaint Registration Screen

Action Controls

Control
Name
Type Description Action
       
Register button Gets The new Compliant   from the form. Stores the Complaint data into table COMPLAINT_REG
Clear Button Clears the field in the form New Complaint  Registration form will be displayed

16.    Thief Details Screen

Thief Details Screen

16.1.1    Overview

Functional Overview

This module/screen is used to Display the list of Thieves Information.

Navigation

Thieve Information->Thieve Information

17.    Department Details Screen

 Department Details Screen

17.1.1    Overview

Functional Overview

This module/screen is used to Display the list of Departments Information.

Navigation

Departments->Department Information

18.    Changing Customer Profile

Changing Customer Profile

18.1.1    Overview

Functional Overview

This module/screen is used to Change the Customer Information.

Technical Overview

  1. This module takes the modified Customer Information from (Screen1).
  2. These New modified   particulars will be updated into “CUSTOMER_MASTER” database table.
  3. If u want update these modified details then click on “Update” in SCREEN1
  4. If you want to change the password then click on “Change Password” then “SCREEN2” will be displayed

Navigation

Change Profile->Customer Information

19.    Complaint Status Details Screen

 Complaint Status Details Screen

19.1.1    Overview

Functional Overview

This module/screen is used to Display the list of Complaints.

Technical Overview

  1. This module takes the valid search options like datewise and compliant type.
  2. According to the selected search option the complaints will be displayed.
  3. Click on “Show All” button, If no option selected then it will display all complaints information.
  4. Click on “Search”  button without selecting any search option then it will display message “Select Valid Search option”

Navigation

Complaint Status->Complaint Information.

Traffic analysis across energy constrained wireless sensor networks

Abstract

Wireless sensor networks have become popular these days due to their in terms of electronics, information processing and networking advancements. There are many applications across the Wireless Sensor networks and few of them are Health monitoring, forecasting and information processing.

There is lot of research done on the Wireless Sensor networks and there are few areas to be concentrated more the mainly the Traffic analysis, energy consumption and anomaly detection. This project helps in modeling the traffic analysis in various aspects like sequence relations among the packets that are being arrived, defining and modeling the traffic arrival rates across the WSN and load distribution of traffic across WSN.

This project proposes a technique to handle the network performance issues across the energy resource allocation process. An optimized energy allocation scheme is proposed in this project. Anomaly detection is done as per the traffic analysis across WSN. Main aim of this project is to consider three important problems in Wireless sensor networks and propose a solution to them.

One among these problems is to analyze the traffic caused by the incoming packets and model the traffic and also to model the sequence relationship among the arriving packets. Network optimization is also proposed based on the energy efficient resource allocation across the wireless sensor networks and finally to detect the anomalies based on the analyzed traffic.

Nodes Distance from the sink
Nodes Distance from the sink

Conclusion and future work:

Wireless Sensor networks are widely used across many real time applications and due to their demand they are widely accepted and integrated across every organization these days. In most of the applications all the deployed sensor nodes are inexpensive and all combined to act as a corporate network. Even though WSN is a good technology, there are some technical loop holes in the technology and there is lot of research done to overcome these limitations.

Most of the traffic dynamics in WSN technology are application dependent and there is no perfect traffic analysis model across WSN. In this project, It have done all the basic research on traffic analysis and modeling across WSN and proposed few optimization solutions for a perfect analysis and modeling sequence of traffic.

A window based scanning process is completely evaluated in this project to measure sequence relations among the arriving packets at individual sensors and all the sequence of packet arriving rates are mapped a character string to identify the exact sequence of packets and this character string can be used in perfect analysis and modeling of packets.

A typical ON/OFF model is used to measure the bursty traffic sequences. For better understanding the traffic dynamics, network optimization techniques are always required.

By traffic dynamics understanding WSN optimization research is activated. By designing WSN performance and energy consumption, communication traffic interrelation ship, information about energy consumption in network will be gathered and by energy resources availability performance investigation is preceded.

For correct deployment and future routing investigation results are useful. To minimize energy waste and maximized network life time optimized energy scheme is proposed by utilizing knowledge of symmetric dense WSN traffic load distribution.

When compared to internet which is traditional network, WSN traffic patterns are less dynamic and simple and this statement is derived by using research knowledge of traffic modeling and analysis.

By this information for whole network and individual nodes precise traffic profile is built because WSN normal traffic operations generate traffic which follow profiles of normal traffic and signals of normal traffic profile violated by irregularity.

In network optimization future work, limited resource inherent nature has high importance. In network processing node mobility bounds of fundamental performance are not clear. To verify WSN fundamental performance bounds, optimization model for network is designed and pre conditions of traffic model are option.

By centralized coordination algorithms optimal performance is achieved without network processing and mobility. So, for real implementation search is focused on distribution coordination algorithms development. For optimal energy for WSNs optimal resources are allocated. So, resources allocation development will be useful in WSN scenarios.

WSN anomaly detection will be very important in WSN by that for real deployment is available in WSN. In WSN anomaly detection packet traffic is necessary but it requires some support. In WSN alarm rates of high false are not acceptable and low probability events are malicious attacks. With alarm rates low false, anomaly detection system designing is hard.

When any problem is detected in network, detecting and recovering from that problem is necessary and some measures should be performed to recover from damage. In WSN future anomaly detection, emergency response strategies development will be need.

Simulation of Handoff Techniques in Mobile Cellular Networks

In this Simulation of Handoff Techniques in Mobile Cellular Networks project, the simulation procedure of hand-off techniques in mobile cellular networks has been presented. Several studies have been conducted to determine the cell hand-offs mean number and expected average strength of signal.

In literature part, the performance measures of MM1 queue and its waiting time distributions are estimated. To simulate both MMC and MM1 Queues, we made use of java coding. Also, we created a Queue class in java, where the clients of de-queue and en-queue are encoded.

We have also created histogram class to display results of simulation. At the end, the actual time as well as waiting time of both the queues is estimated and shown in the form of graphs.

Code and Results Explanation:

I have used to java coding to simulate the MM1 and MMC Queues. Below is the sample code of MM1 queue

double lambda = 0.6;  // arrival rate

double mu     = 0.8;  // service rate

I have taken an initial service and arrival rates of the clients and in this case a single server and infinite clients are used with a queue length of infinity. I have created a Queue Class in java where the en-queue and de-queue of clients are coded. A histogram class is created to display the simulation results and the actual service time and waiting time are shown in graph form as shown in the below code

Histogram hist = new Histogram(60);

hist.addDataPoint(Math.min(60,  (int) (Math.round(wait))));

hist.draw();

A random class is used to derive the service rate of the clients and the actual waiting time of the clients across the queue is also calculated using the below code

double nextArrival   = StdRandom.exp(lambda);     // time of next arrival

double nextDeparture = Double.POSITIVE_INFINITY;

By default the next departure of the client is considered as infinity and this variable is updated during the execution of the project. Initially the condition if next arrival rate of the client is less than next departure of the next client is checked and if the condition is satisfied another condition like whether the queue is empty or not is checked. Once all the conditions are satisfied, next arrival rate of the client is assigned with a random number as shown in the below code

if (nextArrival <= nextDeparture) {

if (q.isEmpty()) nextDeparture = nextArrival + StdRandom.exp(mu);

q.enqueue(nextArrival);

nextArrival += StdRandom.exp(lambda);

If the above mentioned conditions fail, the actual waiting time of the client in the queue is calculated using the below code

double wait = nextDeparture - q.dequeue();

The actual queue size used in this process is also calculated along with the mean queue length as shown in the below code

mql=row/(1-row);System.out.println(mql);

StdOut.printf(“Wait = %6.2f, queue size = %d\n”, wait, q.size());

After running this code the actual simulation results are as shown below

actual simulation results output
actual simulation results output
actual simulation results
actual simulation results

MMC Queue simulation:

Similar procedure is used to develop the MMC Queue simulation but the number of servers considered in this process is 4 and the only code change is as shown below

double wait = (nextDeparture - q.dequeue())/4;

row=lambda/(4*mu);

mql=row/(1-row);System.out.println(mql);

Now the actual wait time and mean queue length are decreased by 4 times using this MMC Queue implementation as shown in the below the screens

MMC Queue implementation output
MMC Queue implementation output
MMC Queue implementation
MMC Queue implementation

Implementation and distribution of collaborative key for authentication across dynamic peer groups using Queue batch algorithm

Peer to peer network has a wide role to play across the networking application and securing these peer groups has become really tough job.

Dynamic peer groups involve many nodes connected across the network architecture and to ensure the security across these peer groups there are many cryptographic techniques in implementation to share the secure information. To proceed with the encryption techniques, the public and private keys need to distributed across the peer to peer systems and proper authentication is required to share these keys.

There are many existing systems to distribute the keys, where a centralized key server is used to generate the keys and in this process, all the information related to the keys is available only with the centralized server and when ever the peers try to access this information, high computation cost is incurred on the server and thus the system performance is affected a lot.

Each and every node across the peer to peer network should individually re-key the generated keys when ever they join or leave the peer to peer system and this increase the computation speed.

I would like to develop a Queue batch algorithm, where the re-keying is done at a dynamic peer group, where this group is responsible for re-keying operation and thus the computation overhead is decreased a lot and the requirement of a dedicated centralized server is completely eliminated.

Performance of the proposed protocol will be efficient even in the case of frequent joins and leaves of the peer nodes across the system and thus it reduces the computation and communication cost a lot.

Aim: To develop a Queue batch algorithm that can implement the group level re-keying across dynamic peers and allows a less computation level collaborative key distribution.

Following are the objectives of this project 

  • To understand the concept of Dynamic peer groups and the level of security requirements in collaborative key distribution process
  • To prepare literature review on existing key distribution algorithm for peer to peer systems and their limitations
  • To design Queue batch algorithm, where the keying and re-keying is done at each peer of the network and thus reducing the computation and communication overhead.
  • To develop a java based application that can demonstrate the proposed system practically
  • To test the application and document the results and observations

Bulk IEEE 2014-2015 Java Projects for BTech & MTech Students

Latest 2014 Java Projects (B.Tech & M.Tech):

Students and institutes who are looking for latest java 2014 projects with full project source code, project report, paper presentation can contact us for buying projects in bulk. Projects listed here are developed based on latest technologies using java programming language. 

List of Latest 2014 Java Projects:

S No Title Of The Project Domain Year
1 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining 2014
2 Efficient Prediction of Difficult Keyword Queries over Databases Data Mining 2014
3 Dealing With Concept Drifts in Process Mining Data Mining 2014
4 A Cocktail Approach for Travel Package Recommendation Data Mining 2014
5 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining 2014
6 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform Data Mining 2014
7 Data Mining with Big Data Data Mining 2014
8 Facilitating Document Annotation using Content and Querying Value Data Mining 2014
9 Fast Nearest Neighbor Search with Keywords Data Mining 2014
10 Privacy-Preserving and Content-Protecting Location Based Queries Data Mining 2014
11 Security Evaluation of Pattern Classifiers under Attack Data Mining 2014
12 Supporting Privacy Protection in Personalized Web Search Data Mining 2014
13 Towards Online Shortest Path Computation Data Mining 2014
14 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Cloud Computing 2014
15 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2014
16 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Cloud Computing 2014
17 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2014
18 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing 2014
19 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing 2014
20 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Cloud Computing 2014
21 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing 2014
22 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing 2014
23 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing 2014
24 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Cloud Computing 2014
25 Towards Differential Query Services in Cost-Efficient Clouds Cloud Computing 2014
26 Automatic Test Packet Generation Networking 2014
27 Boundary Cutting for Packet Classification Networking 2014
28 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking 2014
29 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking 2014
30 An Incentive Framework for Cellular Traffic Offloading Mobile Computing 2014
31 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing 2014
32 Efficient Authentication for Mobile and Pervasive Computing Mobile Computing 2014
33 Friendbook: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing 2014
34 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Mobile Computing 2014
35 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Secure Computing 2014
36 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Secure Computing 2014
37 PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks Secure Computing 2014
38 Top-k Query Result Completeness Verification in Tiered Sensor Networks Secure Computing 2014
39 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel & Distributed Systems 2014
40 Exploiting Service Similarity for Privacy in Location-Based Search Queries Parallel & Distributed Systems 2014
41 LocaWard: A Security and Privacy Aware Location-Based Rewarding System Parallel & Distributed Systems 2014
42 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures Parallel & Distributed Systems 2014
43 RRE: A Game-Theoretic Intrusion Response and Recovery Engine Parallel & Distributed Systems 2014
44 Secure Out sourced Attribute-based Signatures Parallel & Distributed Systems 2014
45 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Parallel & Distributed Systems 2014
46 SOS: A Distributed Mobile Q&A System  Based on Social Networks Parallel & Distributed Systems 2014
47 The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation Parallel & Distributed Systems 2014
48 The Design and Evaluation of An Information Sharing System for Human Networks Parallel & Distributed Systems 2014
49 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel & Distributed Systems 2014
50 Privacy-Enhanced Web Service Composition Service Computing 2014

Mail Server Project in Java

The Intranet mail server Project in Java is communication software that helps the users of an Intranet to communicate with electronic mails. The mail service in the Internet is the most useful facility that enables the users of the Internet to send mails to any one who can be anywhere in the world. There is some free mail service providers such as HOTMAIL, YAHOO etc in the Internet. An user can have his account in any server.Mail Server Project in Java

Now it is necessary to an organization to establish a communication path over its Intranet to facilitate electronic mail service. Also, the Intranet Mail Server (IMS) system provides the facility of mail service locally. 

Since the system is a mail service. The system has to follow the Internet standards. In technical point of view, there are two modules that are the Client module and the Server module. There are two protocols that have to be implemented for developing an mail software that are 

  1. POST OFFICE PROTOCOL 3 (POP 3) and
  2. SIMPLE MAIL TRANSFER PROTOCOL (SMTP). 

These protocols are nothing but set of commands. In IMS, both the server and the client used these protocols i.e. the commands that are defined in these protocols to make communication between themselves. The two protocols have to be implemented both in the server module and the client module. 

The following figure shows the place where POP 3 and SMTP fit into the TCP/IP protocol suite.

Mail Server Project Sub Systems:

 The system is designed as Internet based application. The whole system is divided into following sub – system: 

  1. Server

User Agent

Mail Transfer Agent

  1. Client

User Agent

Mail Transfer Agent