Remote Desktop Sharing Project in Java

Remote Desktop Sharing Project in Java is a software application which is useful to handle systems from other location and solve problems. This application is useful for network managers to handle work from home.

Remote Desktop Sharing

Remote Desktop Sharing Modules Overview:

File Transfer:

Using this module we can transfer files between the client and the server based on the IP address.

Chat :

This module asks the administrator to enter the system address on which he wants to perform the terminal operations. It also asks the administrator to mention one of the above three terminal operations to be performed on the remote system. Once the administrator has confirmed the action, an echo message is sent to the remote system in order to ensure whether the user is using the system or not. In case of the system being accessed by the user a response is sent to the administrator. The administrator can either suspend or continue with his actions after receiving the response. If the administrator knows that no one is using the system or no processes running at that time then he can use these options like shut down, restart or logoff.

 Pen Drive Detection
This module defines the detection of the pen drive port. When the external device is added to the client systems, then the server will get a message from that particular client system with IP address. Then the server knows. This is used in any lab examinations. If any student will try for copying by using pen drives then the server knows that client system and will take an action on him.

Future Enhancements

     In this project it is unable to scan any malware and virus in client system and notify it to the server system. Further we want to implement this concept that if any malware or virus found in client systems then a message will be sent to the server system as a notification along with brief details.

Integrated Desktop Search in Intranet Project in Java

     Integrated Desktop Search in Intranet Project  is the important topic on web. With the Google desktop search tool announced, MSN and Yahoo also came up with desktop search software. With this software, searching files in our computer is easier and easier. But sometimes the files are not located in our own computer. Instead, it’s in other members’ computer in the intranet which is welcome us to get it. 

Integrated Desktop Search in Intranet

     This is important for large enterprises, companies, schools, banks, and so on. For example, when an employee wants to leave of absence, usually, he needs to fill a form for leave. If enterprise has the system of desktop search referred as before, the employee could search the form through the desktop search engine and get it easily. It is only an example for the benefit of desktop search which could be applied more comprehensive. 

Integrated Desktop Search in Intranet Project modules.

They are Network, Desktop search, Desktop share, File search and File operations modules. 

     Where in Network module a network connection will be established and the terminal will be connected with the given IP address. 

     In the Desktop search module, the user can explore the desktop connected with and in the Desktop Share module; multiple users can share the same desktop. 

     The File search module deals with the searching of the required file with a specified file name and type of the file. Whereas the File operations module consists of various operations that are concerned with a file such as view, create, delete and download.

Chaotic Image Encryption Techniques Project in Java

Chaotic Image Encryption Techniques Project in Java is intended to the people who need privacy for their confidential images. It was most suitable in the networking Systems, so it was more eligible in Space Science research centres.

Chaotic Image Encryption

The user can have membership by concerning the administrator. The system dynamically generates member id on presenting the user details. The user can have transactions by having their member id. The user adds the image for encryption and encrypts it for confidential images.

Chaotic Image Encryption Techniques Project Users:

1. Administrator.
2. User.
3. Other (Guests).

Administrator:

Administrator is having all the rights to access this portal. Admin can view all the images, and the status of the encrypting and decrypting process. He will have control over the network whether to accept the server‟s request for receiving image. He will provide all the benefits for image encryption and decryption.

User:

The people who use this system for providing security for confidential images are users. There may be different set of users for this system. The users just load an image to encrypt and encrypt it and enter the destination systems IP address to transfer the image and he can view the status of the network for the sent image.

Guests:

Guest or the new user can only view the functionalities in the portal and they have no access permissions unless they are registered.

Proposed System
Proposed system provides a solution to existing system by extending its facilities. The proposed study aims to explore the possibility of using chaotic or chaos-based encryption techniques to protect remote sensing satellite images and provides high level of security in efficient and reliable way.

Chaos based cryptographic scheme provides high security level, less computational time and power in reliable and efficient way to deal with balky, difficult and intractable data that why many researchers recommends that it is more suitable for multimedia data, especially for images. Chaos-based system have many properties to achieve high security level, such as sensitivity to change initial conditions and parameters, periodicity (a system that tends in probability to a limiting form that is independent of the initial conditions), random behavior and unstable periodic orbits with long periods. It has very high diffusion and confusion properties that are desirable for cryptosystem.

Final year Java Project Source Code for Temporal Partitioning

Final year Java Project Source Code for Temporal Partitioning of Communication  Resources in an Integrated Architecture.

The   communication resources of a   single   time- triggered network can be shared among  different DASs. In conjunction with  nodes  for the  execution of application software  from   different  DASs,  this   integration  not  only reduces the  number of node  computers but  also results in fewer  connectors and  wires.

Final year Java Project Source Code

Virtual networks module:

An overlay network is a computer network that is built on top of another network. The DECOS architecture provides overlay networks, which are denoted as VNs, on top of a time-triggered physical network. Each VN handles the message exchanges and provides encapsulation for the jobs by preventing jobs from affecting the temporal properties of messages sent by other jobs. 

Message Timing module :

In this module each circuit is given separate work if a circuit fails it waits for the given interval of time to check if the circuit gets repaired automatically if the circuit remains un repaired and the file goes to the rest of the circuits. 

INPUT/OUTPUT :

Process for the architecture is encapsulated and inserted which is the input and the output will be the beginning of the process.

Future Enhancements:

For future work, additional experiments are suggested as part  of  the  development path  toward the  exploitation  of VNs  in  ultra dependable  systems such  as  a  drive-by-wire car. The experiments presented in this paper have  focused on  a  single   probe   job  within a  selected   VN.  Interesting scenarios for  future experimental evaluations include test cases  with  multiple probe  jobs, which  can exhibit  simultaneous   timing   failures   and   are  located   in  different  VNs. Thereby,   additional experiments can  further increase   the confidence in the presented hypotheses with respect to fault isolation and  performance.

Web Frame Work Project in Java

Main objective of web frame work project in java and its supporting tools is to provide good support for each of development approaches and create an environment that supports and promotes the separation of roles and supports different varieties of development models

Web Frame Work

To install and configure web services infrastructure and framework for developing/ delivering web services using the different languages. To confirm that the web services infrastructure and framework are operational for your account. To deploy simple web service, invoke this service using different languages web services client and to examine the message passed between to them.

Advantages: 

Web frameworks are having lot of advantages they are

  • It puts the developer on a stronger control over the application sequence and it supports caching, thus making a website updates available in real time
  • It ensures easier web settings, web configurations, and deployment of applications the developer implements the application in minimum steps, thanks to the common library which is centralized organization.
  • Most development services boast an expert team that develops and delivers comprehensive solutions by utilizing the capability of functionality.
  • It comes under lower costs and greater maintainability and accelerated development time.

To view design details and screen shots of this project watch this video.

MG Charm Algorithm based Market Basket Analysis Project

In MG Charm Algorithm based Market Basket Analysis Project, we have proposed MG-CHARM algorithm for mining minimal generators of frequent closed item sets. The bottleneck of CHARM is that the number of frequent items are large and it takes more time. To solve this problem we decreased the iterations and used new comparison methodology by enhancing CHARM.

Marker Basket Analysis Project

For this we implemented a Shopping Mall Transaction System. This system maintains customer database that are regular, employee database who are working in the mall, and the transaction database which stores the customer and item relations. By this system we used to know the customer interests, and behaviour. We arrange the items according to the customers interest. This makes flexible to the customer to select items and we can increase the productivity of the mall.

Further Enhancements:

The project has covered almost all the requirements. Further requirements and improvements can easily be done since the coding is structured in nature. Improvements can be done by simply modifying the existing modules or by adding new modules. The main enhancement that can be done is the billing system of the organization or mall.

An Intelligent Network Backup Project in Java

An Intelligent Network backup project in java is a data storage related project where software is installed in system which will automatically back up data to server when user copy data from external memory sources like pen drive, cd ..etc.

An Intelligent Network Backup

An Intelligent Network Backup Conclusion:

This system is totally networking based system and useful to take backup without using external devices like pen drives and CD. By automating and integrating the recovery process with backup restore technology and intelligent disaster recovery protects against system and reduces the time required to recover critical network servers.

Intelligent network backup provides a simple set of steps to prepare for a disaster and to recover should disaster strike. These include preparing the disaster recovery diskettes, automatically updating the disaster recovery information. Intelligent backup in support of customer goals to reduce the administrative burden and total cost of ownership of business networks.

Web Based Recruitment Process System Project in Java

The main objective of Web Based Recruitment Process System Project in Java is to help the HR Personnel help in the process of recruiting new candidates to the company. This web based corporate recruitment process system will primarily focus on the posting and management of job vacancies. When the Job Provider post job openings in this system the WRMS will search the total system and select the all job seekers Mail Id’s, their qualifications and match with the requirement of the organization.

Web Based Recruitment Process System

Web Based Recruitment Process System Features:

  • This system is designed by keeping in mind three persons Job seeker, Interviewer and HR manager.
  • System allows Job seekers to register their details like experience and specific skills with the system and then on the other hand it allows Job Providers to post their requirements with the system
  • The WRMS will automatically send mails to all Job Seekers; their technical qualification is matched with the requirement.
  • Conducting the online test for screened candidates, Sending emails notification to all Job Seekers and also offering the facility to view results.
  • Interviewer has option to view his mailbox and find out the mails with their resumes and screens the resumes, sent the final list to HR manager.
  •  Interviewer sends the mail to the Job seeker with information of conducting online test with a date and time.
  • Job seeker has a facilities to search and view jobs, view his personal inbox, if he is a new user he can post his resume and can change his details.
  • HR manager main duty is that he will go through the queries and will give the answers to queries.
  • HR manager regularly check the Job Providers details and also he will introduce the new Job Provider with the system.
  • WRMS send the regular mails to the Job seeker with a details of openings.

Image Based Authentication Project in Java

 Image Based Authentication Project in Java Introduction:

A modified digital signature scheme for image authentication has been proposed. Content-dependent structural image features and wavelet filter parameterization are incorporated into the traditional crypto signature scheme to enhance the system robustness and security. Because the proposed scheme does not require any computational overhead, it is especially suited for wireless authentication systems and other real-time applications.

Content-dependent structural image features and wavelet, It parameterization are incorporated into the traditional crypto signature scheme to enhance the system robustness and security. Because the proposed scheme does not require any computational overhead, it is especially suited for wireless authentication systems and other real-time applications.

Image Based Authentication OUTPUT SCREENS:

It is channel of sender side. It consist of different buttons such as Find Neighbour, Path discovery,  select image and send.

Image Based Authentication

Screen 2

Here we identify the neighbour channels based on those channels we identify the destination to send image.

Screen 4

Path Discovery button will display paths to receiver. Shortest path discover shortest path to send image

Screen 5

Here, we generate crypto signature by clicking on encryption. Finally we send the image to receiver then and image received message box is displayed 

Screen 6

Here also we generate a signature which is changed compared to previous, because attacker attacked image in middle. Instead to verify it we generate a digital signature from image also.

Screen 7

Here also we generate a digital signature from image and compared with received signature. Here both are not equal so it will generate a message box Message attacked.

Ontology based Retrieval of Components Project in Java

Ontology based Retrieval of Components Project in Java is a new method for improving the process of software development. From many years software engineers are working to develop a effective method where software development process can be completed in short time. In this process different software components are available for developers to integrate to their application and develop a software is short time.

Ontology based Retrieval of Components

Ontology based Retrieval of Components Modules Overview:

  1. End user  module
  2. Ontology Manager
  3. Administrator 

Module Description

End User

The end users of this software system can be differentiated by using their membership and    contributions to the system. In addition, users can vary based on the purpose; thus, users (or class of users) can be differentiated based on user defined QoS specifications while accessing   the service.

Ontology Manager

Ontology Managers are those who searches the information based on the component description information which is associated with ontology to provide semantic meaning, which builds the foundation for semantic reasoning in the component retrieval process.

Administrator

Administrator is a person who will take care of all registration status, acceptance of new uploads, and many other tasks to reduce the ontology manager’s burden.