Java Projects for MCA on Multi player Snakes and Ladders

Introduction to Multi player Snakes and Ladders Project:

A popular board game is Snakes and Ladders, which can be played by two to four players. The aim of the game is to finish first; each player gets his turn to roll his dice on the board and he has to navigate his way through the obstacles of snakes and ladders. The entire board in divided into 100 squares and the player has to travel from the first square to the 100th square and the player who travels the entire board the fastest is the winner.

Now spatially located all over the board is snakes and ladders; when a player comes across a ladder the player gets a pass and can move ahead by quite a few steps and thus gets an advantage over all the other players. What the snakes do is just the opposite of the ladders, and any player who comes across it has to move down to a level that is lower than the level at which the player was at the moment. This means the player is at a disadvantage and has to work extra hard to make up the difference caused by the snake. 

The aim of this new version is that multiple players can play this over the internet with a LAN connection. The game has been developed using Java and is embedded online and has been created using an applet.

Just as the usual board game, each player gets his turn to roll his dice, and on the basis of the number on the dice they move that many spaces on the board. Just like the board game, the player who reaches the final square first is deemed the winner. This game has the power to support the screen fully. This game was first established in India and was later made popular during the British Raj.

Download  Java Projects for MCA on Multi player Snakes and Ladders .

Mini Project Report for CSE on Internet Banking

Introduction to Mini Project Topic on Internet Banking:

Internet has revolutionized every aspect of our lives, and it has brought about a tremendous amount of change in the banking industry as well. It has been accepted that the internet can help to further improve retail financial services, in the bank industry, than in any other industry.

What banking over the internet includes is the use of the web for the distribution of various services and products related to the banking industry. This is divided into four main groups starting from level 1 that are those sites that have minimum function and when accessed can provide data that is only related to deposit accounts. Level 4 is the highest of this group, which are those sites that have the maximum sophistication and also offers additional data of integrated sales and other financial services like investments, and insurances. 

To try and put it in a nutshell, the advantages of making use of internet banking facilities are:

  • The rates on savings, IRAs and CDs are exceptional
  • One can check the rebate on the ATM surcharge and pay bills free of charge and will not have to pay any monthly fee for this benefit
  • The account can be accessed throughout the 24 hours.
  • One will also get credit cards that have very low rates
  • The application that has to be made online is very easily done for all tasks that include plea for mortgages and personal loans
  • There is a vast improvement on the quality of customer service as personal attention is given to each and every client 

Internet banking has been developed and has become popular because customer satisfaction has to be maintained. By adopting internet banking, banks also have been making more profits than they were before. Transaction of every kind has been made easy with its introduction.

Download  Mini Project Report for CSE on Internet Banking.

Wireless Data Broadcast Networks Project Abstract

Introduction to Wireless Data Broadcast Networks Project:

A new technique for dissemination of information has been found out and it is called the wireless data broadcast. What it looks forward to do is control the computational capabilities in any mobile device so that the scalability of the system can be enhanced. What this system helps to do is a continuous broadcast of data is done by the server and along with it certain indexing information are also interleaved within the data that will help with further processing of query. This will enable the clients to get connected to the broadcasting channel and process in their queries, which will be done locally and it will not require them to get connected with the server. 

The aim of this system is to achieve a continuous processing of spatial queries related to moving objects. It is achieved with the help of an air indexing framework that has been created in order to perform better than the existing techniques, when it comes to consumption of energy which will in turn have a low access to latency. Also it will more efficiently process the spatial queries in regard to moving objects that are being made continuously. 

In the recent times, mobile devices that are allocated with wireless communication abilities, storage facilities and computational systems have become increasingly popular. Also what is a blessed thing is that technology is always on improvement which is why, we now have the global positioning system, along with low priced GPS devices that are portable which makes it easy and accessible.

This technology would help any user in anew cityor any city. For example if a user wants to know about 10 restaurants near his locality, the device would be able to provide with the information. However there is a range within which only the device can provide information, it varies and it could be 200m or less or more than that even.

Download  Wireless Data Broadcast Networks Project Abstract.

Java Project Topic For B.E Students on Heterogeneous Networks

Introduction to Java Project Topic For B.E Students on Heterogeneous Networks :

In this 21st century we needed a multi utilitarian framework to manage on contrasting stages, which can access information effortlessly, the essential motivation behind a Heterogeneous server is to secure a Heterogeneous grid that can join PCs and different mechanisms with better managing frameworks or methodologies.

For instance, neighborhood (LANs) that join Microsoft Windows and Linux based private machines with Apple Macintosh PCs are heterogeneous. The expression heterogeneous system is additionally utilized within satellite organizes utilizing contrasting access advances.

Objective:

The fundamental target of this record is to delineate the prerequisites of the undertaking HETEROGENEOUS SERVER. The report gives the definite depiction of the both useful and non utilitarian prerequisites recommended by the customer. The archive is improved following various meetings with the customer and thinking about the complete necessity details of the given Project. The last result of the group will be gathering the necessities of this record.

Scope:

The Fiction is a derivative of Heterogeneous Distributed Database Computing. The prime target is to make conveyed processing near heterogeneous databases, meanwhile concealing items of the grid from the user. To attain our target, this venture secures a center layer in the middle of the user and databases on the system. This layer will fill in as a middle which takes qualified data as info from one side and convey it to the different following changing over it into the coveted shape.

Salient Features:

  • The Server prepares the users to collaborate with a grid of heterogeneous databases effectively.
  • This is accommodating for administration conglomerations, work places and so on.
  • This is a great instrument that encourages controlling, composing the databases all the more when they are not homogeneous.
  • It furnishes offices proportional to a homogeneous dispersed system.
  • It chops down the expense of transferring heterogeneous databases to a homogeneous stage & different expenses too, essentially.

Download  Java Project Topic For B.E Students on Heterogeneous Networks .

Suspicious E Mail Detection Java Project Report

Introduction to Suspicious E Mail Detection Java Project:

The suspicious e- mail detection is the specialized Mailing system that recognizes the e- mail threats by looking out the keywords like bomb, RDX etc. sent by the user. This e- mails first to be blocked by the administrator and then go for the identification of the user. The system consists of 5 modules that are very advantageous.

  1. Login module
  2. Registration module
  3. Administration module
  4. User module
  5. Mailing module 

The Login module is useful for the authenticated administrator and the user. The Login information about the person has been entered so they can access the safe mail. 

The Registration module provides the user to first register them to access the safe mail. 

The Administration module is made for the administrator for management of keywords, to add new keywords along with the identification of the blocked list which consists of discarded mails. 

The Mailing module allows composing mails and sending mails along with the checking mails. 

The Existing System 

The Existing system cannot determine and detect the suspicious mails and offensive mails. 

The Proposed System 

The Proposed system can easily identify the offensive mails and block it. This would be very helpful to identity the anti- social mails, the system can be secured and would be helpful in the investigation agencies.   

The Hardware needs in this project includes of Pentium processor of 233 MHz or above along with 128 MB RAM. The hard disk must be 20GB. 

The Software includes the Operating system Windows NT/2000, JSP along with Tomcat Server, HTML and Javascript for the Client, Database Oracle 10 g/XE, the integrated development environment is My Eclipse 6.0.

Download  Suspicious E Mail Detection Java Project Report.

CSE Java Project on An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

Introduction to Java Project on An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services:

The Wireless broadcasting has been an impressive way to spread information or data to various users. The accessibility of data is made available to the user by the symmetric key based encryption to decrypt the data for security cause. The efficient key management is required to spread and also change keys in different types of subscriptions to explore the broadcasting services. Here we are offering the scheme of efficient key management known as KTR. This can be used for key distribution in complex subscriptions and user applications. The merits of the KTR are following.

  1. The KTR gives the place for the subscription options in wireless broadcast services.
  2. The user gets advantage of having only the single key sets to explore all subscriptions not many key sets.
  3. Regarding Broadcast services protection, the option is there to change the minimum key sets which can be recognized easily. 

The Facts about Existing System with respect to Proposed System 

  1. The existing system demands for the different set of keys to manage different subscriptions which leads to subscribe many programs. Where as in our Proposed system the programs can be run parallel with the same set of keys.
  2. The same set of keys or common keys can be reused or  managed skillfully during the subscription of new programs or un subscription of programs with no security threat. 

The Proposed System Features 

  1. The Logic Key Hierarchy: The Secure key management and Secure group key management in Wireless Broadcasting and Networking respectively, are some what similar. The Data encryption key of the Program and the Individual key of the user are identified by each other. The Key distribution keys (KDK’s) are another keys. If the user is added or removed in the group, the server system produces the new corresponding keys which is called the Rekey. The message broadcasts is called Rekey message. The Proposed system broadcasts this Rekey message in the same broadcasting program to the user.
  2. Broadcast Encryption Techniques: The index head decrypts the packets. Earlier the subscription was need pre planned. But the pervasive computing and air data access, the subscriptions can be changed at any moment. The LKH approach are however more flexible that key management schemes for the Broadcast Encryption Technique.
  3. Rekey Operations: The two paths are made when the user un register the tree, the keys are of no use called Leave path. When the user register the program the keys are for use called Enroll path. The Leave path and Enroll path are made during the transfer from one program to another. The KTR allows the path that start in Leaf node and finishes in multiple DEK’s of the register programs. The server broadcasts the newly assigned keys to the user by forming Rekey packets.

Download  CSE Java Project on An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.

Secured Authentication For Online Banking Using Mobile Phones CSE Project Report

Introduction to Secured Authentication For Online Banking Using Mobile Phones Project:

Online banking is all about money transactions through a secured website by any virtual or retail bank, credit union. It got some common features too, which are divided several categories.

Generally conducting a financial transaction like account to account transfer, online purchasing, payment of any bill,  etc. whereas in Non-transactional  it is cheque links , co browsing , etc. 

SECURITY: Generally there are two different types of security methods.           

The system is called as PIN/TAN in which the PIN is a password used to login and TAN is one-time passwords, but it can create different problems so for secured way of using TANs should be done by a security token.  

ATTACKS: Normally online attacks are based on the user steal login data and valid TANs. Correct transactions and fake transactions are shown on the screen and in the background respectively, so by this it can be identified.

COUNTERMEASURES:  To avoid phishing and pharming kind attacks users should use  scanners and should be careful while downloading  software.

Secure Hash Algorithm: this algorithm is a series of cryptographic hash functions i.e., a block of data is converted into a fixed size bit string, for a secured password hashing.

BASE64: It is a group of encoding schemes for translating or encoding the data from binary to textual and even storing complex kind of data, etc in different form but with no change in the data.

Client Design: J2ME program is to be installed on the mobile phone, and then the key token program generates the dynamic key such as IMEI, IMSI numbers and token sent by the server through a text message.  And username, pin must be entered to get security token.

Database Design: It is used to store complete information about the clients .

Implementation: computer based software tokens is the proposed system which is secured and consists of 3 parts, namely,

1. Installed software, 2. Server software, 3. GSM modem.

Registration and Login Module: The basic information such as name, age, addressed. Are to be registered while creating the account, it includes both IMEI and IMSI numbers.

ATM process module: When the client enters the token number, the server identifies and extracts from the stored Database. Then further processes like withdrawal, fast cash, balance enquiry, can be  done if authentication is successful.

Generally for each and every transaction, a unique password token is given in order to avoid theft or hacking attacks.

 FUTURE ENHANCEMENTS

 User friendly, proposed work on various mobiles, Bluetooth and WLAN features for cheaper token generation.

 The Proposed system is successfully implemented and tested for secure. 

Download  Secured Authentication For Online Banking Using Mobile Phones CSE Project Report.

Online Shopping Project Report

Introduction to Online Shopping Project:

The aim of this project is on the online shopping application it is developed using HTML5, JAVA script, CSS, JSP, SERVLETS. The application is very useful where the buyer can directly buy the products from home via internet on mobile or system. The application reduces lot of work load for customer as well as owner. The transaction of money is completed in real time system. Some of the online shops are EBAY Amazon. By this online shopping the product is directly delivered to customer home.

Proposed System:

The development of this application contains following activities

  • Profile management facility for customers in secure manner
  • All the products are accessed through e-mal like kitchen accessories, Food items.
  • Shopping cart is also created for customers for total amount checking
  • Recent offers updates to customers via mail
  • About most of them purchased are shown.

Modules:

There are 4 modules in this application

  • Customer
  • Employee
  • Admin
  • Security and authentication

Customer:

The customer module contains information about the products and offers and the price of the products. Before that the customer has to register in this application for this registration form is developed the new users must register and can continue the shopping.

Employee:

The Employee module contains Employees who are working in the company. The details of every employee are stored in this page. The Employees process the data of the customers and their orders.

Admin:

The admin module contains user’s details and category entry, sub-category entry and Product master.

The manufactures list of products and their details are shown at left side.

Security and Authentication:

The security and authentication module contains about access privileges to customers and employees for various operations. The security is very important for online transactions to done correctly without being hacked.

Download  Online Shopping Project Report .

A Candidate Set Free Algorithm for Generating D Optimal Split Plot Designs Project Abstract

This paper is about a new method of generating optimal split-plot design. An advantage of using split-plot design is that, no need to specify the candidate set in prior. This can be more useful when the candidate set is too large. 

The word split-plot design comes from agricultural experiment. A factor that changes between separate plots of land is a whole-plot factor and in sub-plot factor levels varies within each plot. Though split-plot implementation is economic we prefer over randomized design in some cases.A usage of split-plot designs mainly focuses on sample size, whole plot size and priori model.

 The algorithms of Goos and Vandebroek choose combinations at factor level and arrange in whole parts so that D-optimality criterion is maximum but it becomes a problem when number of experimental factors are large or when experimental region is highly constrained. Because a candidate set which covers the entire region requires a large number of factor level combinations. 

There are two ways by which practitioner’s money can be saved. First, the algorithm provides an opportunity to reduce sample size when compared to the use of fractional factorial designs. Secondly, it provides efficient solutions for challenging practical problems than can be found using available methods. 

The main aim of Split-plot experiments is non-specification of the candidate set in prior. The performance of candidate-set-free algorithm is implemented using proof-of-concept example and wood products experiment.

Online Mentoring System Java Project Report

Introduction to Online Mentoring System Java Project:

The Project is about developing an application which can help women in all aspects; it may be providing online training or can be providing opportunities of interest. So that it is beneficial for women in all fields. And even making them experts in the domain they have chosen with the help of some training.

 In the existing system, there is a lack of opportunity for encouraging rural women for pursuing their carriers. In the present days women are not allowed for regular studies. If they have opted for distance mode then there will be a lot of communication gap between the trainer and students. And also takes many years for course to complete. 

In the proposed system an application is developed to provide various services to women. It includes providing training online by domain experts and also the queries can be raised and resolved online by tutors or experts. Training is provided on multiple domains by experts. 

To implement this project we have four modules administrator module to handle mentors and student details who has registered with the application. Mentors module where a master mentor is used to track all mentors details, student module involves the students to register with the application before accessing information and reports module where administrator generate reports regarding the available mentors, students , course details and more. 

We can conclude that this application provides an opportunity for women to learn some online courses and even resolve their queries with the help of experts than going by traditional approach. 

The software used for this application includes:

                                  Operating System: Windows,

                                  Technology            : Core java, Adv. Java (JDBC, Servlets, and JSP),            

                                  Database                 : Oracle.

Hardware required:

                                Hardware: Pentium with minimum p4    

                                Ram         : 256 mb minimum.    

Download  Online Mentoring System Java Project Report.