New Java J2EE Projects List With Logo
New Java J2EE Projects List With Logo
Media can be received from the Server to which the Camera is attached and live images
are captured. Sitting in different place, we can view what’s going on in another place. The main
use may be in places where cash transaction is going on. Setting up RTP sessions with several
distributed clients and streams can be a tedious and complicated task.
J2E 6003. MULTIPLEX & DEMULTIPLEX CONVERTION IN
AUDIO / VIDEO TRANSCODING SYSTEMS
The object is to transcode the Input media to different track formats and generate a
resulting file with the transcoded data. The output file could also be of a different content type
from the original input. Parse the output media locater and based on the file extension, determine
the content descriptor using Mime Manager. The original data comes, an output URL where the
transcoded data will be saved; and a list of track formats of which the input data will be
transcoded.
Page 1 of 36
J2E 6004. DESIGN AND DEVELOPMENT OF A NOVEL
DISTRIBUTED , SCALABLE FILE SHARING AND
ACCESS SYSTEM WITH GUARANTEED SECURITY
There has been a huge growth in the use of file sharing software over the last year,
making file sharing one of the top uses of the Internet. Napster was the first technology that
empowered users with his ability to share files amongst themselves. The demise of Napster led to
the development of numerous file sharing technologies, most of which are based on the Gnutella
protocol. The problem with all current file-sharing technologies is that none of them can
guarantee the security of the shared file. This report describes the design, development and
evaluation of a file sharing that proposes a novel solution to the shared file security problem. The
system will allow user to share files in a secure manner and comprises of client and server
applications.
The client allows users to connect to a server and shares their files amongst all other
system users. The client also gives users the ability to search for files shared by the other system
users, and when a file is found it could be transferred from the other user securely, as the file
would be encrypted. The server allows valid users to connect, records their shared file list enables
connected users to search this list. The server authenticates connected users by performing a test
that only a valid user can respond to in the correct manner.
The report outlines research in the area of networking, including technological
backgrounds such as distributed file system architectures, cryptographic techniques and network
programming methods. The novel feature of the system is the method used to address the security
problem inherent to all current file-sharing technologies. The system developed uses
cryptographic techniques to implement a framework in which to model system security, including
authentication of system users and the files that they share. We can also implement the direct
client-to-client communication, so the ideal time of the client must be greatly reduced. Log files
are not to be created. This project is highly scalable; it can be applied to WAN.
Page 2 of 36
The time spent by the visitor on a particular page provides a good
measure showing the interests of the visitor.
ATM CARD MANAGEMENT SYSTEM, deals with the process of issuing ATM cards to
the bank customers. TO avail the ATM (automatic teller machine) services a customer has to
possess a valid ATM card.
This project concentrate how to get a ATM card and how it works. A customer has to
apply for the ATM card. His application is registered first and then processed. The card is sent to
the database and check if the number is present. If it is present, check the amount. It is sufficient
then reduce the amount how much he purchase/ want from the database. Or otherwise it print the
errormessage. Once processing is over, the customer's application is genuine, and then ATM card
is issued to the customer. There on the customer can perform anytime anywhere transactions on
his accounts with the help ATM card by means of various ATM kiosks available in public places
or through the internet. `
Its fully developed in EJB.(Enterprise Java Bean)It maintains state (i.e balance amount) of
the card once its processing. If the processing over it does not maintain its values. Because next
user wait to process his card. So that only we can use EJB concept here.
• Choose in the Menu 'FILE' the 'Add DOS Drive' or 'Add Linux Drive' menu item or right
click in the tree and choose the 'Add Drive ...' menu item of the contextmenu. NOTE:
Page 3 of 36
Running CROSS TOOL under Linux, you have to add Linux-drives in this dialog because
"ldir -part" of the CROSS TOOL doesn't work under Linux.
• Enter a valid disk name in the text field 'Drive' and a valid directory in the text field
'Directory' of the shown dialog.
• To find out, which partitions do contain Linux filesystems, click on the 'PARTITIONS'
button in the toolbar.
• Extended 2/3 partitions should be entered as /dev/hdxY, with x=a,b,c,... and y=1,2,3,...,
ReiserFS partitions should be entered as /dev/rdxY (note the "r" instead of "h"!).
• ReiserFS partitions are read only.
Removing a Drive
• Right Click on a Drive in the directory tree and choose the 'Remove Drive' menu item of
the contextmenu.
• To connect CROSS TOOLgui to a remote host, which is running LREADjav, click on the
'CONNECT' button in the toolbar or in the Menu 'File' on 'Remote connect ...'. In the
dialog box enter the host name and the portnumber (if lreadjav is not running on standard-
port) and click OK.
• To disconnect, click on the 'DISCONNECT button' in the toolbar or in the Menu 'File' on
'Remote disconnect'.
Using wildcards
• If you for example just want to see files with the extension "java" you can set a
pattern(*.java) for the DOS and Linux-lists. Choose in the Menu 'File' the item 'DOS
Pattern ...' to set the pattern for DOS-files or the item 'Linux Pattern ...' to set the pattern
for Linux-files.
Page 4 of 36
he is also got an ID. If he logon into his ID, he got the properties list and he has to select any of
the property which is suitable for them.
Various searches are available based on location, rate and other particulars. Sample
drawings of property also present in this site.So the user can easily guess about the property. If
any user select property to buy means the owner of the property's address and telephone number
and rate of the property all of them displayed immediately. He contact the person for more
details. This page look like a intermediator. Once he buy/sale his property his ID is deleted from
the database. This is very useful who want to buy/sale properties.
• Registration.
• Authentication.
• Forwarding.
• Tracking.
• Transaction.
Page 5 of 36
• Administration.
• Report generation and Feedback collections.
Logistic Support Management System consists of three main parts,
• User part.
• Admin part.
• Stocker part.
Page 6 of 36
• Identifying the free worker:
The administration has the rights to allocate the work to the worker. So finding the
free worker is the key problem work can be allocated based on the time and efficiency.
Page 7 of 36
J2E 6018. SECURED DATA COMMUNICATION OVER
INTRANET SYSTEM
On the Intranet part, the file transfer through software should be maintained with full
Security. Hence, the files should be transferred through Intranet without sharing the Directory.
For this, we need to use Socket programming to transfer the files from Server to the Client
Machine. The essential part should be writing Server Side programs and then the Client
programs which communicate with the Server and do all the activities. All the activities are
happening in the server. Just the client receives the file.
• Admin Management.
• Compose Mail
• Check Mail
• Send Message
Page 8 of 36
• Check Message
• Online Chat
• Virutual Drawing Message.
The server/client architecture is basically applied here because one of the computers will
act as a Server responding to client messages, while all other computers will behave as Clients
that only send requests to the server to perform some task. Sockets are logical connections that
are created to connect the computers to each other. A port number and a host IP address/host
name is required to create a socket. Multithreading means that many threads of a process can be
run on a single processor assigning them an equal time slice and priority, each feeling that it is the
Page 9 of 36
only process running. Because here, many clients connect to the same port to the server,
multithreading is implemented. Threads are that pieces of a process or program that are assigned
some resources, such as file, I/O, and so forth, and are able to run individually.
Page 10 of 36
J2E 6028. IMPLEMENTATION OF INTERACTIVE VOICE
RESPONSIVE SYSTEM
This is being developed to hold the details of the pc, about the working and usage of its
pheriperials, comparison of evolutions and definitions of tech.
SMS or Short Message Service allows Cellular or Mobile GSM phones to send and receive Text
Messages. The use of SMS is a convenient and fast means of communication with cellular
telephone and pagers.
This can be alphanumeric and more recently graphical. A sent SMS message is stored at
an SMS Center (SMSC) until the receiver’s phone receives it. The receiver can identify the
sender by his/her telephone number that is included in the message itself. SMS supports several
input mechanisms that allow interconnection with different mes-sage sources and destinations
including voice-mail systems, Web-based messaging and E-mail integration
The scope of this project is to customize the existing pre-paid system offering by ATech wireless
to the requirements of ICICI and Reliance and integrate it in their existing enterprise systems.
The system will become the base system and a foundation of the complete wireless commerce
framework, which will be implemented later by ATech Wireless
Page 11 of 36
Mobile Recharge
The scope of this project is to customize the existing pre-paid system offering by ATech wireless
to the requirements of ICICI and Reliance and integrate it in their existing enterprise systems.
The system will become the base system and a foundation of the complete wireless commerce
framework, which will be implemented later by ATech Wireless
Transaction on mobile:
Transaction on mobile is used to money between two peoples. this two peoples must be
registered in a bank. And they should have mobile transaction. this transaction starts with SMS. if
user 1 wants to pay Rs.3000 to User 2 .user 1 simply type SMS to particular Bank with his 4
Digit PIN, Amount and Account No. the request is processed by the bank server and Amount is
transferred to designation account.
The main application runs on a dedicated machine somewhere on the internet. It enables
HTTP clients from the internet/intranet to browse the web. The proxy can forward requests to
Page 12 of 36
web servers or to 'father' proxy - that is, it supports chained proxying. This feature enables the
administrator of the proxy to build a hierarchy of intranets/proxies.
Administrator can access the proxy on-line and alter its behaviors. The applet and the
main application can talk full duplex, and the administrator can control the proxy and have
changes take affect immediately with no down time of the proxy. The administrator can access
each proxy uniquely and change its parameters without affecting other proxies. Different
administrators can share control of the hierarchy, having one of them control proxy A, the second
control proxy B and C, the third control proxy D, E and F, etc. For a single proxy X, only one
administrator can control it at a given time, thus protecting proxy X from being handled by
different administrators at the same time (which can lead to inconsistency).
When a client requests an object, the proxy checks if the object is cached. If so, it does not
forward the request, and replies to the client with the cached object (this is called a cache hit). If
the requested object is not cached (cache miss), the request is forwarded, and when the reply
arrives to the proxy, it both sends it back to the client and caches it on its machine. Caching the
objects on the local machine is done using the host machine file system, thus the cache size is
dependent on the local system resources in terms of hard disk free space.
J2E 6032. IMPLEMENTATION OF REMOTE AND VISUAL
NETWORK ACCESS COMPUTING
RVNAC (an abbreviation for Remote and Visual Network Access Computing) is a great
client/server software package allowing remote network access to graphical desktops. With
RVNAC, you can access your machine from everywhere provided that your machine is connected
to the Internet RVNAC can be used to perform remote control and administration tasks in
Windows, Unix and mixed network environments.
RVNAC encrypts RVNAC passwords sent over the net, the rest of the traffic is sent as is,
unencrypted (for password encryption, RVNAC uses a DES-encrypted challenge-response
scheme, where the password is limited by 8 characters, the effective DES key length is 56 bits).
The RVNAC servers also contain a small Web server. If you connect to it with a web browser, the
Java version of the viewer will be downloaded automatically, allowing you to access the remote
desktop.
RVNAC Features:
Page 13 of 36
J2E 6033. WIRELESS MOBILE INTERNET RELAY CHAT
WLIrc is an IRC Client for Java cell phones or any other device who support java MIDP 1.0.
Features:
Menu
Configuration
Nick
Channel(s) (Enter multiple channels by separate them with an ' ' example: '#wlirc #Norway'.)
Irc servers
Page 14 of 36
DNS stands for Domain Name System. It is the system, which resolves a host name (such
as www.yahoo.com) to an IP address. Since the computer can recognize only IP address and not
mnemonic names. This project aims to explain the working of DNS through a JAVA applet. Four
Different examples have been taken to illustrate the DNS principle.
The client sends a DNS query message into the DNS system, specifying the hostname that needs
to be translated to an IP address. After a delay, ranging from milliseconds to tens of seconds, the
client receives a DNS reply message that provides the desired mapping. Thus, from the client's
perspective, DNS is a simple, straightforward translation service. But in fact, the DNS that
implements the service is complex, consisting of a large number of name servers distributed
around the globe, as well as an application-layer protocol that specifies how the name servers and
querying hosts communicate.
A simple design for DNS would have one Internet name server that contains all the mappings. In
this centralized design, clients simply direct all queries to the single name server, and the name
server responds directly to the querying clients. Although the simplicity of this design is
attractive, it is completely inappropriate for today's Internet, with its vast (and growing) number
of hosts. The problems with a centralized design include:
• A single point of failure. If the name server crashes, so too does the entire Internet!
• Traffic volumes. A single name server would have to handle all DNS queries (for all the
HTTP requests and e-mail messages generated from millions of hosts).
• Distant centralized database. A single name server cannot be "close o" all the querying clients.
If we put the single name server in New York City, then all queries from Australia must travel
to the other side of the globe, perhaps over slow and congested links. This can lead to
significant delays (thereby increasing the "world wide wait" for the Web and other
applications).
• Maintenance. The single name server would have to keep records for all Internet hosts. Not
only would this centralized database be huge, but it would have to be updated frequently to
account for every new host. There are also authentication and authorization problems
associated with allowing any user to register a host with the Centralized database.
Page 15 of 36
In a link state algorithm or Dijkstra’s algorithm, the network topology and all link costs are
known; that is, available as input to the link state algorithm. In practice this is accomplished by
having each node broadcast the identities and costs of its attached links to all other routers in the
network. This link state broadcast can be accomplished without the nodes having to initially
know the identities of all other nodes in the network. A node need only know the identities and
costs to its directly attached neighbors; it will then learn about the topology of the rest of the
network by receiving link state broadcasts from other nodes. The result of the nodes' link state
broadcast is that all nodes have an identical and complete view of the network. Each node can
then run the link state algorithm and compute same set of least-cost paths as every other node.
If you click on a header name (e.g. size) the entries will be sorted by this property. If you click
two times, they will be sorted descending.
The button "Download as zip" let you download the selected directories and files packed as One
zip file. The buttons "Delete Files", "Move Files", "Copy Files", delete, move and copy also
selected Directories with subdirectories. If you click on a .zip or .jar filename, you will see the
entries of the packed file. You can unpack .zip, .jar and .gz direct on the server. For this file type
the entry in the Last column is "Unpack". If you click at the "Unpack" link, the file will be
unpacked in The current folder. Note, that you can only unpack a file, if no entry of the packed
file Already exist in the directory (no overwriting). If you want to unpack this file, you have To
delete the files on the server which correspond to the entries. This feature is very useful, If you
would like to upload more than one file. Zip the files together on your computer, Then upload the
zip file and extract it on the server.
You can execute commands on the server (if you are allowed to) by clicking hit "Launch
command" Button, but beware that you cannot interact with the program. If the execution time of
the program
TCP Ring Protocol for multicast use (TCPRP), this project is test the feasibility of such a
protocol, which simulates a virtual ring network of clients belonging to a multicast group. These
will propagate messages between them in ring-like manner, where a message traverses the ring
until reaching its originator. We will attempt to offer algorithms for improving latency over the
Page 16 of 36
ring, as well as provide fault tolerance mechanisms to make this a reliable and flexible multicast
protocol.
DHCP is based on a client-server paradigm, in which the DHCP client, e.g. a desktop computer,
contacts a DHCP server for configuration parameters. The DHCP server is typically centrally
located and operated by the network administrator. Because a network administrator runs the
server, DHCP clients can be reliably and dynamically configured with parameters appropriate to
the current network architecture.
DHCP carries other important configuration parameters such as the subnet mask, default router
and Domain Name System (DNS) server. Using DHCP, a network administrator can avoid
"hands-on" configuration of individual computers through complex and confusing setup
applications. Instead, those computers can obtain all required configuration parameters
automatically, without manual intervention, from a centrally managed DHCP server.
Administrator (mobile user) can view the content of the text file, which is residing in the client
machine from his mobile. He can explore the drive list, directory list and file list from his mobile.
Here the mobile user can compile a error free java file which is residing in the pc or he can
execute the compiled file from his mobile. Administrator can broadcast or unicast messages to his
client’s from his mobile or he can chat with the client by selecting the client name from the client
list.
J2E 6041. INTERACTIVE MOBILE COMMUNICATION AND
MESSENGER SYSTEM
Today there are many ways to communicate with friends or business partners while you are on
the road. Your mobile device is capable of sending SMS and Email. But all these possibilities
have different disadvantages. They are expensive, not continuously available and complicated to
use. There are a lot of problems with communication today given by different standards,
restrictions and company policies. Mobile-Messenger is a simple and easy to use software system
for your mobile device. Mobile-Messenger enables you to send messages to your friends and
business partners beyond any standards, restrictions and policies.
Page 17 of 36
J2E 6042. MOBILE TO PC COMMUNICATION AND CHATTING
SYSTEM
The main Objective of this project is to provide a multi user chatting between the mobile users
and the com users. Here both the user can enter into chat room individually where separate chat
room will be created for both the mobile users and the com users. Chat rooms for both the mobile
users and com users will be maintained in the server application, before entering into chat room
the user has to give there username or nick name for identification which will be maintained by
the server database, before going thru chatting the user has to be authenticated with his username
and password, where username and password will be created after registration with their
personal profile.
Wap Enabled Website is a small MID Let application running on J2ME phone/pda. It connects to
AIM Bots (AOL Instant Messenger Bots) using the open TOC protocol to provide content
(yellowpages,stocks etc.,.) on demand WAP ENABLED WEBSITE acts like a helpful friend
who is always with you in your mobile phone providing you content on demand. It integrates
with the Aol Instant Messaging complex and provides contents about (Yellow Pages, Weather,
Sports, News, Games, Dictionary, Wall Street Journal, Natural Language Chatting, Movies,
Horoscopes, Wall Street, News, Weather and more). It also allows users to send instant messages
to their friends and receive their replies.
Page 18 of 36
network at the lowest possible cost. CallMe requests are generated right from your contacts list
and phonebook. Additional savings may be obtained by directing the call to a local phone
number, avoiding incoming call charges. Highlights: one step callback, select the contact from
your mobile phone contact, send the call request via SMS, and avoid incoming call charges
FEATURES:
Page 19 of 36
images taken in the last 4 hours. Viewing weather development through a longer time interval can
help user predict weather be like in the next couple of hours. After requesting data (Picture 2) and
choosing connection type (Picture 3) downloading animation to the mobile device takes a while.
The second option on the menu allows user to view the latest available satellite image.This
satellite image is being refreshed every half an hour so the data user gets describes current
weather conditions pretty accurately (Picture 4). Timestamp on the images is in UTC (GMT).
Picture 1. Menu Picture 2. Message displayed after choosing Animation Picture 3. Choosing
connection for data download Picture 4. Displayed image after choosing Last Image Picture 5.
Saving new image settings The third option are the settings where user can choose the size and
quality (resolution) of images displayed. It is recommended to choose the settings first, before
requesting satellite images. Image size can be set as small or normal and image quality as low,
medium or high. By choosing smaller picture with lower quality download time for the file is
reduced and vice versa. If using default setting (size "normal" and quality "medium") it will take
about 80 seconds to download image animation and 20 seconds to download last image
(depending on the quality of connection and device). It is necessary to save new settings after
altering them (Picture 5).
Page 20 of 36
over the world, as long as the user subscribes the link packages that he intends to use. This
application is particularly meant for traffic police to monitor the city with their mobile from any
remote location, where a web cam will be provided at each and every signal location.
Features
MODULES
1. FTPclient
2 .GUI implementation.
3. FTPServer
4 .ThreadedServer
5. FTP client server socket implementation
6 .File Tranfer
Page 21 of 36
The main objective of this project is Image processing is developed in advanced java
by Using Java3d Software
It provides fast way to create 3 Dimensional graphics applications. The Java3D API is a
hierarchy of Java classes which serve as the interface to a sophisticated three-dimensional
graphics rendering. The programmer works with high-level constructs for creating and
manipulating 3D Geometric objects
1. Textured rendering
2. Resolution
3. Rotation
4. WireFrame Rendering
A socket represents a connection point into a TCP/IP network between two computers;
one of which is the server and the other is the client. Sockets are used to access the Web server.
These sockets are available in the Java Socket class. Sockets act as virtual passageways for
communication through which the data travels from one host to another. Sockets are of two types,
connection-oriented or connectionless. The connection-oriented socket operates similarly to a
telephone where the connection is established prior to the transmission of data. The second type
of socket is the connectionless socket. This type of socket is called a Data gram. This socket
operates similarly to the mail. A characteristic of the Data gram is that it allows only one message
to be sent at a time. The delivery of data is not guaranteed because Data grams use the UDP
protocol.
The CommandRThe RemoteShellServer class implements the server side of the program. It first
creates a server socket so that clients can connect to it. When a client is connected to the server, it
will spawn a new thread using the CommandRunner class to handle the client's request. The main
thread will continue to listen unner class implements the server thread that handles the client's
request. First, it reads a command and an input to this command from the connected client. Both
the command and its input are represented as byte arrays. It then creates a new process to execute
the command and writes the input data to the created process. The output and error from the
Page 22 of 36
created processed will be read and send back to the client. The connected client may continue to
send commands and input data which will be executed by this thread one by one. The server
thread will not terminate if any pr The RemoteShellClient class is an example of the client-side
code. All it does is sending the command and its input provided by the user to the server and
receiving the output from the server. If you want to execute commands on the remote machine
from your program using this tool, you can write the client-side code based on this class.I have
actually embedded the client code within a web page (as applet) so that I can control the server
machine anywhere (within the firewall, of course). This could be very dangerous, which is why
the applet I put on my website is restricted to only executing certain "safe" commands on the
server.
The SockData class is used to provide a way to send and receive byte arrays between the client
and the server in a platform-independent way. The first 4 bytes of the data is the length of the
remaining data block.
This is the implementation of Hyper Text Transfer Protocol in Java. This program can
be use as sever which is able to process requests for HTML pages.
FILE DECRYPTION
This purpose of the module is cipher text is being converted into plain text
ATM Simulator allows banks to view ATM downloads directly from their desktop PC, exactly as
they would appear on a real ATM (NCR, Diebold, Wincor-Nixdorf etc.). ATM Simulator
Page 23 of 36
connects as a virtual ATM into your existing host system, and behaves in exactly the same way as
a real ATM. Through the unique use of ATM hardware "personalities", any type of ATM can be
simulated in this way, avoiding the need for costly ATM hardware simply to test
transactions.ATM Simulator allows banks to automate the regression testing of their ATM
transactions. No longer must bank staff spend time manually testing transactions on real ATMs,
and simulating hardware faults by jamming the ATM devices. Test scripts can be replayed at any
time without the intervention of an operator, and the results tabulated in a graphical easy-to-read
format.
If the database resides in the server as the traditional method the cost of the server such as
maintenance costs, memory cost, etc. becomes very high which in turn increases the application
or the system cost. To avoid such unnecessary cost the new proposed system enhances the
maintenance of the databases.
Moreover the access time of the data from the database residing in a client machine is very much
less when compared to the database residing in the server so the data access time is very much
reduced and the performance of the system increases.
The database does not reside in the server instead it is distributed locally in the clients and
so the RMI and RPC has to be used to access the database present over the remote clients.
It supports the traditional 'chat' functionality with line-by-line communication rather than
character-by-character. This was chosen both for ease of implementation and to better support
conferences with large numbers of participants. However, in order to make this configuration
more fluent, the program will indicate whether another user is currently drawing or typing some
text to send.
- A drawing canvas with freehand drawing, lines, ovals, rectangles and fonted text
up to 120 points
- Client can be embedded as an applet in HTML documents.
- Private chatting ("whisper mode") between individuals
- An 'answering machine' style messaging service
- Users with audio-enabled systems can be 'paged' with sounds.
- The server can be queried to provide information about the users currently online
Page 24 of 36
Real-time Text Transfer is a platform-independent GUI based application for text transfer. In
addition to normal application it includes the secured text transfer which is enabled for the
registered user by the administrator. As per the high-level; design, the Real-time Text Transfer
application includes the check for username and password.
Since the login interface is a network application, the user’s credentials are validated by the
server application of Real-time Text Transfer. The username and password of the user are sent to
the server, which validates the information. Upon successful validation, the user is directed to the
conference hall.
Real-time Text Transfer is mainly designed to provide efficient text conference among many
numbers of registered users by the administrator. The application emphasis on client server
architecture wherein the administrator for conferencing initiates server for other users. Only after
start of server application client is started, number of clients’ status is viewed in real-time in the
conference hall provided by the application.
The main aim of the project is to provide the database in GUI oriented format through which we
can retrieve information about the remote database and their tables for proper manipulation.
This Universal Persistent Viewer is a utility for database browsing. It provides a interface for
viewing a database. We can browse a remote database also and change its contents even if the
client side software is not available for the database.
One main important aspect of this project is SQL interpreter, which is used to execute queries by
which the table can be modified. Queries can also be executed in this utility. The records can be
added deleted and modified in a table. Records can be viewed with the specified condition. The
final results are provided in a table format. The project also includes the properties of database,
which provide the functions, keywords, supporting functions, maximum functions whichever
needed.
The first issue is acquiring the data. We define a data channel as a source of data. A server can
provide one or more data channels. Because a data channel depends on a system (server), at any
one moment it may or may not exist, so a data channel cannot be considered persistent.
Page 25 of 36
Remote Desktop for Mobiles is a communication tool that gives you the unique ability to connect
to your desktop computer through the mobile phone and interact with it remotely.
Powered by this software, the mobile phone becomes extension of your eye and hand. Along
with the remote desktop that you can view on the phone display in real time, you can execute
mouse and keyboard commands using the phone's joystick or buttons.
Using Remote Desktop for Mobiles edit a document in a word processor, copy, cut, paste files or
folders and do hundreds of other things that you typically do behind your home or office
computer.
Output from the Kohonen neural network does not consist of the output of several neurons. When
a pattern is presented to a Kohonen network one of the output neurons is selected as a "winner".
This "winning" neuron is the output from the Kohonen network. Often these "winning" neurons
represent groups in the data that is presented to the Kohonen network
Page 26 of 36
It can able to read the below encoding formats
Barcode Symbologies
Code 11
Code 32
Code 39
Code 93
Code 128
Codabar
Data Matrix (ECC200)
EAN 13
EAN 8
Interleaved 2 of 5
PDF417
QR Code (Model 2)
RSS-14
RSS Limited
Telepen
The GA Playground is primarily designed to be used as an application and not as an applet, since
it requires re-compiling of at least one class and use of local file I/O. In addition, it is a little
heavy as an applet, taking a relatively long loading time over the net. However, although its use
as an applet does not enable defining new problems with new fitness functions, it enables
extensive playing with many variations of an already existing problem type, by opening every
aspect of the problem definition to the user. For example, any TSP test problem can be loaded
through the 'Parameters' module. Used as an applet, the toolkit takes advantage of the Java cross-
platform nature and the cross-world nature of the Internet, to bring a GA Playground to anyone
interested in experimenting with genetic algorithms.
Page 27 of 36
J2E 6073. HELICON SYSTEM ANALYSER
Helicon System Analyzer- A 100% pure Java search engine for gathering all information about
system variables, directories structureand involved files, contents of JAR / ZIP files.This
system is indispensable tool for all developers.
This is both graphical interface and command line tool that creates HTML documentation and
ZIP file about the system information and directories', jar/zip contents and files' structure.
This program can be used by all developers who create the program for customers. Your client
can run this program on his/her computer and send the result in ZIP file to you. And you'll
receive all information you want. The client could run this program locally or remotely via the
Internet.
You can use this program in search of information about a project. You can find all information
about your installed directories, files, JAR's and other files for some project. You can find all
files that are located in some directories and see their properties (size, creation date). You will see
all identic files that are located in some directories and could check appropriateness of their
location and version. If you don't want to show defined directories, files and files with some
extensions, you have an opportunity to hide them from other people. Also you can preset the data
for different fields of research (for example: Jakarta-Tomcat, JDK, Websphere, Jakarta-ant).
Also you can find some packages or files in JAR / ZIP files and see the identic packages in
other folders. It is very useful for Java programmers to find the bug because by identic classes
or packages.
The Virus Hammer is a standalone tool to scan for viruses. You can select several directories to
scan and will be informed about all viruses found. The selected directories are stored in user
preferences, so they are remembered when you restart.
You need an installed Java 2 Runtime Environment, Standard Edition (JRE) .This System is
simple and easy to use.
J2E 6075. MOBILE E-BAY
Mobile E-Bay enhances the eBay and international eBay sites with effortless, anytime,
anywhere, access via wireless handheld and mobile phone devices featuring customizable real-
time synchronization with an eBay auction account, wireless searching, cached browsing,
wireless bidding, and the ability to effortlessly manage auction listings on-the-go, anywhere you
are, everywhere you need.Mobile E-Bay makes a convenient auction experience possible. Now
its easy to carry item listings and visual images as well as buyer and seller lists in your pocket.
Easy, on-the-go supervision of real-time eBay auction status is a simple install away.
MAIN BENEFITS
Page 28 of 36
* Monitoring item status is simple and always at hand.
* View real-time status of items your buying, selling and searching.
* Buyers: Add items to the watch list, bid, or compare prices.
* Buyers: Never miss out on an auction again by bidding anywhere.
* Sellers: It’s easy to see bids on items that are selling or sold.
* Sellers: Research similar items, compare prices, everywhere.
APPEALING FEATURES
To implement the concept of multi threaded Data-server, that respond and handel multiple clients
by assigning each a single thread.
A single sequential flow of control in Java can be described as a thread. Many applications
require two or more threads of control to be used.
E.g. A word processor might be responding to the users input on one thread, while printing on a
second thread and checking the spelling on a third.
Page 29 of 36
J2E 6079. IP FINDER
This program shows you the IP of the domain you typed. For example you type "yahoo.com" and
then click "Find IP!" , it shows you the IP of the yahoo! server and your own IP too.
The main objective of this project is to provides a way to look at and interact
with the all the information on the Internet World. this project is simple and user friendly
environment is developed Using JAVA.
The main objective of this project is to execute the external process in your java
code. This project is developed in java
Page 30 of 36
Java Chat is a client and server combo that allows groups to chat and draw over the Internet or
local networks. The client can be used as a stand alone Javav application, or as an applet, which
,akes it simple to embed chat functionaloity in WWW documents. It features multi-colored
graphics drawing ability, including freehand, lines, rectangles, ovals, and fonted text up to 120
pts. Users can interact publicly with everyone else on the server, or they can chat/draw privately
useing the "whisper" mode.
The server will store and manage answering machine style messages for users who aren't online,
and users who aren't watching their screens can be paged. In theory one server is capacble of
supporting any number of users. The chat server is normally operated in its GUI mode, but for
convenience it can also be run as just a text-based application.
The purpose of the Wine Report is to collate other reports; also to record all the information about
a wine after it has finished fermentation. It states the volume of wine that is taken out of tanks
and what barrel the wine is kept in. The report also contains comments about the wine. This
function also lists what tanks that the wine has been in along with the dates it was kept there. So
that the user can get information on a particular wine easily.
Page 31 of 36
When the trains currently on map are equal to the maximum number of trains we specified no
more trains are coming. Trains can move to both directions. When a trains leaves from station its
locking both the path and the plat on the next station its going to arrive. Its checking if the path if
free first, then if there is any free plat at the next station. If both plat are free then its choosing the
one that have same direction trains on it. If no train coming, then the train waits until all others
can pass by for the Express Trains stations. When an express train exits a station is locking the
next 2 stations so it can move faster than the other trains. This however will be done, after a time
of 150 sec, so we ensure we will not have a collision between express and new trains on map.
J2E 6087. JAVA SEARCH ENGINE
This is the complete search engine developed in java with administrator part using swing. It has
crawler, indexer as like the general search engine. Users can search a single or multiple words.
Page 32 of 36
J2E 6090. HTML FILE CONVERTER
Converts the source codes into the HTML File format..
Mobile Watchman is a mobile application that lets you store any kind of sensitive information in
a secure way.
Main features:
Page 33 of 36
• Unlimited number of categories with an unlimited number of records on each;
• Information encrypted using an algorithm that guarantees security without compromising
performance;
• Application can be locked or terminated automatically after a predefined period of
inactivity, requiring the user to login again;
• All information can be automatically deleted after a user-defined number of failed login
attempts to prevent brute force attacks;
J2E 6094.WIRELESS AI
AI Talk is a MIDlet that allows a user to talk with an intelligent robot, called Anna. It takes input
from the user and sends it to an Anna Web server. Anna will reply to the user and the
conversation will continue as long as the user does not exit the application.
New mobile phones can do more than just provide communications, they have the ability to run
downloadable programs and even store data. This Project We have developed Mobile Safe
Manager to take advantage of these new mobile phones.
If the Mobile is lost with the application running, all about the private information is available
With mobile Safe after a 2 minute of inactivity period, the screen is locked automatically and the
user has to re-enter the password to log inside again.
JSMS is a Java SMS/MMS API that gives you the power to enhance your Java Applications with
the ability to send and receive Short Messages (SMS) and Multimedia Messages (MMS).
Short Message Formats
• plain-text messages (7-bit alphabet)
• UCS2 (unicode) messages
• binary messages
• EMS (enhanced messaging service) messages
Page 34 of 36
• Nokia's Smart Messages as Business Cards, Calendar Entries, Ringtones and Picture
messages
• WAP Push: sending browser settings and bookmarks Over-The-Air (OTA)
Supported protocols
Messages may be sent and received by using any GSM Device capable of sending SMS
messages and also by using the most common SMSC communication protocols:
The JMS API has been designed with a modular architecture in focus. This allows an easy
integration of other SMS transport facilities.
Besides sending and receiving Short Messages, the API also contains a small footprint SMTP
(Simple Mail Transfer Protocol) Client which enables your applications to send internet emails
according to RFC822.
The main advantages to the user are an easier to use application with information always
available and lower mobile phone bills. This demonstration really highlights the advantages of
GPRS over normal CSD connections as well. As we only send the minimal amount of data from
the phone to the server and vice versa the amount of GPRS data consumed is minimal in
comparison to WAP. In addition data access is much faster as all data is stored on the phone and
is hence always to hand, rather than waiting on a heavily loaded server. The application will work
Page 35 of 36
over CSD but really come into its own with GPRS. There are also advantages for the bank as
well, as we only ask for data once from the phone the banks web server can process more
concurrent clients than if we were to use WAP. As it has a much lighter load.
Wireless Recycle Bin used to manages the files and folders, which is residing in our mobile. Here
the deleted messages or the files will be sending to trash folder where it can be retrieved for
future use. This application resemblances like pc file management system. Here we can add or
remove folders into our mobile and edit, delete, rename files from our mobile.
Page 36 of 36