MCA, Btech Project with source code in Advance Java


     
      6 MONTHS JAVA TRAINING is very popular course at SainiTechnologies. This course has the perfect mix of contents to prepare the participants to become a Java developer or programmer. Equipped with Java Training from SainiTechnologies will open a flood gates of opportunities for the participants. The major reasons are the technology itself and the course content. JAVA is used for developing web based and non-web based application and even for programming for mobiles. This makes it a very powerful and sought after technology. Therefore, there is lot of demand for qualified professionals in the field. The JAVA IN 6 MONTHS course at SainiTechnologies prepares the participants to leverage this demand by making them conceptually and practically strong in the technology. This course in SainiTechnologies is designed by industry veterans with a goal to make the learners industry ready. Therefore, along with theory, there are lots of examples and lab exercises for the students to apply their knowledge practically. The participants would get to develop a stand - alone application in Java which includes problem definition, requirements analysis, system design, Java coding and testing. Learning the course doesn't have any prerequisite. The aim of the course is to make the participants would be very strong on basics of Java language and its application as Object Oriented Programming Language (OOPs). Post the course, with this strong foundation in course the participants can opt to do take up job and/or upgrade knowledge learning advanced Java technologies.
Following Project may be downloaded for future references
Android Device Security & Remoting 76
MySQL
Buy
Best Price: Rs. 7000
Price: 10000 (100 %)
1. Permission Scanner: All Apps will be secured with the Pin No. so that any remote user attempt will failed to open the App. In this Module Permission scanner scans permission for all the installed application, for that, it need to get the list of all the installed application. We can access all installed App from the appList stores after that for each item in the list permission are fetched and the details for these permissions. With each installed application an indication is displayed to show the danger level for that app and user could uninstall the application by long pressing on the name.
2. Settings Checker :Some time user enable the USB Debugging and Application install from unknown sources that may leads to get Android phone tempered by the hacker or any other Service and unsecured App to fix this problem system have a module to for setting Checker. Settings Checker scans the Device's settings, using the Settings. Secure API provided by Android. It can be used to fetch settings for different parameters, check if USB Debugging is enabled, similarly if Application install from unknown sources is permitted. Settings Checker also has a background service, implemented using Android's Alarm Manager class, which performs automated checks at regular time intervals. By default, the interval is set to 1 Day. It can be changed in the settings to a Week, Fortnight or a Month. if the service scans and finds that any of the setting is not set to its optimal value, it fires a notification. Upon clicking this notification, the user is taken to the Settings Checker fragment, wherein he can fix the respective settings.
. Broadcast Receivers: The broadcast receivers are used to keep check on the malicious activities, for example unaware message sending, premium calls, execution of harmful USSDs etc. These Broadcast receiver includes a. Call Recepter b. SMS Recepter c. Outgoing SMS Recepter a. Call Recepter: is used to intercept incoming and outgoing calls. Every call that is placed by any application is passed through this receiver and then it checks if the called number meets the requirement set by the user i.e. if the number is saved in users contact details or is not present in the user’s blacklist. User could access the preferences regarding call blocker in the settings. Any call not meeting the requirement is logged in the Call logs and is shown in the blocker logs, with the reason for the blocking. b. SMS Recepter: It does pretty much the same but with messages. The receiver can only handle received messages, for outgoing messages another service is used because the Android mechanism for outgoing SMSs are different. In case of calls the calls could be blocked or cancelled but for messages its different and specially with outgoing messages. There is no way yet known which could be used to alter the content of outgoing messages, or better block them. The Incoming SMS are deemed malicious and is reported to the user, if the message content contains numbers that are not saved in the contact list of user. c. Outgoing SMS Recepter: checks if the outgoing SMS is sent by the user of if the message is sent by some other application. If latter is true a notification is generated giving the application name which sent the message, also the content of the message it sent
7. Smart Alarm According to Geo-Fencing : Geo-fencing is the most resource intensive service, it controls the device lock, and wiping of data. Moreover, it asks you to enable GPS for better location tracking. The class that does most of the work is GPS Tracker class, this class gets the current device location from the GPS or network provider whichever is available. Using the location Geo Fencing service keeps track of the device, if it is still inside the virtual fence or moved out of it. After the service is started the location is queried every 10 seconds. That’s not too much battery draining but also not losing the timely location tracking that’s needed. When Smart phone is stolen and make start from remote location using the Geo Fencing device location the App will determined that is device found to be out of the fence, it checks the location 3 more times and when it confirms the phone is out of the fence, it activates the alarming sound using Alarm Manager. Similarly, current location is sent to a secure number set by user enables the feature. As this service requires a working GPS, a prompt is made if GPS is unavailable and unless user enables the GPS the service is inaccessible. A secure number is required to enable the service to get location and Device Administrator privilege is also must. 8. Remote Lock / Wipe: When the smart device is stolen then it is most urgent to lock and wipe the users most important data. To overcome this problem we user the Geo-fencing that requires user to enable the service first but if the user forgets to enable the service he could still lock or wipe data of his phone using remote wipe. Remote wipe uses the same locking mechanism of Device Policy Manager. It uses the same broadcast receiver created for received SMSs. The receiver checks the message for the secret code set by the user, if the message contains the secret code, it activates the remote services and locks the device and if enabled wipes the user data from the device. For sending current location, current location is fetched using GPS Tracker, and using SMS Manager API a SMS is sent to the secure number that user believes could be reached in case the user’s device is stolen. The secret code is stored in application preferences which is retrieved each time is a new message is received to check if the message contains the secret code.
View More
Project working video
Advanced Remote Admin tool for Android 75
MySQL
Buy
Best Price: Rs. 7000
Price: 10000 (100 %)
• Access the contacts of remote android (and all theirs informations) • Access the call logs of user when and whom they have the mobile users.
• Read and Access all messages stored in the smart device. • Track the Location by GPS/Network • Message Tracking : When user received the message it may be access instantly
• Monitoring phone state in live (call received, call sent, call missed.) • Remotely Take a picture from the camera • Stream sound from microphone (or other sources..)
• Streaming video (for activity based client only) • Send a text message • Give call • Open an URL in the default browser • Do vibrate the phone
View More
Project working video
Smart Device Camera Surveillance using Camera vision JAVA & Android 74
MySQL
Buy
Best Price: Rs. 7000
Price: 10000 (100 %)
1. Smart Device Camera Vision: An Android App where user set the connection string to connect with the desktop/ Laptop and to Start the Android device Camera. 2. Fingerprint Authentication : User finger print will be used to authenticate the user to login into the system. Additionally it provides the possibility to encrypt/decrypt data with the users fingerprint. This can be used to easily encrypt user passwords that can be decrypted again later when the user authenticates with their fingerprint. To implement this RxJava will be used.
3. Auto Update of App : Without user interaction the app will be Automatic update to make future enhancement or install new features into the existing system. 4. Admin DashBoard: A Dashboard will be developed where admin can view the live streaming captured from the android device. Here Admin can set the Single camera monitoring as well as multi camera monitoring also. Admin Also take the picture from the running camera and save the picture as per requirements. Object Tracking will be done when camera find some movement in front of the camera. Further Admin can set the movement % in the system.
5. Multiple Monitoring : Admin can view the multiple video streaming from multiple Smart Device. 6. Auto Video Shifting : In one time only one camera video streaming will be view in full screen mode , here admin can set shifting of Camera video streaming one by one and view all camera video Streaming. 7. Image Capture : Admin can take the image capture from the running video streaming and can save the image into the system. 8. Auto Image Capture : Admin can set the auto Image Capture where object found in the front of the camera and automatically save into the system. 9. Auto Upload: Capture video and Picture will be automatically uploaded into the YouTube and other Social Media Network.
10. Reports: Daily, Monthly Report generated by the system will be generated into the Graph and Text format also. 11. Notification: When system will find any type of movement into the system it will send the notification to the registered Phone No. and Email address with Photograph so that immediate action will be taken by the owner of the house and any Shop Owner. 12. Alarm & alert: System will bloat and sound alarm when systems find wrong movement into the system. 13. Social Media: System will be used to send and the incident photo graph when it detect the hi speed internet.
View More
Project working video