Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and...

62
IEEE 2015- 2016 PROJECTS Technology: JAVA(J2SE & J2EE) S. No PROJECT TITLES 1 Context-Based Diversification for Keyword Queries over XML Data 2 Malware Propagation in Large-Scale Networks 3 On Summarization and Timeline Generation for Evolutionary Tweet Streams 4 Progressive Duplicate Detection 5 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 6 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 7 Towards Effective Bug Triage with Software Data Reduction 8 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 9 A Proximity-Aware Interest-Clustered P2P File Sharing System 10 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 11 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks 12 User-Defined Privacy Grid System for Continuous Location-Based Services 13 A Computational Dynamic Trust Model for User Authorization [1]

Transcript of Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and...

Page 1: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

IEEE 2015-2016 PROJECTS Technology: JAVA(J2SE & J2EE)

S. No

PROJECT TITLES

1 Context-Based Diversification for Keyword Queries over XML Data

2 Malware Propagation in Large-Scale Networks 3 On Summarization and Timeline Generation for

Evolutionary Tweet Streams 4 Progressive Duplicate Detection 5 Reverse Nearest Neighbors in Unsupervised

Distance-Based Outlier Detection

6Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services

7 Towards Effective Bug Triage with Software Data Reduction

8 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

9 A Proximity-Aware Interest-Clustered P2P File Sharing System

10Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

11Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks

12 User-Defined Privacy Grid System for Continuous Location-Based Services

13 A Computational Dynamic Trust Model for User Authorization

14A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

15 Continuous and Transparent User Identity Verification for Secure Internet Services

16 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts

17 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks

[1]

Page 2: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

18 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

19Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

20 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers

21 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

22 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

23 Secure Distributed Deduplication Systems with Improved Reliability

24A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations

25 Effective Key Management in Dynamic Wireless Sensor Networks

26 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter

27 An Attribute-Assisted Reranking Model for Web Image Search

28 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

29 Learning to Rank Image Tags With Limited Training Examples

30Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

31 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

32A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services

33Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

34 Detecting Malicious Face book Applications35 Key Updating for Leakage Resiliency with

Application to AES Modes of Operation36 Security-Evaluation-Of-Pattern-Classifiers-Under-

Attack37 Facilitating-Document-Annotation-Using-Content-

And-Querying-Value

[2]

Page 3: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

38 Securing-Broker-Less-Publishsubscribe-Systems-Using-Identity-Based-Encryption

39 Fast-Nearest-Neighbor-Search-With-Keywords40 Traffic-Pattern-Based-Content-Leakage-Detection-

For-Trusted-Content-Delivery-Networks41 Top-K-Query-Result-Completeness-Verification-In-

Tiered-Sensor-Networks42 Optimal Distributed Malware Defense in Mobile

Networks with Heterogeneous Devices43 Efficient and Privacy-Aware Data Aggregation in

Mobile Sensing44 SOS: A Distributed Mobile Q&A System Based on

Social Networks45 Towards Online Shortest Path Computation46 Boundary Cutting for Packet Classification

47 An Incentive Framework for Cellular Traffic Offloading

48 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data

49 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

50 Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks

51 Detection And Localization Of Multiple Spoofing52 EAACK—A Secure Intrusion-Detection System For

Manets53 Vampire Attacks Draining Life From Wireless54 Mobile Relay Configuration in Data-Intensive

Wireless Sensor Networks55 Multiparty Access Control for Online Social

Networks Model and Mechanisms56 Cooperative-Caching-For-Efficient-Data-Access-In-

Disruption-Tolerant-Networks57 Cost-Effective-Resource-Allocation-Of-Overlay-

Routing-Relay-Nodes58 A Scalable Server Architecture For Mobile Presence

Services InJAVA ANDROID PROJECTS

ENVIRONMENT DETAILS:ANDROID,SQLITES. No PROJECT TITLES1 A Location- and Diversity-aware News Feed System

[3]

Page 4: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

for Mobile Users 2 Context-Based Access Control Systems for Mobile

Devices3 Cooperative Positioning and Tracking in Disruption

Tolerant Networks4 CWC: A Distributed Computing Infrastructure Using

Smartphone’s5 Energy-Efficient Fault-Tolerant Data Storage and

Processing in Mobile6 Your Journey: Considering Signal Strength and

Fluctuation in Location-Based Applications7 Privacy-Preserving Relative Location Based

Services for Mobile Users8 The Impact of API Change- and Fault-Proneness on

the User Ratings of Android Apps9 Time-and-Energy-Aware Computation Offloading in

Handheld Devices to Coprocessors and Clouds10 User Privacy and Data Trustworthiness in Mobile

Crowd Sensing11 User-Defined Privacy Grid System for Continuous

Location-Based Services12 Effective Risk Communication for Android Apps13 Catch Me If You Can: Evaluating Android Anti-

Malware Against Transformation Attacks14 Meet You – Social Networking on Android15 MOSES: Supporting and Enforcing Security Profiles

on Smart phones16 T-Drive: Enhancing Driving Directions with Taxi

Drivers’ IntelligenceCLOUD COMPUTING

Technology:JAVA,J2EE&MYSQLS. No PROJECT TITLES

1 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

2 A Secure and Dynamic Multi-keyword Ranked Search Scheme

3 Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

4 Audit-Free Cloud Storage via Deniable Attribute-based Encryption

5Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

[4]

Page 5: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

6 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

7 Identity-Based Encryption with Outsourced Revocation in Cloud Computing

8 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

9 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

10 Decentralized-Access-Control-With-Anonymous-Authentication-Of-Data-Stored-In-Clouds

11 Distributed--Concurrent--And-Independent-Access-To-Encrypted-Cloud-Databases

12 Scalable-Distributed-Service-Integrity-Attestation-For-Software-As-A-Service-Clouds

13 A-Hybrid-Cloud-Approach-For-Secure-Authorized-Deduplication

14 Oruta-Privacy-Preserving-Public-Auditing-For-Shared-Data-In-The-Cloud

15A-Stochastic-Model-To-Investigate-Data-Center-Performance-And-Qos-In-Iaas-Cloud-Computing-Systems

16 Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization

17 Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud

18 Cloud A Framework Of Adaptive Mobile Video Streaming And Efficient Social Video Sharing In

19 Cloudmov Cloud-Based Mobile Social TV WEB APPLICATIONS

Technology: JAVA J2EE,TOMCAT,ORACLES. No PROJECT TITLES1 An-efficient-Mailing-System-for-Detecting-Spam-

Mails2 Annotating-Search-Results-from-Web-Databases3 A-Secure-Cloud-server-System-using-Proxy-Re-

Encryption-Model4 Attribute-based-Encryption-System-for-Secured-

Data-Storage5 Automatic-Testing-System-for-Web-Application6 Generalized-Flow-Based-Method-for-Analysis-of-

Implicit-Relationships-on-Wikipedia7 Automated e-government certificates

[5]

Page 6: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

8 Friend book: A Semantic-based Friend Recommendation System for Social Networks

9 QOS: Ranking Prediction For Cloud Services10 Fully Anonymous Profile Matching In Mobile Social11 Collaboration in Multi cloud Computing

Environment12 A Cocktail Approach for Travel Package

Recommendation13 Web Based Framework of Project Performance and

Control system14 Validation of Code Words Through Images15 Student Project Allocation and Mgmt system16 Secrecy protecting account for Data Storage

Security17 The Mobile Agent Based service software in

Internet Environment18 Going Back and Fourth efficient Multi Deployment

and Multi snapshot19 E-Banking20 Credit Card Fiddles21 Database Elasticity22 Management of Vitality Cards23 Standing Spatial Information24 E-Housing25 News Bulletin System26 Loan Lending26 Venue Maintenance System27 Medical Allowances Controlling System28 Internet Protocol Television System29 AMES30 CAM31 Secure Data Sharing for multi owners32 Online Itemization Section33 Disburse Mobile Scheme34 Motel Resource Tool35 Credit Card Fiddles36 E-Counseling37 Mobile Presence Server

[6]

Page 7: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

38 Loan Lending39 VISA Dispensing System40 Resource Management System41 Jellybean Maneuvering Appropriation And

Conclave

2015-2016 IEEE PROJECTS Technology: DOTNETS. No PROJECT TITLES

01 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites.

02 Discovery of Ranking Fraud for Mobile Apps.03 Query Aware Determinization of Uncertain Objects.04 Collision Tolerant and Collision Free Packet

Scheduling for Underwater Acoustic Localization.05 Defeating Jamming With the Power of Silence: A

Game-Theoretic Analysis.06 Universal Network Coding-Based Opportunistic

Routing for Unicast.07 A Distributed Three-hop Routing Protocol to

Increase the Capacity of Hybrid Wireless Networks.

[7]

Page 8: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

08Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks.

09Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks.

10Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems.

11 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.

12 An Attribute-Assisted Reranking Model for Web Image Search.

13 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images.

14 Detection and Rectification of Distorted Fingerprints.

15 Learning Fingerprint Reconstruction: From Minutiae to Image.

16 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation.

17 An Empirical Performance Evaluation of Relational Keyword Search Techniques.

18 Supporting Privacy Protection in Personalized Web Search.

19 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality.

20 Typicality-Based Collaborative Filtering Recommendation.

21 Secure Mining of Association Rules in Horizontally Distributed Databases.

22 Product Aspect Ranking and its Applications.23 Secure Data Retrieval for Decentralized Disruption-

Tolerant Military Network.24 Autonomous Mobile Mesh Networks.25 The Target Tracking in Mobile Sensor Networks.26 Certificate less Remote Anonymous Authentication

Scheme for Wireless Body Area Networks.27 Secure and Efficient Data Transmission for Cluster-

Based Wireless Sensor Networks.28 Multicast capacity in MANET with Infrastructure

Support.29 Content Caching and Scheduling in Wireless

Networks with Elastic and Inelastic Traffic.

[8]

Page 9: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

30 Preserving Location Privacy in Geo social Applications.

31 Privacy Preserving Data Sharing With Anonymous ID Assignment.

32 A cocktail approach for travel package recommendation.

33 Efficient Data Query in Intermittently-Connected Mobile Ad hoc Social Networks.

34 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.

35 Optimal content downloading in Vehicular Network.

36Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing.

37 Topology control in mobile ad hoc networks.38 The Three-Tier Security Scheme in Wireless

Sensor Networks with Mobile Sinks.39 Network Assisted Mobile Computing with Optimal

Uplink Query Processing.40 Characterizing the Efficacy of the NRL Network

Pump in Mitigating Covert Timing Channels.41 Jamming-Aware Traffic Allocation for Multiple-Path

Routing Using Portfolio Selection.CLOUD COMPUTING

01 Cloud-Based Multimedia Content Protection System.02 Control Cloud Data Access Privilege and Anonymity

with Fully Anonymous Attribute-Based Encryption.03 Cost-Minimizing Dynamic Migration of Content

Distribution Services into Hybrid Clouds.

04Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.

05 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem.

06 Identity-Based Distributed Provable Data Possession in Multicloud Storage.

07 PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing .

08 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers.

09 Key-Aggregate Cryptosystem for Scalable Data

[9]

Page 10: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Sharing in Cloud Storage.10 Decentralized Access Control with Anonymous

Authentication of Data Stored in Clouds.11 Scalable Distributed Service Integrity Attestation for

Software-as-a-Service Clouds.12 Privacy-Preserving Multi-Keyword Ranked Search

over Encrypted Cloud Data.13 Distributed, Concurrent, and Independent Access to

Encrypted Cloud Data.14 Scalable and Secure Sharing of Personal Health

Records in Cloud Computing Using Attribute-Based Encryption.

15 Privacy-Preserving Public Auditing for Secure Cloud Storage in Public Clouds.

16 Balancing Performance, Accuracy and Precision for Secure Cloud Transactions.

WEB APPLICATIONS

01 User-Query-Dependent Ranking For Web Databases.02 Data Storage security in cloud computing.03 Error Tracking System.04 Expert answer.05 Efficient Computation of Range Aggregates against

uncertain location based queries.06 Exploring Application-Level Semantics for Data

Compression.07 Exploiting Dynamic Resource Allocation for Efficient

Parallel Data Processing in the Cloud.08 Improving Aggregate Recommendation Diversity

Using Ranking-Based Techniques.09 Vulnerability analysis in SOA-based business

processes.10 Asset boutique.11 Monitoring Service Systems from a Language-Action

Perspective.12 CAM: Cloud-Assisted Privacy Preserving Mobile

Health Monitoring.13 MONA: Secure Multi-Owner Data Sharing for

Dynamic Groups in the Clouds.14 Consistency as a Service: Auditing Cloud

Consistency.15 A system to filter unwanted messages from OSN

user walls.16 Web Information Gathering Based on Ontology

[10]

Page 11: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

model.17 Collective Behavior of Scalable learning.18 Go-Between Socially-Enhanced Virtual Communities.19 A Gen2-based RFID Authentication Protocol for

Security and Privacy.20 Monitoring System.21 Online Art Gallery.22 Gateway Accessory.23 E-voting.24 Internet File Sharing.25 Cybernetics protector.26 Scalable record linkage and deduplication.27 Garbage Collection System.28 Commodity Sustenance.29 Affluence Management.30 Global Warning System.31 Blog Application.32 Go-Vegetarian.33 Online Classifieds.34 Municipal Administration system.35 Online Advertise.36 Cab Services.

37 Census.38 Orphan Management System.39 Vessel Consignment.40 Genco Mailing System.41 Village morphogenesis.42 Ranking Model Adaptation for Domain-Specific

Search.43 Query Planning for Continuous Aggregation Queries

over a Network of Data Aggregators.44 Bridging Socially-Enhanced Virtual Communities.

[11]

Page 12: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

2015-16 PROJECTS Technology: Embedded SystemS.NO PROJECT TITLES01 ARM Platform For Vehicular Monitoring And Tracking.02 Advance question paper leakage control system

design.03 GPS Based Asset/Vehicle/Animal/Child Tracking

System.04 Automatic Power Meter Reading Using GSM Network.05 Advance home security for intruder detection with

auto paging/dialing.06 Wireless remote and status enquiry for smart

industries.07 Vehicle ignition security with dynamic password

generation.08 Emergency alert for women safety with location

tracking.09 E-VOTING system to avoid anti rigging.10 A proposed system for advance security and

automation in metro trains to prevent accidents.11 Advance home security for intruder detection with

auto paging/dialing.12 Microcontroller based customizable wireless sensor

node to detect hazardous gas pipeline leakage.13 Real time vehicle parameter monitoring with

continuously tracking of a VIP VEHICLE.14 Real-time control system for air pollution detection

in vehicles.15 Human health monitoring mobile phone application

by using embedded system.16 Electronic service provider with billing .17 RFID AND ZIGBEE based manufacturing monitoring

system

18The design and implementation of intelligent campus security tracking system based on RFID and ZIGBEE.

19 RFID and GSM based intelligent courier mailbox system.

20 RFID remote parent care.

[12]

Page 13: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

21 RFID assisted navigation systems in public vehicles22 Universal remote control with haptic interface23 Construction of microcontroller based touch screen

mobile phone with password protected features24 Modern prepaid energy system25 E-MEDICAL emergency for patients26 Smart pad for examination27 E-WALLET system for salary payment of employs28 Employee login and logout management system29 High secured data exchange with encryption30 Smart remote control system of high efficiency and

Intelligent street lighting31 Economical fully centralized system in building

automation with wireless sensor networks32 Smart remote control system of high efficiency and

intelligent street lighting

33Green home energy management system through comparison of energy usage between the same kinds of home appliances

34 live bus stops and modern buses technology35 Automatic parking guidance with prepaid car parking36 Traffic congestion control with automatic signal

clearance37 Perpetual and low-cost power meter for monitoring

residential and industrial appliances38 Smart back pack for visually impaired person 39 Multi-patient health monitoring system for corporate

hospitals40 Design of sphygmus data acquisition platform 41 College bus information to students 42 Intelligent street light automation with illumination

control43 The remote control of mobile robot based on

embedded technology44 A multipurpose robot for military45 Ultrasonic spectacles and waist-belt for visually

impaired and blind person46 Vehicle accident avoidance with road adverse

conditions monitoring47 A safety system for mine workers in heavy industries

PROJECTS Technology: MATLAB2015-2016

IEEE PROJECTS

[13]

Page 14: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

S. No PROJECT TITLES1

A Feature-Enriched Completely Blind Image Quality Evaluator

2A No-Reference Texture Regularity Metric Based on Visual Saliency

3A Probabilistic Approach for Color Correction in ImageMosaicking Applications

4Boundary Detection Using Double-Opponency and Spatial Sparseness Constraint

5Combining Left and Right Palm print Images for More Accurate Personal Identification

6Face Recognition across Non-Uniform Motion Blur, Illumination, and Pose

7Face Sketch Synthesis via Sparse Representation-Based Greedy Search

8Fractal Analysis for Reduced Reference Image QualityAssessment

9Image Denoising by Exploring External and Internal Correlations

10Image Super-Resolution Based on Structure-Modulated Sparse Representation

11Multifocal Image Fusion Based on NSCT and Focused Area Detection

12 Pareto-Depth for Multiple-Query Image Retrieval13

Revealing the Trace of High-Quality JPEG Compression through Quantization Noise Analysis

14Reversible Image Data Hiding with Contrast Enhancement

15Robust Representation and Recognition of Facial Emotions Using Extreme Sparse Learning

16 Steganography Using Reversible Texture Synthesis17

Variable-Length Signature for Near-Duplicate Image Matching

18A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations

19An Efficient Parallel Approach for Sclera Vein Recognition

20BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification

21 Designing an Efficient Image Encryption-Then Compression System via Prediction Error Clustering

[14]

Page 15: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

and Random Permutation22 Digital Image Sharing by Diverse Image Media23

Dual-Geometric Neighbor Embedding for Image Super Resolution With Sparse Tensor

24Exposing Digital Image Forgeries by Illumination ColorClassification

25Fingerprint Compression Based on Sparse Representation

26Hyperspectral Image Classification Through Bilayer Graph-Based Learning

27Images as Occlusions of Textures: A Framework for Segmentation

28Low-Rank Neighbor Embedding for Single Image Super-Resolution

29Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation

30Phase-Based Binarization of Ancient Document Images: Model and Applications

31Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A Unified Framework

32Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration

33 A Unified Data Embedding and Scrambling Method

34 Characterness: An Indicator of Text in the Wild

PROJECTS Technology: VLSI2015-2016

IEEE PROJECTSS. No PROJECT TITLES

01 A Combined SDC-SDF Architecture for Normal I/O

[15]

Page 16: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Pipelined Radix-2 FFT

02A High-Performance FIR Filter Architecture for Fixed andReconfigurable Applications

03 A High-Speed FPGA Implementation of an RSD-Based ECC Processor

04 Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic

05 An Accuracy-Adjustment Fixed-Width Booth Multiplier Based on Multilevel Conditional Probability

06An Efficient Constant Multiplier Architecture Based on Vertical-Horizontal Binary Common Sub-expression Elimination Algorithm for Reconfigurable FIR Filter Synthesis

07An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multi-standard DUC

08Array-Based Approximate Arithmetic Computing: A General Model and Applications to Multiplier and Squarer Design

09 Design of Self-Timed Reconfigurable Controllers for Parallel Synchronization via Wagging

10Exact and Approximate Algorithms for the Filter DesignOptimization Problem

11 Fault Tolerant Parallel Filters Based on Error Correction Codes

12Graph-Based Transistor Network Generation Method forSupergate Design

13 High - Throughput Finite Field Multipliers Using Redundant Basis for FPGA and ASIC Implementations

14 Level-Converting Retention Flip-Flop for Reducing Standby Power in Zig Bee SoCs

15Novel Design Algorithm for Low Complexity Programmable FIR Filters Based on Extended Double Base Number System

16 Optimal Factoring of FIR Filters17 Recursive Approach to the Design of a Parallel Self-

Timed Adder18 Reliable Low-Power Multiplier Design Using Fixed-

Width Replica Redundancy Block19 Reverse Converter Design via Parallel-Prefix Adders:

Novel

[16]

Page 17: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Components, Methodology, and Implementations

20A New Efficiency-Improvement Low-Ripple Charge-Pump Boost Converter Using Adaptive Slope Generator With Hysteresis Voltage Comparison Techniques

21A New Parallel VLSI Architecture for Real-time ElectricalCapacitance Tomography

22 A novel approach to realize Built-in-self-test(BIST) enabled UART using VHDL

23 A Novel Area-Efficient VLSI Architecture for RecursionComputation in LTE Turbo Decoders

24A Novel Photosensitive Tunneling Transistor for Near-Infrared Sensing Applications: Design, Modeling, and Simulation

25A Relative Imaging CMOS Image Sensor for High Dynamic Range and High Frame-Rate Machine Vision Imaging Applications

26 A Voltage Monitoring IC With HV Multiplexer and HV Transceiver for Battery Management Systems

27 Accelerating Scalar Conversion for Koblitz CurveCrypto processors on Hardware Platforms

28 Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic

29 All Digital Energy Sensing for Minimum Energy Tracking

30 An Efficient List Decoder Architecture for Polar Codes SPOTFIRE & TABLEAU PROJECTS LIST

Sales analytics Cost analysis of pharma industryTrend analysis of oil and gas industryCouncil of medical and researchFinance score card of sales industrySpares analyticsPart analysisKeyword analysisSummary analysis of automobile industryCost driver analysis Growth trend analysis Health care Performance analysis of wells in oil and gas

industry Clinical research on diseases

[17]

Page 18: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Power Distribution & Energy Utilities Transportation & logistics Product Comparison Analysis Inventory Analysis Top Bottom Analysis of organizationDrill down Analysis

TRAINING COURSES ON DIFFERENT TECHNOLOGIES

CORE - JAVA

Introduction to Java Framework What is Java Architecture of JVM Characteristic of java Technology Importance for Internet

Fundamentals of Java Data Types Operators Control Statements Arrays Loop Variables arguments

OOP with Java Classes and Objects Data Member Method Static Constructor This Keyword Casting Object Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface Using Interface

Packages Why Package Understanding Class path Access Modifiers & their Scope

Java Utile Package

[18]

Page 19: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Date Enumeration Vector Properties Hash table Collection & Iterate interface List and Array List

Exception Handling Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception

I/O Operation in Java Byte Oriented Streams File Handling Reader and Writers

Multithreaded programming Introduction to Multi-Threading Understanding Thread Java Threading Model Thread class & Run able Interface Thread priorities

Thread Synchronization Inter thread Communication Preventing Deadlocks

Network programming Introduction to Networking I net Address URL TCP Socket and Server Socket UDP Socket Developing a Chat Application

Abstract Window Toolkit Graphics Color and Font AWT Component/Controls Event handling &Layouts Frames and Menus Images and Animation

Applets Applet Basics Applet Life Cycle Applet Skeleton

[19]

Page 20: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Applet ExampleInner Classes

Nested Top Level Classes Member Classes Local Classes Anonymous Classes

Swing Programming Introduction to Swing and MVC

Architecture

Light Weight Component Swing Hierarchy Atomic Component Intermediate Container Top-Level Container Swing related Events

ADVANCED - JAVA

Java Database Connectivity (JDBC) Introduction to JDBC JDBC Architecture Types of JDBC Drivers Establishing a JDBC Connection Using Statement Using Prepared Statement Using Callable Statement Using properties file Scrollable Result Set Editable Result Set Batch Updates New Feature introduced in JDBC 3.0 Fetching Generated Keys for Auto

WEB BASED TECHNOLOGIES Introduction Java Applet Dynamic Vs Static Content Common Gateway Interface (CGI) Java Script

Distributed Application Development Remote Method Invocation (RMI) Object Persistence and Serialization Introduction to Distributed Technology RMI Architecture

[20]

Page 21: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Importance of Naming Services RMI Registry Creating Registry Stub/ Skeleton Classes Developing Simple RMI Application

Java Beans Java Beans Java Beans Architecture Java Beans Characteristics Providing Properties & Methods Event in Java beans JAR File

Java Servlets Servlets Fundamentals /API Servlets as J2EE Web Component Servlets as an improved CGI Processing Html Forms What is Name-Value pair Content Types and MIME What is a Web-Container Servlets Life Cycle HTTP GET &POST Request Methods Configuration of Web Application Web.xml file Servlets URL Pattern Mapping Deployment Web Application in Tomcat & Web logic Servers State Management Cookies Hidden fields Http Session Filter URL Rewriting

Java Server Pages (JSP) Introduction Advantage-of-JSP-over-other Technology JSP Architecture Request/Response Application/Session Page Page Context JSP Basics & Syntax JSP Directive Page Directive Include Directive

[21]

Page 22: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Taglib Directive JSP Action Tags Forward Action Tag Include Action Tag JSP Script Related Tags Script let Tag Expression Tag Declaration Tag Use Bean Tag Set Property Tag Get Property Tag JSP Custom Tag Library Using Different Scope Objects Javax.sql (Extension to JDBC) Data source &Connection Pool

Using JDBC & JNDI

J2EE

J2EE J2EE Application J2EE Architecture Introduction to J2EE Components, Containers &Connectors. Packaging & Deploying J2EE Applications

Extensible Markup Language (XML) Introduction to XML XML DTD XML Schema JAXP- Java API for XML Processing (DOM & SAX)

JNDI Introduction to Naming & Directory Services Using JNDI JDBC Extension Review of JDBC

Enterprise Java Beans Introduction to Server-Side Components EJB Architecture Java RMI Over IIOP

Types of EJB

[22]

Page 23: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Session Beans Entity Beans Message Driven Beans

EJB Container Services Transactions Security Life Cycle Management State & Persistence of EJB Session Beans Designing & Developing Stateless Session Beans Designing & Developing State full Session Beans Deploying Session Beans Writing Standalone & Web Clients

Entity Beans Designing Persistent Components Difference Between “Create” of Session And Entity Beans Finding Entity Beans Bean vs. Container Managed Persistence Managed Persistence (CMP) Container Managed Fields Local Interfaces Mapping Relationship Between Entity Beans Mapping Relationships Between Database and Entity Beans Deployment Descriptor CMP EJB QL for Writing Custom Finders in CMP Invoking Entity Bean from Session Beans

JAVA Message Services (JMS) Introduction to Messaging Systems Benefits of Using JMS Pub / Sub Model Developing Message Driven Beans (MDB) Message Driven Beans & Transaction

FRAMEWORKS AND ADVANCED CONCEPTS

Struts and MVC Architecture MVC Architecture

[23]

Page 24: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

MVC Model 1 and 2 in web Application Introduction to Struts Framework Configuring Struts Application Struts Configuration File Strut Controller Components Struts Model Components Struts View Components Action Forms Action Messages Action Errors JSP Custom Tag Libraries Tag Library Overview Tag Libraries in Struts Using Java Beans with Struts Tags Struts HTML Tags Exception Handling Action Error & Action Errors Adding Error Handling Action Form Validate Method Handling exceptions Declarative Exception Handling Struts Validation Mask Range

Spring What is spring Framework Inversion of Control Dependency Injection Bean Factory Developing First Spring Application Spring Container Built-in Bean Factories Application Context Bean Lifecycle in Container Spring Events Spring AOP Introduction to AOP Role of AOP in Spring AOP Advice AOP Point cuts Spring AOP Introductions Proxy Factory Bean Spring Data Access Spring O-R Mapping Spring Transaction Management

[24]

Page 25: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Spring Web MVC Framework Hibernate O-R Mapping Manipulating and Querying Hibernate Query Language Criteria Queries

Hibernate Introduction to Hibernate Hibernate Configuration Hibernate Concepts Native SQL Transactions and Concurrency

AJAX Introduction AJAX AJAX Internals XML Http Request Object AJAX UI Tags Div Tag Submit Tag Anchor Tag Tabbed Panel Tag Auto Completer Tag

JSF Introduction to JSF Overview on JSF Architecture JSF Request Processing Life Cycle Using JSF tag libraries Core tags and Html Tags Page Navigation

Handling Events Performing Validation Navigating between Pages

Web Services Introduction to Web Services SOAP request and response UDDI Services WSDL Examples on Web Services

JQUERY

INTRODUCTION

What is J Query? Pre Requirements Download & install J Query

[25]

Page 26: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Creating first page Tools Required HTML & CSS Overview

EVENTS

Bind & Unbind Helper Functions Event Object Other Event FunctionsMANIPULATING PAGE CONTENT

Creating New Content Manipulating Attributes Inserting Content Wrapping, Replacing, Removing Content Working with CSSJQUERY UI LIBRARY

Overview Widgets Effects & Theme Installations ANIMATION AND EFFECTS Showing & Hiding Elements Fading Elements Sliding Elements Custom Animations

TOOLS Log4j ANT CVSNT JASPER REPORTS JUNIT NSIS

DESIGN – PATTERNS

Standalone Application level

Singleton Java Class Synchronized Singleton Java Class Factory Method Factory

[26]

Page 27: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Abstract Factory DTO/VO Class Template Method Fast line Reader Adaptor Class Prototype Builder Inversion Of ControlWeb Application Level

MVC1 &MVC2 Front Controller Abstract Controller View Helper Composite View Intercepting Filter

Enterprise Application Level

DAO DAO Factory Business Delegate Service Locator Session Façade Message Façade

ANDROID

Chapter 1: Getting Started with Android Programming What is Android? Android Versions Features of Android Architecture of Android Android Devices in the Market The Android Market Obtaining the Required Tools

[27]

Page 28: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Eclipse Android SDK Android Development Tools (ADT) Creating Android Virtual Devices (AVDs) Creating Your First Android Application Anatomy of an Android ApplicationChapter 2: Activities and Intents

Understanding Activities Applying Styles and Themes to Activity Hiding the Activity Title Displaying a Dialog Window Displaying a Progress Dialog Linking Activities Using intents Resolving Intent Filter Collision Returning Results from an Intent Passing Data Using an Intent Object Calling Built-in Applications Using intents Understanding the Intent Object Using Intent Filters Adding Categories Displaying notificationsChapter 3: Getting to know the Android user interface

Understanding the Components of a Screen Views and View Groups Linear Layout Absolute Layout Table Layout Relative Layout Frame Layout Scroll View Adapting to Display Orientation Anchoring Views Resizing and Repositioning Managing Changes to Screen Orientation Persisting State Information during Changes

in Configuration Detecting Orientation Changes Controlling the Orientation of the Activity Creating the User interface Programmatically Listening for Ui notifications Overriding Methods Defined in an Activity Registering Events for Views

[28]

Page 29: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Chapter 4: Designing your user interface using views

Basic Views Text View ,Button, Image Button, Edit Text,

Check Box, Toggle Button, Radio Button, and Radio Group Views

Progress Bar View Auto Complete Text View Picker Views Time Picker View Displaying the Time Picker in a Dialog Window Date Picker View Displaying the Date Picker View in a Dialog

Window List Views List View Customizing the List View Using the Spinner ViewChapter 5: Displaying pictures and menus with views

Using image Views to Display Pictures Gallery and Image View Views Image Switcher Grid View Using Menus with Views Creating the Helper Methods Options Menu Context Menu Some Additional Views Analog Clock and Digital Clock ViewsChapter 6: Data Persistence

Saving and Loading User Preferences Using get Shared Preferences() Using get Preferences() Persisting Data to Files Saving to Internal Storage Saving to External Storage (SD Card) Choosing the Best Storage Option Using Static Resources Creating and Using Databases Creating the DB Adapter Helper Class Using the Database Programmatically

[29]

Page 30: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Adding Contacts Retrieving All the Contacts Retrieving a Single Contact Updating a Contact Deleting a Contact Upgrading the Database Pre-Creating the Database Bundling the Database with an ApplicationChapter 7: Content Providers

Sharing Data in Android Using a Content Provider Predefined Query String Constants Contents Projections Filtering Sorting Creating Your Own Content Providers Using the Content ProviderChapter 8: Messaging and networking

SMS Messaging Sending SMS Messages Programmatically Getting Feedback After Sending the Message Sending SMS Messages Using Intent Receiving SMS Messages Updating an Activity from a Broadcast

Receiver Invoking an Activity from a Broadcast

Receiver Caveats and Warnings Sending e-Mail Networking Downloading Binary Data Downloading Text Files Accessing Web Services Performing Asynchronous CallsChapter 9: Location-Based Services

Displaying Maps Creating the Project Obtaining the Maps API Key Displaying the Map Displaying the Zoom Control Changing Views

[30]

Page 31: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Navigating to a Specific Location Adding Markers Getting the Location That Was Touched Geo coding and Reverse Geo coding Getting Location Data Monitoring a LocationChapter 10: Developing Android Services

Creating Your Own Services Performing Long-Running Tasks in a Service Performing Repeated Tasks in a Service Executing Asynchronous Tasks on Separate Threads Using Intent Service Communicating between a Service and an

Activity Binding Activities to Services

Chapter 11: Publishing Android Applications

Preparing for Publishing Versioning Digitally Signing Your Android Applications Deploying APK Files Using the adb exe Tool Using a Web Server Publishing on the Android Market Creating a Developer Profile Submitting Your AppsChapter 12: Broadcast Receiver

Chapter 13: Notifications

Chapter 14: Android (Advanced)

Graphics Design Camera Handling Map Handling Video Handling Bluetooth Handlin

[31]

Page 32: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

C#.NET 6.0

INTRODUCTION TO .NET What is .NET Purpose of .NET

DIFFERENCE BETWEEN .NET 3.0, 3.5, 4.0, 4.5 & 4.6INTRODUCTION TO .NET FRAMEWORK

What is .Net Framework CLR –what is Common Language Runtime .Net Class Library User and Program Interface Different Types of Application Working with Windows Application Working with Console Application Diff between Win forms and Console App ADVANCE FEATURES OF .NET FRAME

WORK 3.5,4.0 &4.5 What is a Service? Windows Communication Foundation

(WCF) Architecture of WCF Working with Different Contracts Difference between Web Services and

WCF Windows Presentation Foundation (WPF) Architecture of WPF Working with Different Layout Introduction to Windows Card Spaces

(WCS) Introduction to Windows Work Flow

Foundation (WFF) INTRODUCTION TO C#

What is C# Purpose of C# Language and Syntax

FUNDAMENTALS OF C# Data Types Operators Control Statements Arrays

[32]

Page 33: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Loop Variables arguments

COLLECTIONSWhy Collections?

Stack Queue Array List Sorted List Hash Table

OBJECT ORIENTED FEATURES OF C# Classes and Objects Data Member Access Modifiers & their Scope Method Static Constructor This Keyword Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface Using Interface Partial Class

FILE STREAMS Using File Classes File File Info Directory Directory Info Stream Writer Stream Reader Text Writer Text Reader

ARCHITECTURE OF WINDOWS FORMS Control Class Rich Control Class Scrollable Control Class Form Class

WINDOWS FORM CONTROL REFERENCE Link Label Panel Group Box

[33]

Page 34: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Data Picker Progress Bar Timer Login Grid view Masked Textbox Split Container Flow Layout Panel Folder Browser

VALIDATING CONTROLS Error Provider

DIALOG CONTROLS Color Dialog Save File Dialog Font File Dialog Open Dialog Folder Dialog

MENU CONTROLS Tool strip Status Strip Menu Strip Context Menu Strip Tool Strip Manager

EXCEPTION HANDLING Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception In-Built Exception Handling

NETWORK PROGRAMMING Introduction to Networking InetAddress URL TCP Socket and Server Socket UDP Socket

XML Introduction User Input How to create an XML file Use of Ad rotator control Access XML file usingADO.Net Read XML file Write XML file

DATA ACCESS USING ADO.NET Over view of ADO.Net

[34]

Page 35: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Life Cycle of ADO.Net Difference between ADO and ADO.Net

ADO.NET ARCHITECTURE AND OBJECT MODEL

Introduction to Dataset Introduction to Data adapter Manipulating database using Dataset Manipulating Oracle database using

Dataset Manipulating SQL Server database using

Dataset Manipulating of Remote database Manipulating XML Files using Data Access

Controls Executing Command OLEDB AND SQL CLIENT Providers Accessing Stored Procedures Accessing Stored Procedures with

Parameters Filter Data Using Database Handling Database errors

XML INTRODUCTION Role of XML in .Net XML Table Manipulation Insert Update Delete

ASSEMBLES Name Spaces Creating Private Assembly Creating Shared Assembly Strong Key Public Key Token Versioning Configuration Files Satellite Assemblies

COM INTEROPERABILITY Creating COM Components Runtime Callable Wrapper Com Callable Wrapper Calling COM Components Using C# Assessing Assemblies through COM

MANIPULATING THE FILES & REGISTRY Managing the Files Creating Directory

[35]

Page 36: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Reading and Writing of Files File Security

INTRODUCTION TO GDI+ Creating Graphics Objects with GDI+

CREATING CONTROLS Use Controls Types of Controls Adding Properties Adding Events User Windows in Control Form Host a windows control inside Microsoft Internet

Explorer MULTI THREADING

System Threading Thread Synchronization Thread Lifecycle

GLOBALIZATION Globalization and Localization of the UI

SECURITY Code Level Security

CRYPTOGRAPHY Cryptography Services Encrypt and Decrypt a file Generate and compare Hash value Cryptography primitive

WINDOW SERVICEWhat is a Service?Diff between Web Service and Window Service

Designing Windows services Installing and restring windows services Binding windows service to C#

application About SCM

DEPLOYMENT Planning the deployment Web based deployment, net-work based deployment Creating a Setup, Register Components

and Assemblies Install-Time compilation Adding Assemblies to the GAC Security Policy Verifications

REPORTS CRYSTAL REPORT

[36]

Page 37: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Crystal Report Viewer Crystal Report Source

SERIALIZATION What is Serialization? What is De-Serialization? Using Binary formatter Using SOAP Formatter

REMOTING Introduction to Remoting Passing Objects to Remote Method

GENERICS Generics Collection Classes Create Customer Generic Class Generic Delegates

MEMORY MANAGEMENT & POINTER Memory Management under the hood Freezing Unmanaged Resources Unsafe Code

DATA CONTROLS Data Grid View Dataset Binding Source Binding Navigator

CONTAINER CONTROLS Panel Group Box Flow Layout Control Table Layout Control Tab Control Split Container

WPF Introduction What is WPF Goals, Benefits & Drawbacks First WPF Application Types of WPF Application (Windows

Based and Browser Based) XAML

Introduction to XAML XAML – Extensible Application Markup

Language. Content Models

WORKING WITH CONTROLS Menus Label

[37]

Page 38: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Button Checkbox Radio Button Repeat Button Toggle Button ToolTip Expander Group Box Textbox Combo Box List Box Menu

Status Bar Tab Control Toolbar Tree View Notify Icon Menus and Toolbars

Layout Border Canvas Dock Panel Grid Stack Panel Wrap Panel

ASP.NET 4.5, 4.6

INTRODUCTION TO WEB APPLICATIONS Overview of ASP Overview of ASP.Net Page Code In-Line Model Code Behind Model

HTML Introduction to .Net Frame Work Working with HTML Controls Overview of Attributes.

WHAT IS DOTNET FRAME WORK Common Language Runtime (CLR) .Net Class Framework–User and Program

Interface. Net Common Type System(CTS) Common Language Specification (CLS). MSIL(Microsoft Intermediate Language)

INTRODUCTION TO ASP.NET

[38]

Page 39: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

What is ASP.Net? Complete Life Cycle of Asp.Net Page. Difference between ASP and ASP.Net. Execution Process of .Net Application.

ADVANCE FEATURES OF .NET FRAME WORK Windows Communication Foundation

(WCF) Windows Presentation Foundation (WPF) Windows Card Spaces (WCS) Windows Work Flow Foundation (WFF) Client Server Architecture 3-Tier/N-Tier Architecture

INTRODUCTION TO VB.NET AND C#.NET LANGUAGE

Variables declaration Encapsulation Abstraction Inheritance Polymorphism Delegates Exception Handling

ASP.NET WEB FORMS Introduction to Web Forms Working with Server Controls Rich Controls Customization

ASP.NET WEB CONTROLS HTML Server Controls Web Server Controls Data Bound Controls. Grid View Data List Repeater Details View Forms View List View

VALIDATION CONTROLS Required Field Validate Compare Validate Regular Expression Validate Range Validate Custom Validate Validation Summary

WORKING WITH MASTER PAGE

[39]

Page 40: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Creation of Master Page. Creation of Content Page. Working with Content Placeholder Creation of Main Page Including Navigation Controls.

DATA ACCESS USING ADO.NET Overview of ADO.NET ADO.NET architecture and object model Introduction to Dataset Difference between Dataset and Record

set Data binding Retrieving data using OLEDB and

SQLCLIENT Providers Introduction to Data adapter Manipulating databases using Dataset Manipulating of Oracle database using

Dataset Manipulating of SQL Server database

using Dataset Manipulation of Remote Access Database Manipulation using XML datasheet Using Data access controls Executing Command Populate Dataset Filter Data

WORKING WITH BUSINESS OBJECTSNAMESPACE WITH DLL

Creating DLL Calling DLL Database Connectivity Using DLL

COM INTEROPERABILITY RCW CCW

CONFIGURATION Configuration overview Overview of WEB.Config file Configuration file format CONFIGURATION FILES Overview of Machine.Config file Working with WEB.Config File Retrieving configuration Provide connection string Difference between WEB.Config file and

[40]

Page 41: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Machine.Config file XML WEB SERVICES

Create Web Services Consuming Web Services. WSDL (metadata generation).

INTRODUCTION TO SOAP, UDDI, WSDLWEB FORMS USER CONTROL

Introduction to User Control (.ascx) Creating User Control for Asp.Net page Customizing ASP.Net application Using user control-Assemblies

ASP.NET WEB APPLICATION Application overview Using the Global.asax file Managing application state Event Handlers

CACHE FEATURES What is Caching? Use of Cache. Caching overview Data caching Page output caching Fragment caching

DEBUGGING The SDK Debugger

SECURITY OVERVIEW Authentication and Authorization Windows based Authentication Forms based Authentication Authorizing users and roles Users account Impersonation Security and Web Services Passport Authentication

GLOBALIZATION User encodings Setting current culture and region Handling multiple encoding Globalization and Localization of the UI Changing culture by using Config.file

TRACING Tracing overview Trace logging to page output Application level traces logging Writing Trace Messages.

DEPLOYMENT

[41]

Page 42: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Deploying Applications Using the Process Models Types of Deployment.

IIS (Internet Information Server).Introduction to IIS.

Different Version of IIS Deploy Asp.Net Application using IIS.

STATE MANAGEMENT What is State Management? Type of Techniques used. Page Life Cycle without state. Page Life Cycle with State.

STATE TECHNIQUES Sessions Cookies View State Query String Application. Hidden Fields. Diff between session and Application Choosing best State Management

WITH DATASOURCES SqlData Source Access Data Source Object Data Source XML Data Source Sitemap Data Source Linq Data Source Entity Data Source

WCF

Introduction Architecture of WCF Evolution of WCF Evolution of Service Oriented Architecture

(SOA) What is WCF

Developing WCF Service Application and Client

Hosting WCF Service in IIS/ASP.NET Development Server

Using a Service in the client application Contracts

Service Contract.

[42]

Page 43: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Operation Contract. Data Contract.

Endpoints in configuration file What are End points? ABC - Address, Binding & Contract. Importance of IMetadataExchange

Contract / Endpoint. Configuring service behavior in

configuration file WCF Service Configuration Editor

AJAX

Introduction to AJAX

What is AJAX? Ajax rich clients in the real world Ajax advantages and disadvantages The purpose of AJAX Traditional web application An AJAX web application Alternatives to Ajax AJAX Components key elements of Ajax

Ajax Controls

Script Manager Script Manager Proxy Update Panel Update Progress Control Timer Control

Ajax Extension Control Tool Kit

SILVERLIGHT

INTRODUCTION TO SILVERLIGHT What is Silver light? Tools for creating Silver light Applications Difference in versions

[43]

Page 44: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Different types of Applications in Silver light

ARCHITECTURE OF SILVERLIGHT

HOW IT IS USED WITH .NET

DEVELOPING FIRST SILVERLIGHT APPLICATION

SILVERLIGHT AND XAML

SILVERLIGHT UI CONTROLS Layout Management and Grouping

Controls Form Controls Data Integration and Data Manipulation

Controls Functional Controls Navigation

CLOUD COMPUTING

OVERVIEW D-COMPUTING Trends of computing Introduction to distributed computing Next big thing: cloud computing

INTRODUCTION What’s cloud computing Properties & Characteristics Service models Deployment models

IAAS Introduction to IAAS

PAAS Introduction to PAAS Cloud platform & Management

Computation

[44]

Page 45: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Storage Case studies

SAAS Introduction to SAAS Web services

CLOUD ISSUES AND CHALLENGES

Introduction

Introduction to business analytical tools What is spot fire

Data access

Interactive visualizations Underlying data tables(s) Basic layout Open form files Import settings Open from databases Library

Create visualizations

Bar chart & properties Histogram & trellis Line chart & dates Graphical tables Lines as patterns Combination charts Scatter plots & coloring Pie charts & size scale Tables and display value

Interactivity

[45]

SPOTFIRE

Page 46: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Tooltip display How to mark, drill down Details on demand Multiple marking Details visualization Filter types , hide filters Marking to filter data Filtering scheme Ways to limit data

Save & export

Save linked to source data Save data embedded Save analysis as a file Save as a library item Reload linked data Replace data table Export data Export images

Add data

Calculated columns Binned columns Hierarchies Insert columns Insert rows Multiple data tables Manage relations Transformations

Capturing the analysis

Add bookmark Apply bookmark Special bookmark

Other visualizations

Tree map Box plot Map chart Heat map

[46]

Page 47: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Advanced concepts

Custom expressions K-means clustering Information model Information designer Information links

Administration

Architecture

Mange services

Schedule updates

Interdiction and overview

Why tableau? Why visualization? Level setting – terminology Getting started – creating some powerful

visualization quickly Things you should known about tableau

Getting started

Connecting to data and introduction to data source concepts of working with data files versus database servers

Understanding the tableau workspace Dimensions and measures Using show me! Tour of shelves (how shelves and marks

work) Building basic views Help menu and samples Shaving and sharing your work

[47]

TABLEAU

Page 48: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Concepts and options when connecting to data

Overview of other connection options Joining multiple tables Data blending copy and paste data

extracts Custom SQL Publishing and Re-using data connections Understand how to deal with data

changes in your data source such as field addition, deletion or name change

Re-using and sharing data connections – the concept of meta data

Working with multiple connections in the same workbook

Analysis

Creating views Marks Size and transparency Highlighting Working with dates Date aggregations and date parts Discrete versus continuous Dual axis / multiple measures Combo charts with different marks types

o Geographic mapo Page trails o Heat map o Density charto Scatter plotso Pie charts and bar charts o Small multiples o Working with aggregate versus

disaggregate data

Analyzing

o Sorting & grouping o Aliases o Filtering and quick filters

[48]

Page 49: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

o Cross – tabs (pivot tables ) totals and subtotals

o Drilling and drill througho Aggregation and disaggregation

percent of total o Working with statistics and trend

lines

Getting started with calculated fields

Working with string functions Basic arithmetic calculations Date math Working with totals Custom aggregations Logic statements

Formatting

Options in formatting your visualization Working with labels and annotations Effective use of titles and captions Introduction to visual vest practices

Building interactive dashboards

Combining multiple visualizations into a dashboard

Making your worksheet interactive by using actions and filters

An introduction to best practices in visualization

Sharing workbooks

Publish to reader Packaged workbooks Publish to office Publish to pdf Publish to tableau server and sharing

over the web

Putting it all together

[49]

Page 50: Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and implementation of intelligent campus security tracking system based on RFID

Scenario-based review exercises Best practices

Where to get further assistance

The help file / product manual Knowledge base Forums Whitepapers & books Further training offerings & professional

services technical support

[50]