Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and...
Transcript of Web viewContext-Based Access Control Systems for Mobile Devices. 3. ... The design and...
IEEE 2015-2016 PROJECTS Technology: JAVA(J2SE & J2EE)
S. No
PROJECT TITLES
1 Context-Based Diversification for Keyword Queries over XML Data
2 Malware Propagation in Large-Scale Networks 3 On Summarization and Timeline Generation for
Evolutionary Tweet Streams 4 Progressive Duplicate Detection 5 Reverse Nearest Neighbors in Unsupervised
Distance-Based Outlier Detection
6Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
7 Towards Effective Bug Triage with Software Data Reduction
8 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
9 A Proximity-Aware Interest-Clustered P2P File Sharing System
10Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
11Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
12 User-Defined Privacy Grid System for Continuous Location-Based Services
13 A Computational Dynamic Trust Model for User Authorization
14A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
15 Continuous and Transparent User Identity Verification for Secure Internet Services
16 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts
17 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
[1]
18 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
19Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
20 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
21 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
22 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
23 Secure Distributed Deduplication Systems with Improved Reliability
24A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
25 Effective Key Management in Dynamic Wireless Sensor Networks
26 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter
27 An Attribute-Assisted Reranking Model for Web Image Search
28 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
29 Learning to Rank Image Tags With Limited Training Examples
30Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
31 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
32A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
33Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
34 Detecting Malicious Face book Applications35 Key Updating for Leakage Resiliency with
Application to AES Modes of Operation36 Security-Evaluation-Of-Pattern-Classifiers-Under-
Attack37 Facilitating-Document-Annotation-Using-Content-
And-Querying-Value
[2]
38 Securing-Broker-Less-Publishsubscribe-Systems-Using-Identity-Based-Encryption
39 Fast-Nearest-Neighbor-Search-With-Keywords40 Traffic-Pattern-Based-Content-Leakage-Detection-
For-Trusted-Content-Delivery-Networks41 Top-K-Query-Result-Completeness-Verification-In-
Tiered-Sensor-Networks42 Optimal Distributed Malware Defense in Mobile
Networks with Heterogeneous Devices43 Efficient and Privacy-Aware Data Aggregation in
Mobile Sensing44 SOS: A Distributed Mobile Q&A System Based on
Social Networks45 Towards Online Shortest Path Computation46 Boundary Cutting for Packet Classification
47 An Incentive Framework for Cellular Traffic Offloading
48 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
49 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
50 Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks
51 Detection And Localization Of Multiple Spoofing52 EAACK—A Secure Intrusion-Detection System For
Manets53 Vampire Attacks Draining Life From Wireless54 Mobile Relay Configuration in Data-Intensive
Wireless Sensor Networks55 Multiparty Access Control for Online Social
Networks Model and Mechanisms56 Cooperative-Caching-For-Efficient-Data-Access-In-
Disruption-Tolerant-Networks57 Cost-Effective-Resource-Allocation-Of-Overlay-
Routing-Relay-Nodes58 A Scalable Server Architecture For Mobile Presence
Services InJAVA ANDROID PROJECTS
ENVIRONMENT DETAILS:ANDROID,SQLITES. No PROJECT TITLES1 A Location- and Diversity-aware News Feed System
[3]
for Mobile Users 2 Context-Based Access Control Systems for Mobile
Devices3 Cooperative Positioning and Tracking in Disruption
Tolerant Networks4 CWC: A Distributed Computing Infrastructure Using
Smartphone’s5 Energy-Efficient Fault-Tolerant Data Storage and
Processing in Mobile6 Your Journey: Considering Signal Strength and
Fluctuation in Location-Based Applications7 Privacy-Preserving Relative Location Based
Services for Mobile Users8 The Impact of API Change- and Fault-Proneness on
the User Ratings of Android Apps9 Time-and-Energy-Aware Computation Offloading in
Handheld Devices to Coprocessors and Clouds10 User Privacy and Data Trustworthiness in Mobile
Crowd Sensing11 User-Defined Privacy Grid System for Continuous
Location-Based Services12 Effective Risk Communication for Android Apps13 Catch Me If You Can: Evaluating Android Anti-
Malware Against Transformation Attacks14 Meet You – Social Networking on Android15 MOSES: Supporting and Enforcing Security Profiles
on Smart phones16 T-Drive: Enhancing Driving Directions with Taxi
Drivers’ IntelligenceCLOUD COMPUTING
Technology:JAVA,J2EE&MYSQLS. No PROJECT TITLES
1 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
2 A Secure and Dynamic Multi-keyword Ranked Search Scheme
3 Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
4 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
5Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
[4]
6 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
7 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
8 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
9 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
10 Decentralized-Access-Control-With-Anonymous-Authentication-Of-Data-Stored-In-Clouds
11 Distributed--Concurrent--And-Independent-Access-To-Encrypted-Cloud-Databases
12 Scalable-Distributed-Service-Integrity-Attestation-For-Software-As-A-Service-Clouds
13 A-Hybrid-Cloud-Approach-For-Secure-Authorized-Deduplication
14 Oruta-Privacy-Preserving-Public-Auditing-For-Shared-Data-In-The-Cloud
15A-Stochastic-Model-To-Investigate-Data-Center-Performance-And-Qos-In-Iaas-Cloud-Computing-Systems
16 Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization
17 Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud
18 Cloud A Framework Of Adaptive Mobile Video Streaming And Efficient Social Video Sharing In
19 Cloudmov Cloud-Based Mobile Social TV WEB APPLICATIONS
Technology: JAVA J2EE,TOMCAT,ORACLES. No PROJECT TITLES1 An-efficient-Mailing-System-for-Detecting-Spam-
Mails2 Annotating-Search-Results-from-Web-Databases3 A-Secure-Cloud-server-System-using-Proxy-Re-
Encryption-Model4 Attribute-based-Encryption-System-for-Secured-
Data-Storage5 Automatic-Testing-System-for-Web-Application6 Generalized-Flow-Based-Method-for-Analysis-of-
Implicit-Relationships-on-Wikipedia7 Automated e-government certificates
[5]
8 Friend book: A Semantic-based Friend Recommendation System for Social Networks
9 QOS: Ranking Prediction For Cloud Services10 Fully Anonymous Profile Matching In Mobile Social11 Collaboration in Multi cloud Computing
Environment12 A Cocktail Approach for Travel Package
Recommendation13 Web Based Framework of Project Performance and
Control system14 Validation of Code Words Through Images15 Student Project Allocation and Mgmt system16 Secrecy protecting account for Data Storage
Security17 The Mobile Agent Based service software in
Internet Environment18 Going Back and Fourth efficient Multi Deployment
and Multi snapshot19 E-Banking20 Credit Card Fiddles21 Database Elasticity22 Management of Vitality Cards23 Standing Spatial Information24 E-Housing25 News Bulletin System26 Loan Lending26 Venue Maintenance System27 Medical Allowances Controlling System28 Internet Protocol Television System29 AMES30 CAM31 Secure Data Sharing for multi owners32 Online Itemization Section33 Disburse Mobile Scheme34 Motel Resource Tool35 Credit Card Fiddles36 E-Counseling37 Mobile Presence Server
[6]
38 Loan Lending39 VISA Dispensing System40 Resource Management System41 Jellybean Maneuvering Appropriation And
Conclave
2015-2016 IEEE PROJECTS Technology: DOTNETS. No PROJECT TITLES
01 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites.
02 Discovery of Ranking Fraud for Mobile Apps.03 Query Aware Determinization of Uncertain Objects.04 Collision Tolerant and Collision Free Packet
Scheduling for Underwater Acoustic Localization.05 Defeating Jamming With the Power of Silence: A
Game-Theoretic Analysis.06 Universal Network Coding-Based Opportunistic
Routing for Unicast.07 A Distributed Three-hop Routing Protocol to
Increase the Capacity of Hybrid Wireless Networks.
[7]
08Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks.
09Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks.
10Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems.
11 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.
12 An Attribute-Assisted Reranking Model for Web Image Search.
13 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images.
14 Detection and Rectification of Distorted Fingerprints.
15 Learning Fingerprint Reconstruction: From Minutiae to Image.
16 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation.
17 An Empirical Performance Evaluation of Relational Keyword Search Techniques.
18 Supporting Privacy Protection in Personalized Web Search.
19 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality.
20 Typicality-Based Collaborative Filtering Recommendation.
21 Secure Mining of Association Rules in Horizontally Distributed Databases.
22 Product Aspect Ranking and its Applications.23 Secure Data Retrieval for Decentralized Disruption-
Tolerant Military Network.24 Autonomous Mobile Mesh Networks.25 The Target Tracking in Mobile Sensor Networks.26 Certificate less Remote Anonymous Authentication
Scheme for Wireless Body Area Networks.27 Secure and Efficient Data Transmission for Cluster-
Based Wireless Sensor Networks.28 Multicast capacity in MANET with Infrastructure
Support.29 Content Caching and Scheduling in Wireless
Networks with Elastic and Inelastic Traffic.
[8]
30 Preserving Location Privacy in Geo social Applications.
31 Privacy Preserving Data Sharing With Anonymous ID Assignment.
32 A cocktail approach for travel package recommendation.
33 Efficient Data Query in Intermittently-Connected Mobile Ad hoc Social Networks.
34 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
35 Optimal content downloading in Vehicular Network.
36Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing.
37 Topology control in mobile ad hoc networks.38 The Three-Tier Security Scheme in Wireless
Sensor Networks with Mobile Sinks.39 Network Assisted Mobile Computing with Optimal
Uplink Query Processing.40 Characterizing the Efficacy of the NRL Network
Pump in Mitigating Covert Timing Channels.41 Jamming-Aware Traffic Allocation for Multiple-Path
Routing Using Portfolio Selection.CLOUD COMPUTING
01 Cloud-Based Multimedia Content Protection System.02 Control Cloud Data Access Privilege and Anonymity
with Fully Anonymous Attribute-Based Encryption.03 Cost-Minimizing Dynamic Migration of Content
Distribution Services into Hybrid Clouds.
04Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.
05 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem.
06 Identity-Based Distributed Provable Data Possession in Multicloud Storage.
07 PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing .
08 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers.
09 Key-Aggregate Cryptosystem for Scalable Data
[9]
Sharing in Cloud Storage.10 Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds.11 Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds.12 Privacy-Preserving Multi-Keyword Ranked Search
over Encrypted Cloud Data.13 Distributed, Concurrent, and Independent Access to
Encrypted Cloud Data.14 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing Using Attribute-Based Encryption.
15 Privacy-Preserving Public Auditing for Secure Cloud Storage in Public Clouds.
16 Balancing Performance, Accuracy and Precision for Secure Cloud Transactions.
WEB APPLICATIONS
01 User-Query-Dependent Ranking For Web Databases.02 Data Storage security in cloud computing.03 Error Tracking System.04 Expert answer.05 Efficient Computation of Range Aggregates against
uncertain location based queries.06 Exploring Application-Level Semantics for Data
Compression.07 Exploiting Dynamic Resource Allocation for Efficient
Parallel Data Processing in the Cloud.08 Improving Aggregate Recommendation Diversity
Using Ranking-Based Techniques.09 Vulnerability analysis in SOA-based business
processes.10 Asset boutique.11 Monitoring Service Systems from a Language-Action
Perspective.12 CAM: Cloud-Assisted Privacy Preserving Mobile
Health Monitoring.13 MONA: Secure Multi-Owner Data Sharing for
Dynamic Groups in the Clouds.14 Consistency as a Service: Auditing Cloud
Consistency.15 A system to filter unwanted messages from OSN
user walls.16 Web Information Gathering Based on Ontology
[10]
model.17 Collective Behavior of Scalable learning.18 Go-Between Socially-Enhanced Virtual Communities.19 A Gen2-based RFID Authentication Protocol for
Security and Privacy.20 Monitoring System.21 Online Art Gallery.22 Gateway Accessory.23 E-voting.24 Internet File Sharing.25 Cybernetics protector.26 Scalable record linkage and deduplication.27 Garbage Collection System.28 Commodity Sustenance.29 Affluence Management.30 Global Warning System.31 Blog Application.32 Go-Vegetarian.33 Online Classifieds.34 Municipal Administration system.35 Online Advertise.36 Cab Services.
37 Census.38 Orphan Management System.39 Vessel Consignment.40 Genco Mailing System.41 Village morphogenesis.42 Ranking Model Adaptation for Domain-Specific
Search.43 Query Planning for Continuous Aggregation Queries
over a Network of Data Aggregators.44 Bridging Socially-Enhanced Virtual Communities.
[11]
2015-16 PROJECTS Technology: Embedded SystemS.NO PROJECT TITLES01 ARM Platform For Vehicular Monitoring And Tracking.02 Advance question paper leakage control system
design.03 GPS Based Asset/Vehicle/Animal/Child Tracking
System.04 Automatic Power Meter Reading Using GSM Network.05 Advance home security for intruder detection with
auto paging/dialing.06 Wireless remote and status enquiry for smart
industries.07 Vehicle ignition security with dynamic password
generation.08 Emergency alert for women safety with location
tracking.09 E-VOTING system to avoid anti rigging.10 A proposed system for advance security and
automation in metro trains to prevent accidents.11 Advance home security for intruder detection with
auto paging/dialing.12 Microcontroller based customizable wireless sensor
node to detect hazardous gas pipeline leakage.13 Real time vehicle parameter monitoring with
continuously tracking of a VIP VEHICLE.14 Real-time control system for air pollution detection
in vehicles.15 Human health monitoring mobile phone application
by using embedded system.16 Electronic service provider with billing .17 RFID AND ZIGBEE based manufacturing monitoring
system
18The design and implementation of intelligent campus security tracking system based on RFID and ZIGBEE.
19 RFID and GSM based intelligent courier mailbox system.
20 RFID remote parent care.
[12]
21 RFID assisted navigation systems in public vehicles22 Universal remote control with haptic interface23 Construction of microcontroller based touch screen
mobile phone with password protected features24 Modern prepaid energy system25 E-MEDICAL emergency for patients26 Smart pad for examination27 E-WALLET system for salary payment of employs28 Employee login and logout management system29 High secured data exchange with encryption30 Smart remote control system of high efficiency and
Intelligent street lighting31 Economical fully centralized system in building
automation with wireless sensor networks32 Smart remote control system of high efficiency and
intelligent street lighting
33Green home energy management system through comparison of energy usage between the same kinds of home appliances
34 live bus stops and modern buses technology35 Automatic parking guidance with prepaid car parking36 Traffic congestion control with automatic signal
clearance37 Perpetual and low-cost power meter for monitoring
residential and industrial appliances38 Smart back pack for visually impaired person 39 Multi-patient health monitoring system for corporate
hospitals40 Design of sphygmus data acquisition platform 41 College bus information to students 42 Intelligent street light automation with illumination
control43 The remote control of mobile robot based on
embedded technology44 A multipurpose robot for military45 Ultrasonic spectacles and waist-belt for visually
impaired and blind person46 Vehicle accident avoidance with road adverse
conditions monitoring47 A safety system for mine workers in heavy industries
PROJECTS Technology: MATLAB2015-2016
IEEE PROJECTS
[13]
S. No PROJECT TITLES1
A Feature-Enriched Completely Blind Image Quality Evaluator
2A No-Reference Texture Regularity Metric Based on Visual Saliency
3A Probabilistic Approach for Color Correction in ImageMosaicking Applications
4Boundary Detection Using Double-Opponency and Spatial Sparseness Constraint
5Combining Left and Right Palm print Images for More Accurate Personal Identification
6Face Recognition across Non-Uniform Motion Blur, Illumination, and Pose
7Face Sketch Synthesis via Sparse Representation-Based Greedy Search
8Fractal Analysis for Reduced Reference Image QualityAssessment
9Image Denoising by Exploring External and Internal Correlations
10Image Super-Resolution Based on Structure-Modulated Sparse Representation
11Multifocal Image Fusion Based on NSCT and Focused Area Detection
12 Pareto-Depth for Multiple-Query Image Retrieval13
Revealing the Trace of High-Quality JPEG Compression through Quantization Noise Analysis
14Reversible Image Data Hiding with Contrast Enhancement
15Robust Representation and Recognition of Facial Emotions Using Extreme Sparse Learning
16 Steganography Using Reversible Texture Synthesis17
Variable-Length Signature for Near-Duplicate Image Matching
18A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations
19An Efficient Parallel Approach for Sclera Vein Recognition
20BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification
21 Designing an Efficient Image Encryption-Then Compression System via Prediction Error Clustering
[14]
and Random Permutation22 Digital Image Sharing by Diverse Image Media23
Dual-Geometric Neighbor Embedding for Image Super Resolution With Sparse Tensor
24Exposing Digital Image Forgeries by Illumination ColorClassification
25Fingerprint Compression Based on Sparse Representation
26Hyperspectral Image Classification Through Bilayer Graph-Based Learning
27Images as Occlusions of Textures: A Framework for Segmentation
28Low-Rank Neighbor Embedding for Single Image Super-Resolution
29Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
30Phase-Based Binarization of Ancient Document Images: Model and Applications
31Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A Unified Framework
32Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration
33 A Unified Data Embedding and Scrambling Method
34 Characterness: An Indicator of Text in the Wild
PROJECTS Technology: VLSI2015-2016
IEEE PROJECTSS. No PROJECT TITLES
01 A Combined SDC-SDF Architecture for Normal I/O
[15]
Pipelined Radix-2 FFT
02A High-Performance FIR Filter Architecture for Fixed andReconfigurable Applications
03 A High-Speed FPGA Implementation of an RSD-Based ECC Processor
04 Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic
05 An Accuracy-Adjustment Fixed-Width Booth Multiplier Based on Multilevel Conditional Probability
06An Efficient Constant Multiplier Architecture Based on Vertical-Horizontal Binary Common Sub-expression Elimination Algorithm for Reconfigurable FIR Filter Synthesis
07An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multi-standard DUC
08Array-Based Approximate Arithmetic Computing: A General Model and Applications to Multiplier and Squarer Design
09 Design of Self-Timed Reconfigurable Controllers for Parallel Synchronization via Wagging
10Exact and Approximate Algorithms for the Filter DesignOptimization Problem
11 Fault Tolerant Parallel Filters Based on Error Correction Codes
12Graph-Based Transistor Network Generation Method forSupergate Design
13 High - Throughput Finite Field Multipliers Using Redundant Basis for FPGA and ASIC Implementations
14 Level-Converting Retention Flip-Flop for Reducing Standby Power in Zig Bee SoCs
15Novel Design Algorithm for Low Complexity Programmable FIR Filters Based on Extended Double Base Number System
16 Optimal Factoring of FIR Filters17 Recursive Approach to the Design of a Parallel Self-
Timed Adder18 Reliable Low-Power Multiplier Design Using Fixed-
Width Replica Redundancy Block19 Reverse Converter Design via Parallel-Prefix Adders:
Novel
[16]
Components, Methodology, and Implementations
20A New Efficiency-Improvement Low-Ripple Charge-Pump Boost Converter Using Adaptive Slope Generator With Hysteresis Voltage Comparison Techniques
21A New Parallel VLSI Architecture for Real-time ElectricalCapacitance Tomography
22 A novel approach to realize Built-in-self-test(BIST) enabled UART using VHDL
23 A Novel Area-Efficient VLSI Architecture for RecursionComputation in LTE Turbo Decoders
24A Novel Photosensitive Tunneling Transistor for Near-Infrared Sensing Applications: Design, Modeling, and Simulation
25A Relative Imaging CMOS Image Sensor for High Dynamic Range and High Frame-Rate Machine Vision Imaging Applications
26 A Voltage Monitoring IC With HV Multiplexer and HV Transceiver for Battery Management Systems
27 Accelerating Scalar Conversion for Koblitz CurveCrypto processors on Hardware Platforms
28 Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic
29 All Digital Energy Sensing for Minimum Energy Tracking
30 An Efficient List Decoder Architecture for Polar Codes SPOTFIRE & TABLEAU PROJECTS LIST
Sales analytics Cost analysis of pharma industryTrend analysis of oil and gas industryCouncil of medical and researchFinance score card of sales industrySpares analyticsPart analysisKeyword analysisSummary analysis of automobile industryCost driver analysis Growth trend analysis Health care Performance analysis of wells in oil and gas
industry Clinical research on diseases
[17]
Power Distribution & Energy Utilities Transportation & logistics Product Comparison Analysis Inventory Analysis Top Bottom Analysis of organizationDrill down Analysis
TRAINING COURSES ON DIFFERENT TECHNOLOGIES
CORE - JAVA
Introduction to Java Framework What is Java Architecture of JVM Characteristic of java Technology Importance for Internet
Fundamentals of Java Data Types Operators Control Statements Arrays Loop Variables arguments
OOP with Java Classes and Objects Data Member Method Static Constructor This Keyword Casting Object Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface Using Interface
Packages Why Package Understanding Class path Access Modifiers & their Scope
Java Utile Package
[18]
Date Enumeration Vector Properties Hash table Collection & Iterate interface List and Array List
Exception Handling Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception
I/O Operation in Java Byte Oriented Streams File Handling Reader and Writers
Multithreaded programming Introduction to Multi-Threading Understanding Thread Java Threading Model Thread class & Run able Interface Thread priorities
Thread Synchronization Inter thread Communication Preventing Deadlocks
Network programming Introduction to Networking I net Address URL TCP Socket and Server Socket UDP Socket Developing a Chat Application
Abstract Window Toolkit Graphics Color and Font AWT Component/Controls Event handling &Layouts Frames and Menus Images and Animation
Applets Applet Basics Applet Life Cycle Applet Skeleton
[19]
Applet ExampleInner Classes
Nested Top Level Classes Member Classes Local Classes Anonymous Classes
Swing Programming Introduction to Swing and MVC
Architecture
Light Weight Component Swing Hierarchy Atomic Component Intermediate Container Top-Level Container Swing related Events
ADVANCED - JAVA
Java Database Connectivity (JDBC) Introduction to JDBC JDBC Architecture Types of JDBC Drivers Establishing a JDBC Connection Using Statement Using Prepared Statement Using Callable Statement Using properties file Scrollable Result Set Editable Result Set Batch Updates New Feature introduced in JDBC 3.0 Fetching Generated Keys for Auto
WEB BASED TECHNOLOGIES Introduction Java Applet Dynamic Vs Static Content Common Gateway Interface (CGI) Java Script
Distributed Application Development Remote Method Invocation (RMI) Object Persistence and Serialization Introduction to Distributed Technology RMI Architecture
[20]
Importance of Naming Services RMI Registry Creating Registry Stub/ Skeleton Classes Developing Simple RMI Application
Java Beans Java Beans Java Beans Architecture Java Beans Characteristics Providing Properties & Methods Event in Java beans JAR File
Java Servlets Servlets Fundamentals /API Servlets as J2EE Web Component Servlets as an improved CGI Processing Html Forms What is Name-Value pair Content Types and MIME What is a Web-Container Servlets Life Cycle HTTP GET &POST Request Methods Configuration of Web Application Web.xml file Servlets URL Pattern Mapping Deployment Web Application in Tomcat & Web logic Servers State Management Cookies Hidden fields Http Session Filter URL Rewriting
Java Server Pages (JSP) Introduction Advantage-of-JSP-over-other Technology JSP Architecture Request/Response Application/Session Page Page Context JSP Basics & Syntax JSP Directive Page Directive Include Directive
[21]
Taglib Directive JSP Action Tags Forward Action Tag Include Action Tag JSP Script Related Tags Script let Tag Expression Tag Declaration Tag Use Bean Tag Set Property Tag Get Property Tag JSP Custom Tag Library Using Different Scope Objects Javax.sql (Extension to JDBC) Data source &Connection Pool
Using JDBC & JNDI
J2EE
J2EE J2EE Application J2EE Architecture Introduction to J2EE Components, Containers &Connectors. Packaging & Deploying J2EE Applications
Extensible Markup Language (XML) Introduction to XML XML DTD XML Schema JAXP- Java API for XML Processing (DOM & SAX)
JNDI Introduction to Naming & Directory Services Using JNDI JDBC Extension Review of JDBC
Enterprise Java Beans Introduction to Server-Side Components EJB Architecture Java RMI Over IIOP
Types of EJB
[22]
Session Beans Entity Beans Message Driven Beans
EJB Container Services Transactions Security Life Cycle Management State & Persistence of EJB Session Beans Designing & Developing Stateless Session Beans Designing & Developing State full Session Beans Deploying Session Beans Writing Standalone & Web Clients
Entity Beans Designing Persistent Components Difference Between “Create” of Session And Entity Beans Finding Entity Beans Bean vs. Container Managed Persistence Managed Persistence (CMP) Container Managed Fields Local Interfaces Mapping Relationship Between Entity Beans Mapping Relationships Between Database and Entity Beans Deployment Descriptor CMP EJB QL for Writing Custom Finders in CMP Invoking Entity Bean from Session Beans
JAVA Message Services (JMS) Introduction to Messaging Systems Benefits of Using JMS Pub / Sub Model Developing Message Driven Beans (MDB) Message Driven Beans & Transaction
FRAMEWORKS AND ADVANCED CONCEPTS
Struts and MVC Architecture MVC Architecture
[23]
MVC Model 1 and 2 in web Application Introduction to Struts Framework Configuring Struts Application Struts Configuration File Strut Controller Components Struts Model Components Struts View Components Action Forms Action Messages Action Errors JSP Custom Tag Libraries Tag Library Overview Tag Libraries in Struts Using Java Beans with Struts Tags Struts HTML Tags Exception Handling Action Error & Action Errors Adding Error Handling Action Form Validate Method Handling exceptions Declarative Exception Handling Struts Validation Mask Range
Spring What is spring Framework Inversion of Control Dependency Injection Bean Factory Developing First Spring Application Spring Container Built-in Bean Factories Application Context Bean Lifecycle in Container Spring Events Spring AOP Introduction to AOP Role of AOP in Spring AOP Advice AOP Point cuts Spring AOP Introductions Proxy Factory Bean Spring Data Access Spring O-R Mapping Spring Transaction Management
[24]
Spring Web MVC Framework Hibernate O-R Mapping Manipulating and Querying Hibernate Query Language Criteria Queries
Hibernate Introduction to Hibernate Hibernate Configuration Hibernate Concepts Native SQL Transactions and Concurrency
AJAX Introduction AJAX AJAX Internals XML Http Request Object AJAX UI Tags Div Tag Submit Tag Anchor Tag Tabbed Panel Tag Auto Completer Tag
JSF Introduction to JSF Overview on JSF Architecture JSF Request Processing Life Cycle Using JSF tag libraries Core tags and Html Tags Page Navigation
Handling Events Performing Validation Navigating between Pages
Web Services Introduction to Web Services SOAP request and response UDDI Services WSDL Examples on Web Services
JQUERY
INTRODUCTION
What is J Query? Pre Requirements Download & install J Query
[25]
Creating first page Tools Required HTML & CSS Overview
EVENTS
Bind & Unbind Helper Functions Event Object Other Event FunctionsMANIPULATING PAGE CONTENT
Creating New Content Manipulating Attributes Inserting Content Wrapping, Replacing, Removing Content Working with CSSJQUERY UI LIBRARY
Overview Widgets Effects & Theme Installations ANIMATION AND EFFECTS Showing & Hiding Elements Fading Elements Sliding Elements Custom Animations
TOOLS Log4j ANT CVSNT JASPER REPORTS JUNIT NSIS
DESIGN – PATTERNS
Standalone Application level
Singleton Java Class Synchronized Singleton Java Class Factory Method Factory
[26]
Abstract Factory DTO/VO Class Template Method Fast line Reader Adaptor Class Prototype Builder Inversion Of ControlWeb Application Level
MVC1 &MVC2 Front Controller Abstract Controller View Helper Composite View Intercepting Filter
Enterprise Application Level
DAO DAO Factory Business Delegate Service Locator Session Façade Message Façade
ANDROID
Chapter 1: Getting Started with Android Programming What is Android? Android Versions Features of Android Architecture of Android Android Devices in the Market The Android Market Obtaining the Required Tools
[27]
Eclipse Android SDK Android Development Tools (ADT) Creating Android Virtual Devices (AVDs) Creating Your First Android Application Anatomy of an Android ApplicationChapter 2: Activities and Intents
Understanding Activities Applying Styles and Themes to Activity Hiding the Activity Title Displaying a Dialog Window Displaying a Progress Dialog Linking Activities Using intents Resolving Intent Filter Collision Returning Results from an Intent Passing Data Using an Intent Object Calling Built-in Applications Using intents Understanding the Intent Object Using Intent Filters Adding Categories Displaying notificationsChapter 3: Getting to know the Android user interface
Understanding the Components of a Screen Views and View Groups Linear Layout Absolute Layout Table Layout Relative Layout Frame Layout Scroll View Adapting to Display Orientation Anchoring Views Resizing and Repositioning Managing Changes to Screen Orientation Persisting State Information during Changes
in Configuration Detecting Orientation Changes Controlling the Orientation of the Activity Creating the User interface Programmatically Listening for Ui notifications Overriding Methods Defined in an Activity Registering Events for Views
[28]
Chapter 4: Designing your user interface using views
Basic Views Text View ,Button, Image Button, Edit Text,
Check Box, Toggle Button, Radio Button, and Radio Group Views
Progress Bar View Auto Complete Text View Picker Views Time Picker View Displaying the Time Picker in a Dialog Window Date Picker View Displaying the Date Picker View in a Dialog
Window List Views List View Customizing the List View Using the Spinner ViewChapter 5: Displaying pictures and menus with views
Using image Views to Display Pictures Gallery and Image View Views Image Switcher Grid View Using Menus with Views Creating the Helper Methods Options Menu Context Menu Some Additional Views Analog Clock and Digital Clock ViewsChapter 6: Data Persistence
Saving and Loading User Preferences Using get Shared Preferences() Using get Preferences() Persisting Data to Files Saving to Internal Storage Saving to External Storage (SD Card) Choosing the Best Storage Option Using Static Resources Creating and Using Databases Creating the DB Adapter Helper Class Using the Database Programmatically
[29]
Adding Contacts Retrieving All the Contacts Retrieving a Single Contact Updating a Contact Deleting a Contact Upgrading the Database Pre-Creating the Database Bundling the Database with an ApplicationChapter 7: Content Providers
Sharing Data in Android Using a Content Provider Predefined Query String Constants Contents Projections Filtering Sorting Creating Your Own Content Providers Using the Content ProviderChapter 8: Messaging and networking
SMS Messaging Sending SMS Messages Programmatically Getting Feedback After Sending the Message Sending SMS Messages Using Intent Receiving SMS Messages Updating an Activity from a Broadcast
Receiver Invoking an Activity from a Broadcast
Receiver Caveats and Warnings Sending e-Mail Networking Downloading Binary Data Downloading Text Files Accessing Web Services Performing Asynchronous CallsChapter 9: Location-Based Services
Displaying Maps Creating the Project Obtaining the Maps API Key Displaying the Map Displaying the Zoom Control Changing Views
[30]
Navigating to a Specific Location Adding Markers Getting the Location That Was Touched Geo coding and Reverse Geo coding Getting Location Data Monitoring a LocationChapter 10: Developing Android Services
Creating Your Own Services Performing Long-Running Tasks in a Service Performing Repeated Tasks in a Service Executing Asynchronous Tasks on Separate Threads Using Intent Service Communicating between a Service and an
Activity Binding Activities to Services
Chapter 11: Publishing Android Applications
Preparing for Publishing Versioning Digitally Signing Your Android Applications Deploying APK Files Using the adb exe Tool Using a Web Server Publishing on the Android Market Creating a Developer Profile Submitting Your AppsChapter 12: Broadcast Receiver
Chapter 13: Notifications
Chapter 14: Android (Advanced)
Graphics Design Camera Handling Map Handling Video Handling Bluetooth Handlin
[31]
C#.NET 6.0
INTRODUCTION TO .NET What is .NET Purpose of .NET
DIFFERENCE BETWEEN .NET 3.0, 3.5, 4.0, 4.5 & 4.6INTRODUCTION TO .NET FRAMEWORK
What is .Net Framework CLR –what is Common Language Runtime .Net Class Library User and Program Interface Different Types of Application Working with Windows Application Working with Console Application Diff between Win forms and Console App ADVANCE FEATURES OF .NET FRAME
WORK 3.5,4.0 &4.5 What is a Service? Windows Communication Foundation
(WCF) Architecture of WCF Working with Different Contracts Difference between Web Services and
WCF Windows Presentation Foundation (WPF) Architecture of WPF Working with Different Layout Introduction to Windows Card Spaces
(WCS) Introduction to Windows Work Flow
Foundation (WFF) INTRODUCTION TO C#
What is C# Purpose of C# Language and Syntax
FUNDAMENTALS OF C# Data Types Operators Control Statements Arrays
[32]
Loop Variables arguments
COLLECTIONSWhy Collections?
Stack Queue Array List Sorted List Hash Table
OBJECT ORIENTED FEATURES OF C# Classes and Objects Data Member Access Modifiers & their Scope Method Static Constructor This Keyword Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface Using Interface Partial Class
FILE STREAMS Using File Classes File File Info Directory Directory Info Stream Writer Stream Reader Text Writer Text Reader
ARCHITECTURE OF WINDOWS FORMS Control Class Rich Control Class Scrollable Control Class Form Class
WINDOWS FORM CONTROL REFERENCE Link Label Panel Group Box
[33]
Data Picker Progress Bar Timer Login Grid view Masked Textbox Split Container Flow Layout Panel Folder Browser
VALIDATING CONTROLS Error Provider
DIALOG CONTROLS Color Dialog Save File Dialog Font File Dialog Open Dialog Folder Dialog
MENU CONTROLS Tool strip Status Strip Menu Strip Context Menu Strip Tool Strip Manager
EXCEPTION HANDLING Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception In-Built Exception Handling
NETWORK PROGRAMMING Introduction to Networking InetAddress URL TCP Socket and Server Socket UDP Socket
XML Introduction User Input How to create an XML file Use of Ad rotator control Access XML file usingADO.Net Read XML file Write XML file
DATA ACCESS USING ADO.NET Over view of ADO.Net
[34]
Life Cycle of ADO.Net Difference between ADO and ADO.Net
ADO.NET ARCHITECTURE AND OBJECT MODEL
Introduction to Dataset Introduction to Data adapter Manipulating database using Dataset Manipulating Oracle database using
Dataset Manipulating SQL Server database using
Dataset Manipulating of Remote database Manipulating XML Files using Data Access
Controls Executing Command OLEDB AND SQL CLIENT Providers Accessing Stored Procedures Accessing Stored Procedures with
Parameters Filter Data Using Database Handling Database errors
XML INTRODUCTION Role of XML in .Net XML Table Manipulation Insert Update Delete
ASSEMBLES Name Spaces Creating Private Assembly Creating Shared Assembly Strong Key Public Key Token Versioning Configuration Files Satellite Assemblies
COM INTEROPERABILITY Creating COM Components Runtime Callable Wrapper Com Callable Wrapper Calling COM Components Using C# Assessing Assemblies through COM
MANIPULATING THE FILES & REGISTRY Managing the Files Creating Directory
[35]
Reading and Writing of Files File Security
INTRODUCTION TO GDI+ Creating Graphics Objects with GDI+
CREATING CONTROLS Use Controls Types of Controls Adding Properties Adding Events User Windows in Control Form Host a windows control inside Microsoft Internet
Explorer MULTI THREADING
System Threading Thread Synchronization Thread Lifecycle
GLOBALIZATION Globalization and Localization of the UI
SECURITY Code Level Security
CRYPTOGRAPHY Cryptography Services Encrypt and Decrypt a file Generate and compare Hash value Cryptography primitive
WINDOW SERVICEWhat is a Service?Diff between Web Service and Window Service
Designing Windows services Installing and restring windows services Binding windows service to C#
application About SCM
DEPLOYMENT Planning the deployment Web based deployment, net-work based deployment Creating a Setup, Register Components
and Assemblies Install-Time compilation Adding Assemblies to the GAC Security Policy Verifications
REPORTS CRYSTAL REPORT
[36]
Crystal Report Viewer Crystal Report Source
SERIALIZATION What is Serialization? What is De-Serialization? Using Binary formatter Using SOAP Formatter
REMOTING Introduction to Remoting Passing Objects to Remote Method
GENERICS Generics Collection Classes Create Customer Generic Class Generic Delegates
MEMORY MANAGEMENT & POINTER Memory Management under the hood Freezing Unmanaged Resources Unsafe Code
DATA CONTROLS Data Grid View Dataset Binding Source Binding Navigator
CONTAINER CONTROLS Panel Group Box Flow Layout Control Table Layout Control Tab Control Split Container
WPF Introduction What is WPF Goals, Benefits & Drawbacks First WPF Application Types of WPF Application (Windows
Based and Browser Based) XAML
Introduction to XAML XAML – Extensible Application Markup
Language. Content Models
WORKING WITH CONTROLS Menus Label
[37]
Button Checkbox Radio Button Repeat Button Toggle Button ToolTip Expander Group Box Textbox Combo Box List Box Menu
Status Bar Tab Control Toolbar Tree View Notify Icon Menus and Toolbars
Layout Border Canvas Dock Panel Grid Stack Panel Wrap Panel
ASP.NET 4.5, 4.6
INTRODUCTION TO WEB APPLICATIONS Overview of ASP Overview of ASP.Net Page Code In-Line Model Code Behind Model
HTML Introduction to .Net Frame Work Working with HTML Controls Overview of Attributes.
WHAT IS DOTNET FRAME WORK Common Language Runtime (CLR) .Net Class Framework–User and Program
Interface. Net Common Type System(CTS) Common Language Specification (CLS). MSIL(Microsoft Intermediate Language)
INTRODUCTION TO ASP.NET
[38]
What is ASP.Net? Complete Life Cycle of Asp.Net Page. Difference between ASP and ASP.Net. Execution Process of .Net Application.
ADVANCE FEATURES OF .NET FRAME WORK Windows Communication Foundation
(WCF) Windows Presentation Foundation (WPF) Windows Card Spaces (WCS) Windows Work Flow Foundation (WFF) Client Server Architecture 3-Tier/N-Tier Architecture
INTRODUCTION TO VB.NET AND C#.NET LANGUAGE
Variables declaration Encapsulation Abstraction Inheritance Polymorphism Delegates Exception Handling
ASP.NET WEB FORMS Introduction to Web Forms Working with Server Controls Rich Controls Customization
ASP.NET WEB CONTROLS HTML Server Controls Web Server Controls Data Bound Controls. Grid View Data List Repeater Details View Forms View List View
VALIDATION CONTROLS Required Field Validate Compare Validate Regular Expression Validate Range Validate Custom Validate Validation Summary
WORKING WITH MASTER PAGE
[39]
Creation of Master Page. Creation of Content Page. Working with Content Placeholder Creation of Main Page Including Navigation Controls.
DATA ACCESS USING ADO.NET Overview of ADO.NET ADO.NET architecture and object model Introduction to Dataset Difference between Dataset and Record
set Data binding Retrieving data using OLEDB and
SQLCLIENT Providers Introduction to Data adapter Manipulating databases using Dataset Manipulating of Oracle database using
Dataset Manipulating of SQL Server database
using Dataset Manipulation of Remote Access Database Manipulation using XML datasheet Using Data access controls Executing Command Populate Dataset Filter Data
WORKING WITH BUSINESS OBJECTSNAMESPACE WITH DLL
Creating DLL Calling DLL Database Connectivity Using DLL
COM INTEROPERABILITY RCW CCW
CONFIGURATION Configuration overview Overview of WEB.Config file Configuration file format CONFIGURATION FILES Overview of Machine.Config file Working with WEB.Config File Retrieving configuration Provide connection string Difference between WEB.Config file and
[40]
Machine.Config file XML WEB SERVICES
Create Web Services Consuming Web Services. WSDL (metadata generation).
INTRODUCTION TO SOAP, UDDI, WSDLWEB FORMS USER CONTROL
Introduction to User Control (.ascx) Creating User Control for Asp.Net page Customizing ASP.Net application Using user control-Assemblies
ASP.NET WEB APPLICATION Application overview Using the Global.asax file Managing application state Event Handlers
CACHE FEATURES What is Caching? Use of Cache. Caching overview Data caching Page output caching Fragment caching
DEBUGGING The SDK Debugger
SECURITY OVERVIEW Authentication and Authorization Windows based Authentication Forms based Authentication Authorizing users and roles Users account Impersonation Security and Web Services Passport Authentication
GLOBALIZATION User encodings Setting current culture and region Handling multiple encoding Globalization and Localization of the UI Changing culture by using Config.file
TRACING Tracing overview Trace logging to page output Application level traces logging Writing Trace Messages.
DEPLOYMENT
[41]
Deploying Applications Using the Process Models Types of Deployment.
IIS (Internet Information Server).Introduction to IIS.
Different Version of IIS Deploy Asp.Net Application using IIS.
STATE MANAGEMENT What is State Management? Type of Techniques used. Page Life Cycle without state. Page Life Cycle with State.
STATE TECHNIQUES Sessions Cookies View State Query String Application. Hidden Fields. Diff between session and Application Choosing best State Management
WITH DATASOURCES SqlData Source Access Data Source Object Data Source XML Data Source Sitemap Data Source Linq Data Source Entity Data Source
WCF
Introduction Architecture of WCF Evolution of WCF Evolution of Service Oriented Architecture
(SOA) What is WCF
Developing WCF Service Application and Client
Hosting WCF Service in IIS/ASP.NET Development Server
Using a Service in the client application Contracts
Service Contract.
[42]
Operation Contract. Data Contract.
Endpoints in configuration file What are End points? ABC - Address, Binding & Contract. Importance of IMetadataExchange
Contract / Endpoint. Configuring service behavior in
configuration file WCF Service Configuration Editor
AJAX
Introduction to AJAX
What is AJAX? Ajax rich clients in the real world Ajax advantages and disadvantages The purpose of AJAX Traditional web application An AJAX web application Alternatives to Ajax AJAX Components key elements of Ajax
Ajax Controls
Script Manager Script Manager Proxy Update Panel Update Progress Control Timer Control
Ajax Extension Control Tool Kit
SILVERLIGHT
INTRODUCTION TO SILVERLIGHT What is Silver light? Tools for creating Silver light Applications Difference in versions
[43]
Different types of Applications in Silver light
ARCHITECTURE OF SILVERLIGHT
HOW IT IS USED WITH .NET
DEVELOPING FIRST SILVERLIGHT APPLICATION
SILVERLIGHT AND XAML
SILVERLIGHT UI CONTROLS Layout Management and Grouping
Controls Form Controls Data Integration and Data Manipulation
Controls Functional Controls Navigation
CLOUD COMPUTING
OVERVIEW D-COMPUTING Trends of computing Introduction to distributed computing Next big thing: cloud computing
INTRODUCTION What’s cloud computing Properties & Characteristics Service models Deployment models
IAAS Introduction to IAAS
PAAS Introduction to PAAS Cloud platform & Management
Computation
[44]
Storage Case studies
SAAS Introduction to SAAS Web services
CLOUD ISSUES AND CHALLENGES
Introduction
Introduction to business analytical tools What is spot fire
Data access
Interactive visualizations Underlying data tables(s) Basic layout Open form files Import settings Open from databases Library
Create visualizations
Bar chart & properties Histogram & trellis Line chart & dates Graphical tables Lines as patterns Combination charts Scatter plots & coloring Pie charts & size scale Tables and display value
Interactivity
[45]
SPOTFIRE
Tooltip display How to mark, drill down Details on demand Multiple marking Details visualization Filter types , hide filters Marking to filter data Filtering scheme Ways to limit data
Save & export
Save linked to source data Save data embedded Save analysis as a file Save as a library item Reload linked data Replace data table Export data Export images
Add data
Calculated columns Binned columns Hierarchies Insert columns Insert rows Multiple data tables Manage relations Transformations
Capturing the analysis
Add bookmark Apply bookmark Special bookmark
Other visualizations
Tree map Box plot Map chart Heat map
[46]
Advanced concepts
Custom expressions K-means clustering Information model Information designer Information links
Administration
Architecture
Mange services
Schedule updates
Interdiction and overview
Why tableau? Why visualization? Level setting – terminology Getting started – creating some powerful
visualization quickly Things you should known about tableau
Getting started
Connecting to data and introduction to data source concepts of working with data files versus database servers
Understanding the tableau workspace Dimensions and measures Using show me! Tour of shelves (how shelves and marks
work) Building basic views Help menu and samples Shaving and sharing your work
[47]
TABLEAU
Concepts and options when connecting to data
Overview of other connection options Joining multiple tables Data blending copy and paste data
extracts Custom SQL Publishing and Re-using data connections Understand how to deal with data
changes in your data source such as field addition, deletion or name change
Re-using and sharing data connections – the concept of meta data
Working with multiple connections in the same workbook
Analysis
Creating views Marks Size and transparency Highlighting Working with dates Date aggregations and date parts Discrete versus continuous Dual axis / multiple measures Combo charts with different marks types
o Geographic mapo Page trails o Heat map o Density charto Scatter plotso Pie charts and bar charts o Small multiples o Working with aggregate versus
disaggregate data
Analyzing
o Sorting & grouping o Aliases o Filtering and quick filters
[48]
o Cross – tabs (pivot tables ) totals and subtotals
o Drilling and drill througho Aggregation and disaggregation
percent of total o Working with statistics and trend
lines
Getting started with calculated fields
Working with string functions Basic arithmetic calculations Date math Working with totals Custom aggregations Logic statements
Formatting
Options in formatting your visualization Working with labels and annotations Effective use of titles and captions Introduction to visual vest practices
Building interactive dashboards
Combining multiple visualizations into a dashboard
Making your worksheet interactive by using actions and filters
An introduction to best practices in visualization
Sharing workbooks
Publish to reader Packaged workbooks Publish to office Publish to pdf Publish to tableau server and sharing
over the web
Putting it all together
[49]
Scenario-based review exercises Best practices
Where to get further assistance
The help file / product manual Knowledge base Forums Whitepapers & books Further training offerings & professional
services technical support
[50]