IEEE 2015-2016 PROJECTS Technology: JAVA(J2SE & J2EE) S. No 1 2 3 4 5 6 7 8 9 10 11 12 13 PROJECT TITLES Context-Based Diversification for Keyword Queries over XML Data Malware Propagation in Large-Scale Networks On Summarization and Timeline Generation for Evolutionary Tweet Streams Progressive Duplicate Detection Reverse Nearest Neighbors in Unsupervised DistanceBased Outlier Detection Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services Towards Effective Bug Triage with Software Data Reduction A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks A Proximity-Aware Interest-Clustered P2P File Sharing System Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks User-Defined Privacy Grid System for Continuous Location-Based Services A Computational Dynamic [1] Trust Model for User Authorization A Lightweight Secure Scheme for Detecting Provenance 14 Forgery and Packet Drop Attacks in Wireless Sensor Networks 15 16 17 18 19 20 21 22 23 Continuous and Transparent User Identity Verification for Secure Internet Services Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Secure Distributed Deduplication Systems with Improved Reliability A Framework for Secure Computations with Two Non- 24 Colluding Servers and Multiple Clients, Applied to Recommendations 25 26 Effective Key Management in Dynamic Wireless Sensor Networks Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter [2] 27 28 29 An Attribute-Assisted Reranking Model for Web Image Search EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval Learning to Rank Image Tags With Limited Training Examples Designing High Performance Web-Based Computing 30 Services to Promote Telemedicine Database Management System 31 32 33 34 35 36 37 38 39 40 41 42 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Detecting Malicious Face book Applications Key Updating for Leakage Resiliency with Application to AES Modes of Operation Security-Evaluation-Of-Pattern-Classifiers-Under-Attack Facilitating-Document-Annotation-Using-Content-AndQuerying-Value Securing-Broker-Less-Publishsubscribe-Systems-UsingIdentity-Based-Encryption Fast-Nearest-Neighbor-Search-With-Keywords Traffic-Pattern-Based-Content-Leakage-Detection-ForTrusted-Content-Delivery-Networks Top-K-Query-Result-Completeness-Verification-In-TieredSensor-Networks Optimal Distributed Malware Defense in Mobile Networks [3] with Heterogeneous Devices 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing SOS: A Distributed Mobile Q&A System Based on Social Networks Towards Online Shortest Path Computation Boundary Cutting for Packet Classification An Incentive Framework for Cellular Traffic Offloading Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks Detection And Localization Of Multiple Spoofing EAACK—A Secure Intrusion-Detection System For Manets Vampire Attacks Draining Life From Wireless Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Multiparty Access Control for Online Social Networks Model and Mechanisms Cooperative-Caching-For-Efficient-Data-Access-InDisruption-Tolerant-Networks Cost-Effective-Resource-Allocation-Of-Overlay-RoutingRelay-Nodes A Scalable Server Architecture For Mobile Presence Services In [4] JAVA ANDROID PROJECTS ENVIRONMENT DETAILS:ANDROID,SQLITE S. No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 PROJECT TITLES A Location- and Diversity-aware News Feed System for Mobile Users Context-Based Access Control Systems for Mobile Devices Cooperative Positioning and Tracking in Disruption Tolerant Networks CWC: A Distributed Computing Infrastructure Using Smartphone’s Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications Privacy-Preserving Relative Location Based Services for Mobile Users The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds User Privacy and Data Trustworthiness in Mobile Crowd Sensing User-Defined Privacy Grid System for Continuous Location-Based Services Effective Risk Communication for Android Apps Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks Meet You – Social Networking on Android [5] 15 16 MOSES: Supporting and Enforcing Security Profiles on Smart phones T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence CLOUD COMPUTING Technology:JAVA,J2EE&MYSQL S. No 1 2 3 4 5 6 7 8 9 10 11 PROJECT TITLES A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing A Secure and Dynamic Multi-keyword Ranked Search Scheme Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Audit-Free Cloud Storage via Deniable Attribute-based Encryption Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Identity-Based Encryption with Outsourced Revocation in Cloud Computing Provable Multicopy Dynamic Data Possession in Cloud Computing Systems Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Decentralized-Access-Control-With-AnonymousAuthentication-Of-Data-Stored-In-Clouds Distributed--Concurrent--And-Independent-Access-ToEncrypted-Cloud-Databases [6] 12 13 14 15 16 17 18 19 Scalable-Distributed-Service-Integrity-Attestation-ForSoftware-As-A-Service-Clouds A-Hybrid-Cloud-Approach-For-Secure-AuthorizedDeduplication Oruta-Privacy-Preserving-Public-Auditing-For-SharedData-In-The-Cloud A-Stochastic-Model-To-Investigate-Data-CenterPerformance-And-Qos-In-Iaas-Cloud-Computing-Systems Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud Cloud A Framework Of Adaptive Mobile Video Streaming And Efficient Social Video Sharing In Cloudmov Cloud-Based Mobile Social TV WEB APPLICATIONS Technology: JAVA J2EE,TOMCAT,ORACLE S. No PROJECT TITLES 1 An-efficient-Mailing-System-for-Detecting-Spam-Mails 2 Annotating-Search-Results-from-Web-Databases 3 A-Secure-Cloud-server-System-using-Proxy-ReEncryption-Model 4 Attribute-based-Encryption-System-for-Secured-DataStorage 5 Automatic-Testing-System-for-Web-Application 6 Generalized-Flow-Based-Method-for-Analysis-of-ImplicitRelationships-on-Wikipedia 7 Automated e-government certificates 8 Friend book: A Semantic-based Friend Recommendation [7] System for Social Networks 9 QOS: Ranking Prediction For Cloud Services 10 Fully Anonymous Profile Matching In Mobile Social 11 Collaboration in Multi cloud Computing Environment 12 A Cocktail Approach for Travel Package Recommendation 13 Web Based Framework of Project Performance and Control system 14 Validation of Code Words Through Images 15 Student Project Allocation and Mgmt system 16 Secrecy protecting account for Data Storage Security 17 The Mobile Agent Based service software in Internet Environment 18 Going Back and Fourth efficient Multi Deployment and Multi snapshot 19 E-Banking 20 Credit Card Fiddles 21 Database Elasticity 22 Management of Vitality Cards 23 Standing Spatial Information 24 E-Housing 25 News Bulletin System 26 Loan Lending 26 Venue Maintenance System 27 Medical Allowances Controlling System 28 Internet Protocol Television System 29 AMES 30 CAM 31 Secure Data Sharing for multi owners [8] 32 Online Itemization Section 33 Disburse Mobile Scheme 34 Motel Resource Tool 35 Credit Card Fiddles 36 E-Counseling 37 Mobile Presence Server 38 Loan Lending 39 VISA Dispensing System 40 Resource Management System 41 Jellybean Maneuvering Appropriation And Conclave [9] 2015-2016 IEEE PROJECTS Technology: DOTNET S. No 01 PROJECT TITLES Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites. 02 Discovery of Ranking Fraud for Mobile Apps. 03 Query Aware Determinization of Uncertain Objects. 04 05 06 07 08 09 10 11 12 13 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization. Defeating Jamming With the Power of Silence: A GameTheoretic Analysis. Universal Network Coding-Based Opportunistic Routing for Unicast. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks. Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. An Attribute-Assisted Reranking Model for Web Image Search. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images. 14 Detection and Rectification of Distorted Fingerprints. 15 Learning Fingerprint Reconstruction: From Minutiae to [10] Image. 16 17 18 19 20 21 22 23 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation. An Empirical Performance Evaluation of Relational Keyword Search Techniques. Supporting Privacy Protection in Personalized Web Search. Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality. Typicality-Based Collaborative Filtering Recommendation. Secure Mining of Association Rules in Horizontally Distributed Databases. Product Aspect Ranking and its Applications. Secure Data Retrieval for Decentralized DisruptionTolerant Military Network. 24 Autonomous Mobile Mesh Networks. 25 The Target Tracking in Mobile Sensor Networks. 26 27 28 29 30 31 Certificate less Remote Anonymous Authentication Scheme for Wireless Body Area Networks. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. Multicast capacity in MANET with Infrastructure Support. Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic. Preserving Location Privacy in Geo social Applications. Privacy Preserving Data Sharing With Anonymous ID Assignment. 32 A cocktail approach for travel package recommendation. 33 Efficient Data Query in Intermittently-Connected Mobile [11] Ad hoc Social Networks. 34 35 36 37 38 39 40 41 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks. Optimal content downloading in Vehicular Network. Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing. Topology control in mobile ad hoc networks. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks. Network Assisted Mobile Computing with Optimal Uplink Query Processing. Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection. CLOUD COMPUTING 01 02 03 04 05 06 Cloud-Based Multimedia Content Protection System. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem. Identity-Based Distributed Provable Data Possession in Multicloud Storage. 07 PSMPA: Patient Self-Controllable and Multi-Level PrivacyPreserving Cooperative Authentication in Distributed m- [12] Healthcare Cloud Computing . 08 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers. 09 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. 10 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. 11 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 12 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. 13 Distributed, Concurrent, and Independent Access to Encrypted Cloud Data. 14 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. 15 Privacy-Preserving Public Auditing for Secure Cloud Storage in Public Clouds. 16 Balancing Performance, Accuracy and Precision for Secure Cloud Transactions. WEB APPLICATIONS 01 User-Query-Dependent Ranking For Web Databases. 02 Data Storage security in cloud computing. 03 Error Tracking System. 04 Expert answer. 05 Efficient Computation of Range Aggregates against uncertain location based queries. 06 Exploring Application-Level Semantics for Data Compression. 07 Exploiting Dynamic Resource Allocation for Efficient [13] Parallel Data Processing in the Cloud. 08 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques. 09 Vulnerability analysis in SOA-based business processes. 10 Asset boutique. 11 Monitoring Service Systems from a Language-Action Perspective. 12 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. 13 MONA: Secure Multi-Owner Data Sharing for Dynamic Groups in the Clouds. 14 Consistency as a Service: Auditing Cloud Consistency. 15 A system to filter unwanted messages from OSN user walls. 16 Web Information Gathering Based on Ontology model. 17 Collective Behavior of Scalable learning. 18 Go-Between Socially-Enhanced Virtual Communities. 19 A Gen2-based RFID Authentication Protocol for Security and Privacy. 20 Monitoring System. 21 Online Art Gallery. 22 Gateway Accessory. 23 E-voting. 24 Internet File Sharing. 25 Cybernetics protector. 26 Scalable record linkage and deduplication. 27 Garbage Collection System. 28 Commodity Sustenance. 29 Affluence Management. [14] 30 Global Warning System. 31 Blog Application. 32 Go-Vegetarian. 33 Online Classifieds. 34 Municipal Administration system. 35 Online Advertise. 36 Cab Services. 37 Census. 38 Orphan Management System. 39 Vessel Consignment. 40 Genco Mailing System. 41 Village morphogenesis. 42 Ranking Model Adaptation for Domain-Specific Search. 43 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators. 44 Bridging Socially-Enhanced Virtual Communities. [15] 2015-16 PROJECTS Technology: Embedded System S.NO PROJECT TITLES 01 ARM Platform For Vehicular Monitoring And Tracking. 02 Advance question paper leakage control system design. 03 GPS Based Asset/Vehicle/Animal/Child Tracking System. 04 Automatic Power Meter Reading Using GSM Network. 05 Advance home security for intruder detection with auto paging/dialing. 06 Wireless remote and status enquiry for smart industries. 07 Vehicle ignition security with dynamic password generation. 08 Emergency alert for women safety with location tracking. 09 E-VOTING system to avoid anti rigging. 10 11 12 13 14 15 A proposed system for advance security and automation in metro trains to prevent accidents. Advance home security for intruder detection with auto paging/dialing. Microcontroller based customizable wireless sensor node to detect hazardous gas pipeline leakage. Real time vehicle parameter monitoring with continuously tracking of a VIP VEHICLE. Real-time control system for air pollution detection in vehicles. Human health monitoring mobile phone application by using embedded system. 16 Electronic service provider with billing . 17 RFID AND ZIGBEE based manufacturing monitoring system 18 The design and implementation of intelligent campus security tracking system based on RFID and ZIGBEE. [16] 19 RFID and GSM based intelligent courier mailbox system. 20 RFID remote parent care. 21 RFID assisted navigation systems in public vehicles 22 Universal remote control with haptic interface 23 Construction of microcontroller based touch screen mobile phone with password protected features 24 Modern prepaid energy system 25 E-MEDICAL emergency for patients 26 Smart pad for examination 27 E-WALLET system for salary payment of employs 28 Employee login and logout management system 29 High secured data exchange with encryption 30 31 32 Smart remote control system of high efficiency and Intelligent street lighting Economical fully centralized system in building automation with wireless sensor networks Smart remote control system of high efficiency and intelligent street lighting Green home energy management system through 33 comparison of energy usage between the same kinds of home appliances 34 live bus stops and modern buses technology 35 Automatic parking guidance with prepaid car parking 36 Traffic congestion control with automatic signal clearance 37 38 39 Perpetual and low-cost power meter for monitoring residential and industrial appliances Smart back pack for visually impaired person Multi-patient health monitoring system for corporate hospitals [17] 40 Design of sphygmus data acquisition platform 41 College bus information to students 42 Intelligent street light automation with illumination control 43 44 45 46 47 The remote control of mobile robot based on embedded technology A multipurpose robot for military Ultrasonic spectacles and waist-belt for visually impaired and blind person Vehicle accident avoidance with road adverse conditions monitoring A safety system for mine workers in heavy industries PROJECTS Technology: MATLAB 2015-2016 IEEE PROJECTS PROJECT TITLES S. No 1 2 3 4 5 6 7 A Feature-Enriched Completely Blind Image Quality Evaluator A No-Reference Texture Regularity Metric Based on Visual Saliency A Probabilistic Approach for Color Correction in Image Mosaicking Applications Boundary Detection Using Double-Opponency and Spatial Sparseness Constraint Combining Left and Right Palm print Images for More Accurate Personal Identification Face Recognition across Non-Uniform Motion Blur, Illumination, and Pose Face Sketch Synthesis via Sparse Representation-Based Greedy Search [18] 8 9 10 11 12 13 14 15 16 17 Fractal Analysis for Reduced Reference Image Quality Assessment Image Denoising by Exploring External and Internal Correlations Image Super-Resolution Based on Structure-Modulated Sparse Representation Multifocal Image Fusion Based on NSCT and Focused Area Detection Pareto-Depth for Multiple-Query Image Retrieval Revealing the Trace of High-Quality JPEG Compression through Quantization Noise Analysis Reversible Image Data Hiding with Contrast Enhancement Robust Representation and Recognition of Facial Emotions Using Extreme Sparse Learning Steganography Using Reversible Texture Synthesis Variable-Length Signature for Near-Duplicate Image Matching A New Secure Image Transmission Technique via Secret- 18 Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations 19 20 An Efficient Parallel Approach for Sclera Vein Recognition BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification Designing an Efficient Image Encryption-Then Compression 21 System via Prediction Error Clustering and Random Permutation 22 23 Digital Image Sharing by Diverse Image Media Dual-Geometric Neighbor Embedding for Image Super Resolution With Sparse Tensor [19] 24 25 26 27 28 29 30 31 32 Exposing Digital Image Forgeries by Illumination Color Classification Fingerprint Compression Based on Sparse Representation Hyperspectral Image Classification Through Bilayer GraphBased Learning Images as Occlusions of Textures: A Framework for Segmentation Low-Rank Neighbor Embedding for Single Image SuperResolution Mining Weakly Labeled Web Facial Images for SearchBased Face Annotation Phase-Based Binarization of Ancient Document Images: Model and Applications Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A Unified Framework Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration 33 A Unified Data Embedding and Scrambling Method 34 Characterness: An Indicator of Text in the Wild [20] PROJECTS Technology: VLSI 2015-2016 IEEE PROJECTS S. No 01 02 03 04 05 PROJECT TITLES A Combined SDC-SDF Architecture for Normal I/O Pipelined Radix-2 FFT A High-Performance FIR Filter Architecture for Fixed and Reconfigurable Applications A High-Speed FPGA Implementation of an RSD-Based ECC Processor Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic An Accuracy-Adjustment Fixed-Width Booth Multiplier Based on Multilevel Conditional Probability An Efficient Constant Multiplier Architecture Based on 06 Vertical-Horizontal Binary Common Sub-expression Elimination Algorithm for Reconfigurable FIR Filter Synthesis 07 08 09 10 11 12 An Efficient VLSI Architecture of a Reconfigurable PulseShaping FIR Interpolation Filter for Multi-standard DUC Array-Based Approximate Arithmetic Computing: A General Model and Applications to Multiplier and Squarer Design Design of Self-Timed Reconfigurable Controllers for Parallel Synchronization via Wagging Exact and Approximate Algorithms for the Filter Design Optimization Problem Fault Tolerant Parallel Filters Based on Error Correction Codes Graph-Based Transistor Network Generation Method for Supergate Design [21] 13 14 15 16 17 18 19 High - Throughput Finite Field Multipliers Using Redundant Basis for FPGA and ASIC Implementations Level-Converting Retention Flip-Flop for Reducing Standby Power in Zig Bee SoCs Novel Design Algorithm for Low Complexity Programmable FIR Filters Based on Extended Double Base Number System Optimal Factoring of FIR Filters Recursive Approach to the Design of a Parallel Self-Timed Adder Reliable Low-Power Multiplier Design Using Fixed-Width Replica Redundancy Block Reverse Converter Design via Parallel-Prefix Adders: Novel Components, Methodology, and Implementations A New Efficiency-Improvement Low-Ripple Charge-Pump 20 Boost Converter Using Adaptive Slope Generator With Hysteresis Voltage Comparison Techniques 21 22 23 A New Parallel VLSI Architecture for Real-time Electrical Capacitance Tomography A novel approach to realize Built-in-self-test(BIST) enabled UART using VHDL A Novel Area-Efficient VLSI Architecture for Recursion Computation in LTE Turbo Decoders A Novel Photosensitive Tunneling Transistor for Near- 24 Infrared Sensing Applications: Design, Modeling, and Simulation A Relative Imaging CMOS Image Sensor for High Dynamic 25 Range and High Frame-Rate Machine Vision Imaging Applications 26 A Voltage Monitoring IC With HV Multiplexer and HV [22] Transceiver for Battery Management Systems Accelerating Scalar Conversion for Koblitz Curve 27 Crypto processors on Hardware Platforms Aging-Aware Reliable Multiplier Design with Adaptive Hold 28 Logic 29 All Digital Energy Sensing for Minimum Energy Tracking 30 An Efficient List Decoder Architecture for Polar Codes SPOTFIRE & TABLEAU PROJECTS LIST Sales analytics Cost analysis of pharma industry Trend analysis of oil and gas industry Council of medical and research Finance score card of sales industry Spares analytics Part analysis Keyword analysis Summary analysis of automobile industry Cost driver analysis Growth trend analysis Health care Performance analysis of wells in oil and gas industry Clinical research on diseases Power Distribution & Energy Utilities Transportation & logistics Product Comparison Analysis Inventory Analysis Top Bottom Analysis of organization Drill down Analysis [23] TRAINING COURSES ON DIFFERENT TECHNOLOGIES CORE - JAVA Introduction to Java Framework What is Java Architecture of JVM Characteristic of java Technology Importance for Internet Fundamentals of Java Data Types Operators Control Statements Arrays Loop Variables arguments OOP with Java Classes and Objects Data Member Method Static Constructor This Keyword Casting Object Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface [24] Using Interface Packages Why Package Understanding Class path Access Modifiers & their Scope Java Utile Package Date Enumeration Vector Properties Hash table Collection & Iterate interface List and Array List Exception Handling Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception I/O Operation in Java Byte Oriented Streams File Handling Reader and Writers Multithreaded programming Introduction to Multi-Threading Understanding Thread Java Threading Model Thread class & Run able Interface Thread priorities [25] Thread Synchronization Inter thread Communication Preventing Deadlocks Network programming Introduction to Networking I net Address URL TCP Socket and Server Socket UDP Socket Developing a Chat Application Abstract Window Toolkit Graphics Color and Font AWT Component/Controls Event handling &Layouts Frames and Menus Images and Animation Applets Applet Basics Applet Life Cycle Applet Skeleton Applet Example Inner Classes Nested Top Level Classes Member Classes Local Classes Anonymous Classes Swing Programming Introduction to Swing and MVC Architecture [26] Light Weight Component Swing Hierarchy Atomic Component Intermediate Container Top-Level Container Swing related Events ADVANCED - JAVA Java Database Connectivity (JDBC) Introduction to JDBC JDBC Architecture Types of JDBC Drivers Establishing a JDBC Connection Using Statement Using Prepared Statement Using Callable Statement Using properties file Scrollable Result Set Editable Result Set Batch Updates New Feature introduced in JDBC 3.0 Fetching Generated Keys for Auto WEB BASED TECHNOLOGIES Introduction Java Applet Dynamic Vs Static Content Common Gateway Interface (CGI) Java Script Distributed Application Development [27] Remote Method Invocation (RMI) Object Persistence and Serialization Introduction to Distributed Technology RMI Architecture Importance of Naming Services RMI Registry Creating Registry Stub/ Skeleton Classes Developing Simple RMI Application Java Beans Java Beans Java Beans Architecture Java Beans Characteristics Providing Properties & Methods Event in Java beans JAR File Java Servlets Servlets Fundamentals /API Servlets as J2EE Web Component Servlets as an improved CGI Processing Html Forms What is Name-Value pair Content Types and MIME What is a Web-Container Servlets Life Cycle HTTP GET &POST Request Methods Configuration of Web Application Web.xml file Servlets URL Pattern Mapping Deployment Web Application in [28] Tomcat & Web logic Servers State Management Cookies Hidden fields Http Session Filter URL Rewriting Java Server Pages (JSP) Introduction Advantage-of-JSP-over-other Technology JSP Architecture Request/Response Application/Session Page Page Context JSP Basics & Syntax JSP Directive Page Directive Include Directive Taglib Directive JSP Action Tags Forward Action Tag Include Action Tag JSP Script Related Tags Script let Tag Expression Tag Declaration Tag Use Bean Tag Set Property Tag Get Property Tag [29] JSP Custom Tag Library Using Different Scope Objects Javax.sql (Extension to JDBC) Data source &Connection Pool Using JDBC & JNDI J2EE J2EE J2EE Application J2EE Architecture Introduction to J2EE Components, Containers &Connectors. Packaging & Deploying J2EE Applications Extensible Markup Language (XML) Introduction to XML XML DTD XML Schema JAXP- Java API for XML Processing (DOM & SAX) JNDI Introduction to Naming & Directory Services Using JNDI JDBC Extension Review of JDBC Enterprise Java Beans Introduction to Server-Side Components [30] EJB Architecture Java RMI Over IIOP Types of EJB Session Beans Entity Beans Message Driven Beans EJB Container Services Transactions Security Life Cycle Management State & Persistence of EJB Session Beans Designing & Developing Stateless Session Beans Designing & Developing State full Session Beans Deploying Session Beans Writing Standalone & Web Clients Entity Beans Designing Persistent Components Difference Between “Create” of Session And Entity Beans Finding Entity Beans Bean vs. Container Managed Persistence Managed Persistence (CMP) Container Managed Fields Local Interfaces Mapping Relationship Between Entity Beans [31] Mapping Relationships Between Database and Entity Beans Deployment Descriptor CMP EJB QL for Writing Custom Finders in CMP Invoking Entity Bean from Session Beans JAVA Message Services (JMS) Introduction to Messaging Systems Benefits of Using JMS Pub / Sub Model Developing Message Driven Beans (MDB) Message Driven Beans & Transaction FRAMEWORKS AND ADVANCED CONCEPTS Struts and MVC Architecture MVC Architecture MVC Model 1 and 2 in web Application Introduction to Struts Framework Configuring Struts Application Struts Configuration File Strut Controller Components Struts Model Components Struts View Components Action Forms Action Messages Action Errors JSP Custom Tag Libraries Tag Library Overview Tag Libraries in Struts Using Java Beans with Struts Tags [32] Struts HTML Tags Exception Handling Action Error & Action Errors Adding Error Handling Action Form Validate Method Handling exceptions Declarative Exception Handling Struts Validation Mask Range Spring What is spring Framework Inversion of Control Dependency Injection Bean Factory Developing First Spring Application Spring Container Built-in Bean Factories Application Context Bean Lifecycle in Container Spring Events Spring AOP Introduction to AOP Role of AOP in Spring AOP Advice AOP Point cuts Spring AOP Introductions Proxy Factory Bean Spring Data Access Spring O-R Mapping [33] Spring Transaction Management Spring Web MVC Framework Hibernate O-R Mapping Manipulating and Querying Hibernate Query Language Criteria Queries Hibernate Introduction to Hibernate Hibernate Configuration Hibernate Concepts Native SQL Transactions and Concurrency AJAX Introduction AJAX AJAX Internals XML Http Request Object AJAX UI Tags Div Tag Submit Tag Anchor Tag Tabbed Panel Tag Auto Completer Tag Introduction to JSF Overview on JSF Architecture JSF Request Processing Life Cycle Using JSF tag libraries Core tags and Html Tags Page Navigation JSF [34] Handling Events Performing Validation Navigating between Pages Web Services Introduction to Web Services SOAP request and response UDDI Services WSDL Examples on Web Services JQUERY INTRODUCTION What is J Query? Pre Requirements Download & install J Query Creating first page Tools Required HTML & CSS Overview EVENTS Bind & Unbind Helper Functions Event Object Other Event Functions MANIPULATING PAGE CONTENT Creating New Content Manipulating Attributes Inserting Content [35] Wrapping, Replacing, Removing Content Working with CSS JQUERY UI LIBRARY Overview Widgets Effects & Theme Installations ANIMATION AND EFFECTS Showing & Hiding Elements Fading Elements Sliding Elements Custom Animations TOOLS Log4j ANT CVSNT JASPER REPORTS JUNIT NSIS DESIGN – PATTERNS Standalone Application level Singleton Java Class Synchronized Singleton Java Class Factory Method Factory Abstract Factory [36] DTO/VO Class Template Method Fast line Reader Adaptor Class Prototype Builder Inversion Of Control Web Application Level MVC1 &MVC2 Front Controller Abstract Controller View Helper Composite View Intercepting Filter Enterprise Application Level DAO DAO Factory Business Delegate Service Locator Session Façade Message Façade [37] ANDROID Chapter 1: Getting Started with Android Programming What is Android? Android Versions Features of Android Architecture of Android Android Devices in the Market The Android Market Obtaining the Required Tools Eclipse Android SDK Android Development Tools (ADT) Creating Android Virtual Devices (AVDs) Creating Your First Android Application Anatomy of an Android Application Chapter 2: Activities and Intents Understanding Activities Applying Styles and Themes to Activity Hiding the Activity Title Displaying a Dialog Window Displaying a Progress Dialog Linking Activities Using intents Resolving Intent Filter Collision Returning Results from an Intent Passing Data Using an Intent Object Calling Built-in Applications Using intents Understanding the Intent Object Using Intent Filters Adding Categories [38] Displaying notifications Chapter 3: Getting to know the Android user interface Understanding the Components of a Screen Views and View Groups Linear Layout Absolute Layout Table Layout Relative Layout Frame Layout Scroll View Adapting to Display Orientation Anchoring Views Resizing and Repositioning Managing Changes to Screen Orientation Persisting State Information during Changes in Configuration Detecting Orientation Changes Controlling the Orientation of the Activity Creating the User interface Programmatically Listening for Ui notifications Overriding Methods Defined in an Activity Registering Events for Views Chapter 4: Designing your user interface using views Basic Views Text View ,Button, Image Button, Edit Text, Check Box, Toggle Button, Radio Button, and Radio Group Views Progress Bar View Auto Complete Text View [39] Picker Views Time Picker View Displaying the Time Picker in a Dialog Window Date Picker View Displaying the Date Picker View in a Dialog Window List Views List View Customizing the List View Using the Spinner View Chapter 5: Displaying pictures and menus with views Using image Views to Display Pictures Gallery and Image View Views Image Switcher Grid View Using Menus with Views Creating the Helper Methods Options Menu Context Menu Some Additional Views Analog Clock and Digital Clock Views Chapter 6: Data Persistence Saving and Loading User Preferences Using get Shared Preferences() Using get Preferences() Persisting Data to Files Saving to Internal Storage Saving to External Storage (SD Card) Choosing the Best Storage Option Using Static Resources [40] Creating and Using Databases Creating the DB Adapter Helper Class Using the Database Programmatically Adding Contacts Retrieving All the Contacts Retrieving a Single Contact Updating a Contact Deleting a Contact Upgrading the Database Pre-Creating the Database Bundling the Database with an Application Chapter 7: Content Providers Sharing Data in Android Using a Content Provider Predefined Query String Constants Contents Projections Filtering Sorting Creating Your Own Content Providers Using the Content Provider Chapter 8: Messaging and networking SMS Messaging Sending SMS Messages Programmatically Getting Feedback After Sending the Message Sending SMS Messages Using Intent Receiving SMS Messages Updating an Activity from a Broadcast Receiver Invoking an Activity from a Broadcast Receiver [41] Caveats and Warnings Sending e-Mail Networking Downloading Binary Data Downloading Text Files Accessing Web Services Performing Asynchronous Calls Chapter 9: Location-Based Services Displaying Maps Creating the Project Obtaining the Maps API Key Displaying the Map Displaying the Zoom Control Changing Views Navigating to a Specific Location Adding Markers Getting the Location That Was Touched Geo coding and Reverse Geo coding Getting Location Data Monitoring a Location Chapter 10: Developing Android Services Creating Your Own Services Performing Long-Running Tasks in a Service Performing Repeated Tasks in a Service Executing Asynchronous Tasks on Separate Threads Using Intent Service Communicating between a Service and an Activity Binding Activities to Services [42] Chapter 11: Publishing Android Applications Preparing for Publishing Versioning Digitally Signing Your Android Applications Deploying APK Files Using the adb exe Tool Using a Web Server Publishing on the Android Market Creating a Developer Profile Submitting Your Apps Chapter 12: Broadcast Receiver Chapter 13: Notifications Chapter 14: Android (Advanced) Graphics Design Camera Handling Map Handling Video Handling Bluetooth Handlin [43] C#.NET 6.0 INTRODUCTION TO .NET What is .NET Purpose of .NET DIFFERENCE BETWEEN .NET 3.0, 3.5, 4.0, 4.5 & 4.6 INTRODUCTION TO .NET FRAMEWORK What is .Net Framework CLR –what is Common Language Runtime .Net Class Library User and Program Interface Different Types of Application Working with Windows Application Working with Console Application Diff between Win forms and Console App ADVANCE FEATURES OF .NET FRAME WORK 3.5,4.0 &4.5 What is a Service? Windows Communication Foundation (WCF) Architecture of WCF Working with Different Contracts Difference between Web Services and WCF Windows Presentation Foundation (WPF) Architecture of WPF Working with Different Layout Introduction to Windows Card Spaces (WCS) Introduction to Windows Work Flow Foundation (WFF) INTRODUCTION TO C# What is C# [44] Purpose of C# Language and Syntax FUNDAMENTALS OF C# Data Types Operators Control Statements Arrays Loop Variables arguments COLLECTIONS Why Collections? Stack Queue Array List Sorted List Hash Table OBJECT ORIENTED FEATURES OF C# Classes and Objects Data Member Access Modifiers & their Scope Method Static Constructor This Keyword Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding [45] Understanding Interface Using Interface Partial Class FILE STREAMS Using File Classes File File Info Directory Directory Info Stream Writer Stream Reader Text Writer Text Reader ARCHITECTURE OF WINDOWS FORMS Control Class Rich Control Class Scrollable Control Class Form Class WINDOWS FORM CONTROL REFERENCE Link Label Panel Group Box Data Picker Progress Bar Timer Login Grid view Masked Textbox Split Container Flow Layout Panel [46] Folder Browser VALIDATING CONTROLS Error Provider DIALOG CONTROLS Color Dialog Save File Dialog Font File Dialog Open Dialog Folder Dialog MENU CONTROLS Tool strip Status Strip Menu Strip Context Menu Strip Tool Strip Manager EXCEPTION HANDLING Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception In-Built Exception Handling NETWORK PROGRAMMING Introduction to Networking InetAddress URL TCP Socket and Server Socket UDP Socket Introduction User Input XML [47] How to create an XML file Use of Ad rotator control Access XML file usingADO.Net Read XML file Write XML file DATA ACCESS USING ADO.NET Over view of ADO.Net Life Cycle of ADO.Net Difference between ADO and ADO.Net ADO.NET ARCHITECTURE AND OBJECT MODEL Introduction to Dataset Introduction to Data adapter Manipulating database using Dataset Manipulating Oracle database using Dataset Manipulating SQL Server database using Dataset Manipulating of Remote database Manipulating XML Files using Data Access Controls Executing Command OLEDB AND SQL CLIENT Providers Accessing Stored Procedures Accessing Stored Procedures with Parameters Filter Data Using Database Handling Database errors XML INTRODUCTION Role of XML in .Net XML Table Manipulation Insert Update [48] Delete ASSEMBLES Name Spaces Creating Private Assembly Creating Shared Assembly Strong Key Public Key Token Versioning Configuration Files Satellite Assemblies COM INTEROPERABILITY Creating COM Components Runtime Callable Wrapper Com Callable Wrapper Calling COM Components Using C# Assessing Assemblies through COM MANIPULATING THE FILES & REGISTRY Managing the Files Creating Directory Reading and Writing of Files File Security INTRODUCTION TO GDI+ Creating Graphics Objects with GDI+ CREATING CONTROLS Use Controls Types of Controls Adding Properties Adding Events User Windows in Control Form Host a windows control inside Microsoft Internet [49] Explorer MULTI THREADING System Threading Thread Synchronization Thread Lifecycle GLOBALIZATION Globalization and Localization of the UI SECURITY Code Level Security CRYPTOGRAPHY Cryptography Services Encrypt and Decrypt a file Generate and compare Hash value Cryptography primitive WINDOW SERVICE What is a Service? Diff between Web Service and Window Service Designing Windows services Installing and restring windows services Binding windows service to C# application About SCM DEPLOYMENT Planning the deployment Web based deployment, net-work based deployment Creating a Setup, Register Components and Assemblies Install-Time compilation Adding Assemblies to the GAC Security Policy Verifications [50] REPORTS CRYSTAL REPORT Crystal Report Viewer Crystal Report Source SERIALIZATION What is Serialization? What is De-Serialization? Using Binary formatter Using SOAP Formatter REMOTING Introduction to Remoting Passing Objects to Remote Method GENERICS Generics Collection Classes Create Customer Generic Class Generic Delegates MEMORY MANAGEMENT & POINTER Memory Management under the hood Freezing Unmanaged Resources Unsafe Code DATA CONTROLS Data Grid View Dataset Binding Source Binding Navigator CONTAINER CONTROLS Panel Group Box Flow Layout Control Table Layout Control [51] Tab Control Split Container WPF Introduction What is WPF Goals, Benefits & Drawbacks First WPF Application Types of WPF Application (Windows Based and Browser Based) XAML Introduction to XAML XAML – Extensible Application Markup Language. Content Models WORKING WITH CONTROLS Menus Label Button Checkbox Radio Button Repeat Button Toggle Button ToolTip Expander Group Box Textbox Combo Box List Box Menu [52] Status Bar Tab Control Toolbar Tree View Notify Icon Menus and Toolbars Layout Border Canvas Dock Panel Grid Stack Panel Wrap Panel ASP.NET 4.5, 4.6 INTRODUCTION TO WEB APPLICATIONS Overview of ASP Overview of ASP.Net Page Code In-Line Model Code Behind Model HTML Introduction to .Net Frame Work Working with HTML Controls Overview of Attributes. WHAT IS DOTNET FRAME WORK Common Language Runtime (CLR) .Net Class Framework–User and Program Interface. Net Common Type System(CTS) Common Language Specification (CLS). [53] MSIL(Microsoft Intermediate Language) INTRODUCTION TO ASP.NET What is ASP.Net? Complete Life Cycle of Asp.Net Page. Difference between ASP and ASP.Net. Execution Process of .Net Application. ADVANCE FEATURES OF .NET FRAME WORK Windows Communication Foundation (WCF) Windows Presentation Foundation (WPF) Windows Card Spaces (WCS) Windows Work Flow Foundation (WFF) Client Server Architecture 3-Tier/N-Tier Architecture INTRODUCTION TO VB.NET AND C#.NET LANGUAGE Variables declaration Encapsulation Abstraction Inheritance Polymorphism Delegates Exception Handling ASP.NET WEB FORMS Introduction to Web Forms Working with Server Controls Rich Controls Customization ASP.NET WEB CONTROLS HTML Server Controls Web Server Controls [54] Data Bound Controls. Grid View Data List Repeater Details View Forms View List View VALIDATION CONTROLS Required Field Validate Compare Validate Regular Expression Validate Range Validate Custom Validate Validation Summary WORKING WITH MASTER PAGE Creation of Master Page. Creation of Content Page. Working with Content Placeholder Creation of Main Page Including Navigation Controls. DATA ACCESS USING ADO.NET Overview of ADO.NET ADO.NET architecture and object model Introduction to Dataset Difference between Dataset and Record set Data binding Retrieving data using OLEDB and SQLCLIENT Providers Introduction to Data adapter Manipulating databases using Dataset [55] Manipulating of Oracle database using Dataset Manipulating of SQL Server database using Dataset Manipulation of Remote Access Database Manipulation using XML datasheet Using Data access controls Executing Command Populate Dataset Filter Data WORKING WITH BUSINESS OBJECTS NAMESPACE WITH DLL Creating DLL Calling DLL Database Connectivity Using DLL COM INTEROPERABILITY RCW CCW CONFIGURATION Configuration overview Overview of WEB.Config file Configuration file format CONFIGURATION FILES Overview of Machine.Config file Working with WEB.Config File Retrieving configuration Provide connection string Difference between WEB.Config file and Machine.Config file XML WEB SERVICES Create Web Services [56] Consuming Web Services. WSDL (metadata generation). INTRODUCTION TO SOAP, UDDI, WSDL WEB FORMS USER CONTROL Introduction to User Control (.ascx) Creating User Control for Asp.Net page Customizing ASP.Net application Using user control-Assemblies ASP.NET WEB APPLICATION Application overview Using the Global.asax file Managing application state Event Handlers CACHE FEATURES What is Caching? Use of Cache. Caching overview Data caching Page output caching Fragment caching DEBUGGING The SDK Debugger SECURITY OVERVIEW Authentication and Authorization Windows based Authentication Forms based Authentication Authorizing users and roles Users account Impersonation Security and Web Services Passport Authentication [57] GLOBALIZATION User encodings Setting current culture and region Handling multiple encoding Globalization and Localization of the UI Changing culture by using Config.file TRACING Tracing overview Trace logging to page output Application level traces logging Writing Trace Messages. DEPLOYMENT Deploying Applications Using the Process Models Types of Deployment. IIS (Internet Information Server). Introduction to IIS. Different Version of IIS Deploy Asp.Net Application using IIS. STATE MANAGEMENT What is State Management? Type of Techniques used. Page Life Cycle without state. Page Life Cycle with State. STATE TECHNIQUES Sessions Cookies View State Query String Application. [58] Hidden Fields. Diff between session and Application Choosing best State Management WITH DATASOURCES SqlData Source Access Data Source Object Data Source XML Data Source Sitemap Data Source Linq Data Source Entity Data Source WCF Introduction Architecture of WCF Evolution of WCF Evolution of Service Oriented Architecture (SOA) What is WCF Developing WCF Service Application and Client Hosting WCF Service in IIS/ASP.NET Development Server Using a Service in the client application Contracts Service Contract. Operation Contract. Data Contract. Endpoints in configuration file What are End points? ABC - Address, Binding & Contract. [59] Importance of IMetadataExchange Contract / Endpoint. Configuring service behavior in configuration file WCF Service Configuration Editor AJAX Introduction to AJAX What is AJAX? Ajax rich clients in the real world Ajax advantages and disadvantages The purpose of AJAX Traditional web application An AJAX web application Alternatives to Ajax AJAX Components key elements of Ajax Ajax Controls Script Manager Script Manager Proxy Update Panel Update Progress Control Timer Control Ajax Extension Control Tool Kit [60] SILVERLIGHT INTRODUCTION TO SILVERLIGHT What is Silver light? Tools for creating Silver light Applications Difference in versions Different types of Applications in Silver light ARCHITECTURE OF SILVERLIGHT HOW IT IS USED WITH .NET DEVELOPING FIRST SILVERLIGHT APPLICATION SILVERLIGHT AND XAML SILVERLIGHT UI CONTROLS Layout Management and Grouping Controls Form Controls Data Integration and Data Manipulation Controls Functional Controls Navigation [61] CLOUD COMPUTING OVERVIEW D-COMPUTING Trends of computing Introduction to distributed computing Next big thing: cloud computing INTRODUCTION What’s cloud computing Properties & Characteristics Service models Deployment models IAAS Introduction to IAAS PAAS Introduction to PAAS Cloud platform & Management Computation Storage Case studies SAAS Introduction to SAAS Web services CLOUD ISSUES AND CHALLENGES [62] SPOTFIRE Introduction Introduction to business analytical tools What is spot fire Data access Interactive visualizations Underlying data tables(s) Basic layout Open form files Import settings Open from databases Library Create visualizations Bar chart & properties Histogram & trellis Line chart & dates Graphical tables Lines as patterns Combination charts Scatter plots & coloring Pie charts & size scale Tables and display value Interactivity Tooltip display [63] How to mark, drill down Details on demand Multiple marking Details visualization Filter types , hide filters Marking to filter data Filtering scheme Ways to limit data Save & export Save linked to source data Save data embedded Save analysis as a file Save as a library item Reload linked data Replace data table Export data Export images Add data Calculated columns Binned columns Hierarchies Insert columns Insert rows Multiple data tables Manage relations Transformations [64] Capturing the analysis Add bookmark Apply bookmark Special bookmark Other visualizations Tree map Box plot Map chart Heat map Advanced concepts Custom expressions K-means clustering Information model Information designer Information links Administration Architecture Mange services Schedule updates [65] TABLEAU Interdiction and overview Why tableau? Why visualization? Level setting – terminology Getting started – creating some powerful visualization quickly Things you should known about tableau Getting started Connecting to data and introduction to data source concepts of working with data files versus database servers Understanding the tableau workspace Dimensions and measures Using show me! Tour of shelves (how shelves and marks work) Building basic views Help menu and samples Shaving and sharing your work Concepts and options when connecting to data Overview of other connection options Joining multiple tables Data blending copy and paste data extracts Custom SQL Publishing and Re-using data connections [66] Understand how to deal with data changes in your data source such as field addition, deletion or name change Re-using and sharing data connections – the concept of meta data Working with multiple connections in the same workbook Analysis Creating views Marks Size and transparency Highlighting Working with dates Date aggregations and date parts Discrete versus continuous Dual axis / multiple measures Combo charts with different marks types o Geographic map o Page trails o Heat map o Density chart o Scatter plots o Pie charts and bar charts o Small multiples o Working with aggregate versus disaggregate data Analyzing [67] o Sorting & grouping o Aliases o Filtering and quick filters o Cross – tabs (pivot tables ) totals and subtotals o Drilling and drill through o Aggregation and disaggregation percent of total o Working with statistics and trend lines Getting started with calculated fields Working with string functions Basic arithmetic calculations Date math Working with totals Custom aggregations Logic statements Formatting Options in formatting your visualization Working with labels and annotations Effective use of titles and captions Introduction to visual vest practices Building interactive dashboards Combining multiple visualizations into a dashboard Making your worksheet interactive by using actions and filters [68] An introduction to best practices in visualization Sharing workbooks Publish to reader Packaged workbooks Publish to office Publish to pdf Publish to tableau server and sharing over the web Putting it all together Scenario-based review exercises Best practices Where to get further assistance The help file / product manual Knowledge base Forums Whitepapers & books Further training offerings & professional services technical support [69]