- SellGlobally

advertisement
IEEE 2015-2016
PROJECTS Technology: JAVA(J2SE & J2EE)
S. No
1
2
3
4
5
6
7
8
9
10
11
12
13
PROJECT TITLES
Context-Based Diversification for Keyword Queries over
XML Data
Malware Propagation in Large-Scale Networks
On
Summarization
and
Timeline
Generation
for
Evolutionary Tweet Streams
Progressive Duplicate Detection
Reverse Nearest Neighbors in Unsupervised DistanceBased Outlier Detection
Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based Services
Towards Effective Bug Triage with Software Data
Reduction
A Distortion-Resistant Routing Framework for Video
Traffic in Wireless Multihop Networks
A Proximity-Aware Interest-Clustered P2P File Sharing
System
Maximizing P2P File Access Availability in Mobile Ad Hoc
Networks though Replication for Efficient File Sharing
Dynamic
Routing
for
Data
Integrity
and
Delay
Differentiated Services in Wireless Sensor Networks
User-Defined
Privacy
Grid
System
for
Continuous
Location-Based Services
A
Computational
Dynamic
[1]
Trust
Model
for
User
Authorization
A Lightweight Secure Scheme for Detecting Provenance
14
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
15
16
17
18
19
20
21
22
23
Continuous and Transparent User Identity Verification for
Secure Internet Services
Contributory
Broadcast
Encryption
with
Efficient
Encryption and Short Cipher texts
DDSGA: A Data-Driven Semi-Global Alignment Approach
for Detecting Masquerade Attacks
Improved Privacy-Preserving P2P Multimedia Distribution
Based on Recombined Fingerprints
Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
Secure Spatial Top-k Query Processing via Untrusted
Location- Based Service Providers
Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks
Cost-Effective Authentic and Anonymous Data Sharing
with Forward Security
Secure Distributed Deduplication Systems with Improved
Reliability
A Framework for Secure Computations with Two Non-
24
Colluding Servers and Multiple Clients, Applied to
Recommendations
25
26
Effective Key Management in Dynamic Wireless Sensor
Networks
Passive IP Trace back: Disclosing the Locations of IP
Spoofers from Path Backscatter
[2]
27
28
29
An Attribute-Assisted Reranking Model for Web Image
Search
EMR: A Scalable Graph-based Ranking Model for
Content-based Image Retrieval
Learning to Rank Image Tags With Limited Training
Examples
Designing High Performance Web-Based Computing
30
Services
to
Promote
Telemedicine
Database
Management System
31
32
33
34
35
36
37
38
39
40
41
42
Location-Aware and Personalized Collaborative Filtering
for Web Service Recommendation
A Fuzzy Preference Tree-Based Recommender System
for Personalized Business-to-Business E-Services
Co-Extracting Opinion Targets and Opinion Words from
Online Reviews Based on the Word Alignment Model
Detecting Malicious Face book Applications
Key Updating for Leakage Resiliency with Application to
AES Modes of Operation
Security-Evaluation-Of-Pattern-Classifiers-Under-Attack
Facilitating-Document-Annotation-Using-Content-AndQuerying-Value
Securing-Broker-Less-Publishsubscribe-Systems-UsingIdentity-Based-Encryption
Fast-Nearest-Neighbor-Search-With-Keywords
Traffic-Pattern-Based-Content-Leakage-Detection-ForTrusted-Content-Delivery-Networks
Top-K-Query-Result-Completeness-Verification-In-TieredSensor-Networks
Optimal Distributed Malware Defense in Mobile Networks
[3]
with Heterogeneous Devices
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
Efficient and Privacy-Aware Data Aggregation in Mobile
Sensing
SOS: A Distributed Mobile Q&A System Based on Social
Networks
Towards Online Shortest Path Computation
Boundary Cutting for Packet Classification
An Incentive Framework for Cellular Traffic Offloading
Accuracy-Constrained Privacy-Preserving Access Control
Mechanism for Relational Data
Captcha as Graphical Passwords—A New Security
Primitive Based on Hard AI Problems
Security Analysis Of A Single Sign-On Mechanism For
Distributed Computer Networks
Detection And Localization Of Multiple Spoofing
EAACK—A
Secure
Intrusion-Detection
System
For
Manets
Vampire Attacks Draining Life From Wireless
Mobile Relay Configuration in Data-Intensive Wireless
Sensor Networks
Multiparty Access Control for Online Social Networks
Model and Mechanisms
Cooperative-Caching-For-Efficient-Data-Access-InDisruption-Tolerant-Networks
Cost-Effective-Resource-Allocation-Of-Overlay-RoutingRelay-Nodes
A Scalable Server Architecture For Mobile Presence
Services In
[4]
JAVA ANDROID PROJECTS
ENVIRONMENT DETAILS:ANDROID,SQLITE
S. No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
PROJECT TITLES
A Location- and Diversity-aware News Feed System for
Mobile Users
Context-Based Access Control Systems for Mobile
Devices
Cooperative Positioning and Tracking in Disruption
Tolerant Networks
CWC: A Distributed Computing Infrastructure Using
Smartphone’s
Energy-Efficient Fault-Tolerant Data Storage and
Processing in Mobile
Your Journey: Considering Signal Strength and
Fluctuation in Location-Based Applications
Privacy-Preserving Relative Location Based Services for
Mobile Users
The Impact of API Change- and Fault-Proneness on the
User Ratings of Android Apps
Time-and-Energy-Aware Computation Offloading in
Handheld Devices to Coprocessors and Clouds
User Privacy and Data Trustworthiness in Mobile Crowd
Sensing
User-Defined Privacy Grid System for Continuous
Location-Based Services
Effective Risk Communication for Android Apps
Catch Me If You Can: Evaluating Android Anti-Malware
Against Transformation Attacks
Meet You – Social Networking on Android
[5]
15
16
MOSES: Supporting and Enforcing Security Profiles on
Smart phones
T-Drive: Enhancing Driving Directions with Taxi Drivers’
Intelligence
CLOUD COMPUTING
Technology:JAVA,J2EE&MYSQL
S. No
1
2
3
4
5
6
7
8
9
10
11
PROJECT TITLES
A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
A Secure and Dynamic Multi-keyword Ranked Search
Scheme
Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
Circuit Cipher text-policy Attribute-based Hybrid
Encryption with Verifiable Delegation in Cloud Computing
Control Cloud Data Access Privilege and Anonymity with
Fully Anonymous Attribute-Based Encryption
Identity-Based Encryption with Outsourced Revocation in
Cloud Computing
Provable Multicopy Dynamic Data Possession in Cloud
Computing Systems
Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation
Decentralized-Access-Control-With-AnonymousAuthentication-Of-Data-Stored-In-Clouds
Distributed--Concurrent--And-Independent-Access-ToEncrypted-Cloud-Databases
[6]
12
13
14
15
16
17
18
19
Scalable-Distributed-Service-Integrity-Attestation-ForSoftware-As-A-Service-Clouds
A-Hybrid-Cloud-Approach-For-Secure-AuthorizedDeduplication
Oruta-Privacy-Preserving-Public-Auditing-For-SharedData-In-The-Cloud
A-Stochastic-Model-To-Investigate-Data-CenterPerformance-And-Qos-In-Iaas-Cloud-Computing-Systems
Optimizing Cloud Resources For Delivering Iptv Services
Through Virtualization
Secure Multi-Owner Data Sharing For Dynamic Groups
In The Cloud
Cloud A Framework Of Adaptive Mobile Video Streaming
And Efficient Social Video Sharing In
Cloudmov Cloud-Based Mobile Social TV
WEB APPLICATIONS
Technology: JAVA J2EE,TOMCAT,ORACLE
S. No
PROJECT TITLES
1
An-efficient-Mailing-System-for-Detecting-Spam-Mails
2
Annotating-Search-Results-from-Web-Databases
3
A-Secure-Cloud-server-System-using-Proxy-ReEncryption-Model
4
Attribute-based-Encryption-System-for-Secured-DataStorage
5
Automatic-Testing-System-for-Web-Application
6
Generalized-Flow-Based-Method-for-Analysis-of-ImplicitRelationships-on-Wikipedia
7
Automated e-government certificates
8
Friend book: A Semantic-based Friend Recommendation
[7]
System for Social Networks
9
QOS: Ranking Prediction For Cloud Services
10
Fully Anonymous Profile Matching In Mobile Social
11
Collaboration in Multi cloud Computing Environment
12
A Cocktail Approach for Travel Package
Recommendation
13
Web Based Framework of Project Performance and
Control system
14
Validation of Code Words Through Images
15
Student Project Allocation and Mgmt system
16
Secrecy protecting account for Data Storage Security
17
The Mobile Agent Based service software in Internet
Environment
18
Going Back and Fourth efficient Multi Deployment and
Multi snapshot
19
E-Banking
20
Credit Card Fiddles
21
Database Elasticity
22
Management of Vitality Cards
23
Standing Spatial Information
24
E-Housing
25
News Bulletin System
26
Loan Lending
26
Venue Maintenance System
27
Medical Allowances Controlling System
28
Internet Protocol Television System
29
AMES
30
CAM
31
Secure Data Sharing for multi owners
[8]
32
Online Itemization Section
33
Disburse Mobile Scheme
34
Motel Resource Tool
35
Credit Card Fiddles
36
E-Counseling
37
Mobile Presence Server
38
Loan Lending
39
VISA Dispensing System
40
Resource Management System
41
Jellybean Maneuvering Appropriation And Conclave
[9]
2015-2016 IEEE PROJECTS
Technology: DOTNET
S. No
01
PROJECT TITLES
Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites.
02
Discovery of Ranking Fraud for Mobile Apps.
03
Query Aware Determinization of Uncertain Objects.
04
05
06
07
08
09
10
11
12
13
Collision Tolerant and Collision Free Packet Scheduling
for Underwater Acoustic Localization.
Defeating Jamming With the Power of Silence: A GameTheoretic Analysis.
Universal Network Coding-Based Opportunistic Routing
for Unicast.
A Distributed Three-hop Routing Protocol to Increase the
Capacity of Hybrid Wireless Networks.
Mobile Data Gathering with Load Balanced Clustering and
Dual Data Uploading in Wireless Sensor Networks.
Privacy-Preserving and Truthful Detection of Packet
Dropping Attacks in Wireless Ad Hoc Networks.
Behavior Rule Specification-Based Intrusion Detection for
Safety Critical Medical Cyber Physical Systems.
Key-Recovery Attacks on KIDS, a Keyed Anomaly
Detection System.
An Attribute-Assisted Reranking Model for Web Image
Search.
Automatic Face Naming by Learning Discriminative
Affinity Matrices From Weakly Labeled Images.
14
Detection and Rectification of Distorted Fingerprints.
15
Learning Fingerprint Reconstruction: From Minutiae to
[10]
Image.
16
17
18
19
20
21
22
23
Location-Aware and Personalized Collaborative Filtering
for Web Service Recommendation.
An Empirical Performance Evaluation of Relational
Keyword Search Techniques.
Supporting Privacy Protection in Personalized Web
Search.
Trusted DB: A Trusted Hardware-Based Database with
Privacy and Data Confidentiality.
Typicality-Based Collaborative Filtering Recommendation.
Secure Mining of Association Rules in Horizontally
Distributed Databases.
Product Aspect Ranking and its Applications.
Secure Data Retrieval for Decentralized DisruptionTolerant Military Network.
24
Autonomous Mobile Mesh Networks.
25
The Target Tracking in Mobile Sensor Networks.
26
27
28
29
30
31
Certificate less Remote Anonymous Authentication
Scheme for Wireless Body Area Networks.
Secure and Efficient Data Transmission for Cluster-Based
Wireless Sensor Networks.
Multicast capacity in MANET with Infrastructure Support.
Content Caching and Scheduling in Wireless Networks
with Elastic and Inelastic Traffic.
Preserving Location Privacy in Geo social Applications.
Privacy Preserving Data Sharing With Anonymous ID
Assignment.
32
A cocktail approach for travel package recommendation.
33
Efficient Data Query in Intermittently-Connected Mobile
[11]
Ad hoc Social Networks.
34
35
36
37
38
39
40
41
An Error-Minimizing Framework for Localizing Jammers in
Wireless Networks.
Optimal content downloading in Vehicular Network.
Transmission-Efficient Clustering Method for Wireless
Sensor Networks Using Compressive Sensing.
Topology control in mobile ad hoc networks.
The Three-Tier Security Scheme in Wireless
Sensor Networks with Mobile Sinks.
Network Assisted Mobile Computing with Optimal Uplink
Query Processing.
Characterizing the Efficacy of the NRL Network
Pump in Mitigating Covert Timing Channels.
Jamming-Aware Traffic Allocation for Multiple-Path
Routing Using Portfolio Selection.
CLOUD COMPUTING
01
02
03
04
05
06
Cloud-Based Multimedia Content Protection System.
Control Cloud Data Access Privilege and Anonymity with
Fully Anonymous Attribute-Based Encryption.
Cost-Minimizing Dynamic Migration of Content Distribution
Services into Hybrid Clouds.
Enabling Fine-grained Multi-keyword Search Supporting
Classified Sub-dictionaries over Encrypted Cloud Data.
Energy-aware Load Balancing and Application Scaling for
the Cloud Ecosystem.
Identity-Based Distributed Provable Data Possession in
Multicloud Storage.
07
PSMPA: Patient Self-Controllable and Multi-Level PrivacyPreserving Cooperative Authentication in Distributed m-
[12]
Healthcare Cloud Computing .
08
SelCSP: A Framework to Facilitate Selection of Cloud
Service Providers.
09
Key-Aggregate Cryptosystem for Scalable Data Sharing in
Cloud Storage.
10
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds.
11
Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds.
12
Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data.
13
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Data.
14
Scalable and Secure Sharing of Personal Health Records
in Cloud Computing Using Attribute-Based Encryption.
15
Privacy-Preserving Public Auditing for Secure Cloud
Storage in Public Clouds.
16
Balancing Performance, Accuracy and Precision for Secure
Cloud Transactions.
WEB APPLICATIONS
01
User-Query-Dependent Ranking For Web Databases.
02
Data Storage security in cloud computing.
03
Error Tracking System.
04
Expert answer.
05
Efficient Computation of Range Aggregates against
uncertain location based queries.
06
Exploring Application-Level Semantics for Data
Compression.
07
Exploiting Dynamic Resource Allocation for Efficient
[13]
Parallel Data Processing in the Cloud.
08
Improving Aggregate Recommendation Diversity Using
Ranking-Based Techniques.
09
Vulnerability analysis in SOA-based business processes.
10
Asset boutique.
11
Monitoring Service Systems from a Language-Action
Perspective.
12
CAM: Cloud-Assisted Privacy Preserving Mobile Health
Monitoring.
13
MONA: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Clouds.
14
Consistency as a Service: Auditing Cloud Consistency.
15
A system to filter unwanted messages from OSN user
walls.
16
Web Information Gathering Based on Ontology model.
17
Collective Behavior of Scalable learning.
18
Go-Between Socially-Enhanced Virtual Communities.
19
A Gen2-based RFID Authentication Protocol for Security
and Privacy.
20
Monitoring System.
21
Online Art Gallery.
22
Gateway Accessory.
23
E-voting.
24
Internet File Sharing.
25
Cybernetics protector.
26
Scalable record linkage and deduplication.
27
Garbage Collection System.
28
Commodity Sustenance.
29
Affluence Management.
[14]
30
Global Warning System.
31
Blog Application.
32
Go-Vegetarian.
33
Online Classifieds.
34
Municipal Administration system.
35
Online Advertise.
36
Cab Services.
37
Census.
38
Orphan Management System.
39
Vessel Consignment.
40
Genco Mailing System.
41
Village morphogenesis.
42
Ranking Model Adaptation for Domain-Specific Search.
43
Query Planning for Continuous Aggregation Queries over a
Network of Data Aggregators.
44
Bridging Socially-Enhanced Virtual Communities.
[15]
2015-16
PROJECTS
Technology: Embedded System
S.NO
PROJECT TITLES
01
ARM Platform For Vehicular Monitoring And Tracking.
02
Advance question paper leakage control system design.
03
GPS Based Asset/Vehicle/Animal/Child Tracking System.
04
Automatic Power Meter Reading Using GSM Network.
05
Advance home security for intruder detection with auto
paging/dialing.
06
Wireless remote and status enquiry for smart industries.
07
Vehicle ignition security with dynamic password generation.
08
Emergency alert for women safety with location tracking.
09
E-VOTING system to avoid anti rigging.
10
11
12
13
14
15
A proposed system for advance security and automation in
metro trains to prevent accidents.
Advance home security for intruder detection with auto
paging/dialing.
Microcontroller based customizable wireless sensor node to
detect hazardous gas pipeline leakage.
Real time vehicle parameter monitoring with continuously
tracking of a VIP VEHICLE.
Real-time control system for air pollution detection in
vehicles.
Human health monitoring mobile phone application by using
embedded system.
16
Electronic service provider with billing .
17
RFID AND ZIGBEE based manufacturing monitoring system
18
The design and implementation of intelligent campus
security tracking system based on RFID and ZIGBEE.
[16]
19
RFID and GSM based intelligent courier mailbox system.
20
RFID remote parent care.
21
RFID assisted navigation systems in public vehicles
22
Universal remote control with haptic interface
23
Construction of microcontroller based touch screen mobile
phone with password protected features
24
Modern prepaid energy system
25
E-MEDICAL emergency for patients
26
Smart pad for examination
27
E-WALLET system for salary payment of employs
28
Employee login and logout management system
29
High secured data exchange with encryption
30
31
32
Smart remote control system of high efficiency and
Intelligent street lighting
Economical fully centralized system in building automation
with wireless sensor networks
Smart remote control system of high efficiency and
intelligent street lighting
Green home energy management system through
33
comparison of energy usage between the same kinds of
home appliances
34
live bus stops and modern buses technology
35
Automatic parking guidance with prepaid car parking
36
Traffic congestion control with automatic signal clearance
37
38
39
Perpetual and low-cost power meter for monitoring
residential and industrial appliances
Smart back pack for visually impaired person
Multi-patient health monitoring system for corporate
hospitals
[17]
40
Design of sphygmus data acquisition platform
41
College bus information to students
42
Intelligent street light automation with illumination control
43
44
45
46
47
The remote control of mobile robot based on embedded
technology
A multipurpose robot for military
Ultrasonic spectacles and waist-belt for visually impaired
and blind person
Vehicle accident avoidance with road adverse conditions
monitoring
A safety system for mine workers in heavy industries
PROJECTS Technology: MATLAB
2015-2016
IEEE PROJECTS
PROJECT TITLES
S. No
1
2
3
4
5
6
7
A Feature-Enriched Completely Blind Image Quality
Evaluator
A No-Reference Texture Regularity Metric Based on Visual
Saliency
A Probabilistic Approach for Color Correction in Image
Mosaicking Applications
Boundary Detection Using Double-Opponency and Spatial
Sparseness Constraint
Combining Left and Right Palm print Images for More
Accurate Personal Identification
Face Recognition across Non-Uniform Motion Blur,
Illumination, and Pose
Face Sketch Synthesis via Sparse Representation-Based
Greedy Search
[18]
8
9
10
11
12
13
14
15
16
17
Fractal Analysis for Reduced Reference Image Quality
Assessment
Image Denoising by Exploring External and Internal
Correlations
Image Super-Resolution Based on Structure-Modulated
Sparse Representation
Multifocal Image Fusion Based on NSCT and Focused Area
Detection
Pareto-Depth for Multiple-Query Image Retrieval
Revealing the Trace of High-Quality JPEG Compression
through Quantization Noise Analysis
Reversible Image Data Hiding with Contrast Enhancement
Robust Representation and Recognition of Facial Emotions
Using Extreme Sparse Learning
Steganography Using Reversible Texture Synthesis
Variable-Length Signature for Near-Duplicate Image
Matching
A New Secure Image Transmission Technique via Secret-
18
Fragment-Visible Mosaic Images by Nearly Reversible Color
Transformations
19
20
An Efficient Parallel Approach for Sclera Vein Recognition
BRINT: Binary Rotation Invariant and Noise Tolerant
Texture Classification
Designing an Efficient Image Encryption-Then Compression
21
System via Prediction Error Clustering and Random
Permutation
22
23
Digital Image Sharing by Diverse Image Media
Dual-Geometric Neighbor Embedding for Image Super
Resolution With Sparse Tensor
[19]
24
25
26
27
28
29
30
31
32
Exposing Digital Image Forgeries by Illumination Color
Classification
Fingerprint Compression Based on Sparse Representation
Hyperspectral Image Classification Through Bilayer GraphBased Learning
Images as Occlusions of Textures: A Framework for
Segmentation
Low-Rank Neighbor Embedding for Single Image SuperResolution
Mining Weakly Labeled Web Facial Images for SearchBased Face Annotation
Phase-Based Binarization of Ancient Document Images:
Model and Applications
Progressive Image Denoising Through Hybrid Graph
Laplacian Regularization: A Unified Framework
Scene Text Recognition in Mobile Applications by Character
Descriptor and Structure Configuration
33
A Unified Data Embedding and Scrambling Method
34
Characterness: An Indicator of Text in the Wild
[20]
PROJECTS Technology: VLSI
2015-2016
IEEE PROJECTS
S. No
01
02
03
04
05
PROJECT TITLES
A Combined SDC-SDF Architecture for Normal I/O Pipelined
Radix-2 FFT
A High-Performance FIR Filter Architecture for Fixed and
Reconfigurable Applications
A High-Speed FPGA Implementation of an RSD-Based ECC
Processor
Aging-Aware Reliable Multiplier Design with Adaptive Hold
Logic
An Accuracy-Adjustment Fixed-Width Booth Multiplier Based
on Multilevel Conditional Probability
An Efficient Constant Multiplier Architecture Based on
06
Vertical-Horizontal Binary Common Sub-expression
Elimination Algorithm for Reconfigurable FIR Filter Synthesis
07
08
09
10
11
12
An Efficient VLSI Architecture of a Reconfigurable PulseShaping FIR Interpolation Filter for Multi-standard DUC
Array-Based Approximate Arithmetic Computing: A General
Model and Applications to Multiplier and Squarer Design
Design of Self-Timed Reconfigurable Controllers for Parallel
Synchronization via Wagging
Exact and Approximate Algorithms for the Filter Design
Optimization Problem
Fault Tolerant Parallel Filters Based on Error Correction
Codes
Graph-Based Transistor Network Generation Method for
Supergate Design
[21]
13
14
15
16
17
18
19
High - Throughput Finite Field Multipliers Using Redundant
Basis for FPGA and ASIC Implementations
Level-Converting Retention Flip-Flop for Reducing Standby
Power in Zig Bee SoCs
Novel Design Algorithm for Low Complexity Programmable
FIR Filters Based on Extended Double Base Number System
Optimal Factoring of FIR Filters
Recursive Approach to the Design of a Parallel Self-Timed
Adder
Reliable Low-Power Multiplier Design Using Fixed-Width
Replica Redundancy Block
Reverse Converter Design via Parallel-Prefix Adders: Novel
Components, Methodology, and Implementations
A New Efficiency-Improvement Low-Ripple Charge-Pump
20
Boost Converter Using Adaptive Slope Generator With
Hysteresis Voltage Comparison Techniques
21
22
23
A New Parallel VLSI Architecture for Real-time Electrical
Capacitance Tomography
A novel approach to realize Built-in-self-test(BIST) enabled
UART using VHDL
A Novel Area-Efficient VLSI Architecture for Recursion
Computation in LTE Turbo Decoders
A Novel Photosensitive Tunneling Transistor for Near-
24
Infrared Sensing Applications: Design, Modeling, and
Simulation
A Relative Imaging CMOS Image Sensor for High Dynamic
25
Range and High Frame-Rate Machine Vision Imaging
Applications
26
A Voltage Monitoring IC With HV Multiplexer and HV
[22]
Transceiver for Battery Management Systems
Accelerating Scalar Conversion for Koblitz Curve
27
Crypto processors on Hardware Platforms
Aging-Aware Reliable Multiplier Design with Adaptive Hold
28
Logic
29
All Digital Energy Sensing for Minimum Energy Tracking
30
An Efficient List Decoder Architecture for Polar Codes
SPOTFIRE & TABLEAU PROJECTS LIST

Sales analytics

Cost analysis of pharma industry

Trend analysis of oil and gas industry

Council of medical and research

Finance score card of sales industry

Spares analytics

Part analysis

Keyword analysis

Summary analysis of automobile industry

Cost driver analysis

Growth trend analysis

Health care

Performance analysis of wells in oil and gas industry

Clinical research on diseases

Power Distribution & Energy Utilities

Transportation & logistics

Product Comparison Analysis

Inventory Analysis

Top Bottom Analysis of organization

Drill down Analysis
[23]
TRAINING COURSES ON DIFFERENT TECHNOLOGIES
CORE - JAVA
Introduction to Java Framework

What is Java

Architecture of JVM

Characteristic of java Technology

Importance for Internet
Fundamentals of Java

Data Types

Operators

Control Statements

Arrays

Loop

Variables arguments
OOP with Java

Classes and Objects

Data Member

Method

Static

Constructor

This Keyword

Casting Object

Garbage Collection

Encapsulation

Inheritance

Polymorphism

Method Overloading

Method overriding

Understanding Interface
[24]

Using Interface
Packages

Why Package

Understanding Class path

Access Modifiers & their Scope
Java Utile Package

Date

Enumeration

Vector

Properties

Hash table

Collection & Iterate interface

List and Array List
Exception Handling

Importance of Exception Handling

Exception types

Using Try and Catch

Throw, throws, finally

Writing user defined exception
I/O Operation in Java

Byte Oriented Streams

File Handling

Reader and Writers
Multithreaded programming

Introduction to Multi-Threading

Understanding Thread

Java Threading Model

Thread class & Run able Interface

Thread priorities
[25]

Thread Synchronization

Inter thread Communication

Preventing Deadlocks
Network programming

Introduction to Networking

I net Address

URL

TCP Socket and Server Socket

UDP Socket

Developing a Chat Application
Abstract Window Toolkit

Graphics

Color and Font

AWT Component/Controls

Event handling &Layouts

Frames and Menus

Images and Animation
Applets

Applet Basics

Applet Life Cycle

Applet Skeleton

Applet Example
Inner Classes

Nested Top Level Classes

Member Classes

Local Classes

Anonymous Classes
Swing Programming

Introduction to Swing and MVC Architecture
[26]

Light Weight Component

Swing Hierarchy

Atomic Component

Intermediate Container

Top-Level Container

Swing related Events
ADVANCED - JAVA
Java Database Connectivity (JDBC)

Introduction to JDBC

JDBC Architecture

Types of JDBC Drivers

Establishing a JDBC Connection

Using Statement

Using Prepared Statement

Using Callable Statement

Using properties file

Scrollable Result Set

Editable Result Set

Batch Updates

New Feature introduced in JDBC 3.0

Fetching Generated Keys for Auto
WEB BASED TECHNOLOGIES

Introduction

Java Applet

Dynamic Vs Static Content

Common Gateway Interface (CGI)

Java Script
Distributed Application Development
[27]

Remote Method Invocation (RMI)

Object Persistence and Serialization

Introduction to Distributed Technology

RMI Architecture

Importance of Naming Services

RMI Registry

Creating Registry

Stub/ Skeleton Classes

Developing Simple RMI Application
Java Beans

Java Beans

Java Beans Architecture

Java Beans Characteristics

Providing Properties & Methods

Event in Java beans

JAR File
Java Servlets

Servlets Fundamentals /API

Servlets as J2EE Web Component

Servlets as an improved CGI

Processing Html Forms

What is Name-Value pair

Content Types and MIME

What is a Web-Container

Servlets Life Cycle

HTTP GET &POST Request Methods

Configuration of Web Application

Web.xml file

Servlets URL Pattern Mapping

Deployment Web Application in
[28]

Tomcat & Web logic Servers

State Management

Cookies

Hidden fields

Http Session

Filter

URL Rewriting
Java Server Pages (JSP)

Introduction

Advantage-of-JSP-over-other Technology

JSP Architecture

Request/Response

Application/Session

Page

Page Context

JSP Basics & Syntax

JSP Directive

Page Directive

Include Directive

Taglib Directive

JSP Action Tags

Forward Action Tag

Include Action Tag

JSP Script Related Tags

Script let Tag

Expression Tag

Declaration Tag

Use Bean Tag

Set Property Tag

Get Property Tag
[29]

JSP Custom Tag Library

Using Different Scope Objects

Javax.sql (Extension to JDBC)

Data source &Connection Pool
Using JDBC & JNDI
J2EE
J2EE

J2EE Application

J2EE Architecture

Introduction to J2EE Components,

Containers &Connectors.

Packaging & Deploying J2EE

Applications
Extensible Markup Language (XML)

Introduction to XML

XML DTD

XML Schema

JAXP- Java API for XML Processing

(DOM & SAX)
JNDI

Introduction to Naming & Directory

Services

Using JNDI

JDBC Extension

Review of JDBC
Enterprise Java Beans

Introduction to Server-Side

Components
[30]

EJB Architecture

Java RMI Over IIOP
Types of EJB

Session Beans

Entity Beans

Message Driven Beans
EJB Container Services

Transactions

Security

Life Cycle Management

State & Persistence of EJB

Session Beans

Designing & Developing

Stateless Session Beans

Designing & Developing

State full Session Beans

Deploying Session Beans

Writing Standalone & Web Clients
Entity Beans

Designing Persistent Components

Difference Between “Create” of Session

And Entity Beans

Finding Entity Beans

Bean vs. Container Managed

Persistence

Managed Persistence (CMP)

Container Managed Fields

Local Interfaces

Mapping Relationship

Between Entity Beans
[31]

Mapping Relationships

Between Database and Entity Beans

Deployment Descriptor CMP

EJB QL for Writing Custom Finders in CMP

Invoking Entity Bean from Session Beans
JAVA Message Services (JMS)

Introduction to Messaging Systems

Benefits of Using JMS

Pub / Sub Model

Developing Message Driven Beans (MDB)

Message Driven Beans & Transaction
FRAMEWORKS AND ADVANCED CONCEPTS
Struts and MVC Architecture

MVC Architecture

MVC Model 1 and 2 in web Application

Introduction to Struts Framework

Configuring Struts Application

Struts Configuration File

Strut Controller Components

Struts Model Components

Struts View Components

Action Forms

Action Messages

Action Errors

JSP Custom Tag Libraries

Tag Library Overview

Tag Libraries in Struts

Using Java Beans with Struts Tags
[32]

Struts HTML Tags

Exception Handling

Action Error & Action Errors

Adding Error Handling

Action Form Validate Method

Handling exceptions

Declarative Exception Handling

Struts Validation

Mask

Range
Spring

What is spring Framework

Inversion of Control

Dependency Injection

Bean Factory

Developing First Spring Application

Spring Container

Built-in Bean Factories

Application Context

Bean Lifecycle in Container

Spring Events

Spring AOP

Introduction to AOP

Role of AOP in Spring

AOP Advice

AOP Point cuts

Spring AOP Introductions

Proxy Factory Bean

Spring Data Access

Spring O-R Mapping
[33]

Spring Transaction Management

Spring Web MVC Framework

Hibernate O-R Mapping

Manipulating and Querying

Hibernate Query Language

Criteria Queries
Hibernate

Introduction to Hibernate

Hibernate Configuration

Hibernate Concepts

Native SQL

Transactions and Concurrency
AJAX

Introduction AJAX

AJAX Internals

XML Http Request Object

AJAX UI Tags

Div Tag

Submit Tag

Anchor Tag

Tabbed Panel Tag

Auto Completer Tag

Introduction to JSF

Overview on JSF Architecture

JSF Request Processing Life Cycle

Using JSF tag libraries

Core tags and Html Tags

Page Navigation
JSF
[34]

Handling Events

Performing Validation

Navigating between Pages
Web Services

Introduction to Web Services

SOAP request and response

UDDI Services

WSDL

Examples on Web Services
JQUERY
INTRODUCTION

What is J Query?

Pre Requirements

Download & install J Query

Creating first page

Tools Required

HTML & CSS Overview
EVENTS

Bind & Unbind

Helper Functions

Event Object

Other Event Functions
MANIPULATING PAGE CONTENT

Creating New Content

Manipulating Attributes

Inserting Content
[35]

Wrapping, Replacing, Removing Content

Working with CSS
JQUERY UI LIBRARY

Overview

Widgets

Effects & Theme

Installations

ANIMATION AND EFFECTS

Showing & Hiding Elements

Fading Elements

Sliding Elements

Custom Animations
TOOLS

Log4j

ANT

CVSNT

JASPER REPORTS

JUNIT

NSIS
DESIGN – PATTERNS
Standalone Application level

Singleton Java Class

Synchronized Singleton Java Class

Factory Method

Factory

Abstract Factory
[36]

DTO/VO Class

Template Method

Fast line Reader

Adaptor Class

Prototype

Builder

Inversion Of Control
Web Application Level

MVC1 &MVC2

Front Controller

Abstract Controller

View Helper

Composite View

Intercepting Filter
Enterprise Application Level

DAO

DAO Factory

Business Delegate

Service Locator

Session Façade

Message Façade
[37]
ANDROID
Chapter 1: Getting Started with Android Programming

What is Android?

Android Versions

Features of Android

Architecture of Android

Android Devices in the Market

The Android Market

Obtaining the Required Tools

Eclipse

Android SDK

Android Development Tools (ADT)

Creating Android Virtual Devices (AVDs)

Creating Your First Android Application

Anatomy of an Android Application
Chapter 2: Activities and Intents

Understanding Activities

Applying Styles and Themes to Activity

Hiding the Activity Title

Displaying a Dialog Window

Displaying a Progress Dialog

Linking Activities Using intents

Resolving Intent Filter Collision

Returning Results from an Intent

Passing Data Using an Intent Object

Calling Built-in Applications Using intents

Understanding the Intent Object

Using Intent Filters

Adding Categories
[38]

Displaying notifications
Chapter 3: Getting to know the Android user interface

Understanding the Components of a Screen

Views and View Groups

Linear Layout

Absolute Layout

Table Layout

Relative Layout

Frame Layout

Scroll View

Adapting to Display Orientation

Anchoring Views

Resizing and Repositioning

Managing Changes to Screen Orientation

Persisting State Information during Changes in
Configuration

Detecting Orientation Changes

Controlling the Orientation of the Activity

Creating the User interface Programmatically

Listening for Ui notifications

Overriding Methods Defined in an Activity

Registering Events for Views
Chapter 4: Designing your user interface using views

Basic Views

Text View ,Button, Image Button, Edit Text, Check
Box, Toggle Button, Radio Button, and Radio Group
Views

Progress Bar View

Auto Complete Text View
[39]

Picker Views

Time Picker View

Displaying the Time Picker in a Dialog Window

Date Picker View

Displaying the Date Picker View in a Dialog Window

List Views

List View

Customizing the List View

Using the Spinner View
Chapter 5: Displaying pictures and menus with views

Using image Views to Display Pictures

Gallery and Image View Views

Image Switcher

Grid View

Using Menus with Views

Creating the Helper Methods

Options Menu

Context Menu

Some Additional Views

Analog Clock and Digital Clock Views
Chapter 6: Data Persistence

Saving and Loading User Preferences

Using get Shared Preferences()

Using get Preferences()

Persisting Data to Files

Saving to Internal Storage

Saving to External Storage (SD Card)

Choosing the Best Storage Option

Using Static Resources
[40]

Creating and Using Databases

Creating the DB Adapter Helper Class

Using the Database Programmatically

Adding Contacts

Retrieving All the Contacts

Retrieving a Single Contact

Updating a Contact

Deleting a Contact

Upgrading the Database

Pre-Creating the Database

Bundling the Database with an Application
Chapter 7: Content Providers

Sharing Data in Android

Using a Content Provider

Predefined Query String Constants

Contents

Projections

Filtering

Sorting

Creating Your Own Content Providers

Using the Content Provider
Chapter 8: Messaging and networking

SMS Messaging

Sending SMS Messages Programmatically

Getting Feedback After Sending the Message

Sending SMS Messages Using Intent

Receiving SMS Messages

Updating an Activity from a Broadcast Receiver

Invoking an Activity from a Broadcast Receiver
[41]

Caveats and Warnings

Sending e-Mail

Networking

Downloading Binary Data

Downloading Text Files

Accessing Web Services

Performing Asynchronous Calls
Chapter 9: Location-Based Services

Displaying Maps

Creating the Project

Obtaining the Maps API Key

Displaying the Map

Displaying the Zoom Control

Changing Views

Navigating to a Specific Location

Adding Markers

Getting the Location That Was Touched

Geo coding and Reverse Geo coding

Getting Location Data

Monitoring a Location
Chapter 10: Developing Android Services

Creating Your Own Services

Performing Long-Running Tasks in a Service

Performing Repeated Tasks in a Service

Executing Asynchronous Tasks on

Separate Threads Using Intent Service

Communicating between a Service and an Activity

Binding Activities to Services
[42]
Chapter 11: Publishing Android Applications

Preparing for Publishing

Versioning

Digitally Signing Your Android Applications

Deploying APK Files

Using the adb exe Tool

Using a Web Server

Publishing on the Android Market

Creating a Developer Profile

Submitting Your Apps
Chapter 12: Broadcast Receiver
Chapter 13: Notifications
Chapter 14: Android (Advanced)

Graphics Design

Camera Handling

Map Handling

Video Handling

Bluetooth Handlin
[43]
C#.NET 6.0
INTRODUCTION TO .NET

What is .NET

Purpose of .NET
DIFFERENCE BETWEEN .NET 3.0, 3.5, 4.0, 4.5 & 4.6
INTRODUCTION TO .NET FRAMEWORK

What is .Net Framework

CLR –what is Common Language Runtime

.Net Class Library

User and Program Interface

Different Types of Application

Working with Windows Application

Working with Console Application

Diff between Win forms and Console App

ADVANCE FEATURES OF .NET FRAME
WORK 3.5,4.0 &4.5

What is a Service?

Windows Communication Foundation (WCF)

Architecture of WCF

Working with Different Contracts

Difference between Web Services and WCF

Windows Presentation Foundation (WPF)

Architecture of WPF

Working with Different Layout

Introduction to Windows Card Spaces (WCS)

Introduction to Windows Work Flow Foundation
(WFF)
INTRODUCTION TO C#

What is C#
[44]

Purpose of C#

Language and Syntax
FUNDAMENTALS OF C#

Data Types

Operators

Control Statements

Arrays

Loop

Variables arguments
COLLECTIONS
Why Collections?

Stack

Queue

Array List

Sorted List

Hash Table
OBJECT ORIENTED FEATURES OF C#

Classes and Objects

Data Member

Access Modifiers & their Scope

Method

Static

Constructor

This Keyword

Garbage Collection

Encapsulation

Inheritance

Polymorphism

Method Overloading

Method overriding
[45]

Understanding Interface

Using Interface

Partial Class
FILE STREAMS

Using File Classes

File

File Info

Directory

Directory Info

Stream Writer

Stream Reader

Text Writer

Text Reader
ARCHITECTURE OF WINDOWS FORMS

Control Class

Rich Control Class

Scrollable Control Class

Form Class
WINDOWS FORM CONTROL REFERENCE

Link Label

Panel

Group Box

Data Picker

Progress Bar

Timer

Login

Grid view

Masked Textbox

Split Container

Flow Layout Panel
[46]

Folder Browser
VALIDATING CONTROLS

Error Provider
DIALOG CONTROLS

Color Dialog

Save File Dialog

Font File Dialog

Open Dialog

Folder Dialog
MENU CONTROLS

Tool strip

Status Strip

Menu Strip

Context Menu Strip

Tool Strip Manager
EXCEPTION HANDLING

Importance of Exception Handling

Exception types

Using Try and Catch

Throw, throws, finally

Writing user defined exception

In-Built Exception Handling
NETWORK PROGRAMMING

Introduction to Networking

InetAddress

URL

TCP Socket and Server Socket

UDP Socket

Introduction User Input
XML
[47]

How to create an XML file

Use of Ad rotator control

Access XML file usingADO.Net

Read XML file

Write XML file
DATA ACCESS USING ADO.NET

Over view of ADO.Net

Life Cycle of ADO.Net

Difference between ADO and ADO.Net
ADO.NET ARCHITECTURE AND OBJECT MODEL

Introduction to Dataset

Introduction to Data adapter

Manipulating database using Dataset

Manipulating Oracle database using Dataset

Manipulating SQL Server database using
Dataset

Manipulating of Remote database

Manipulating XML Files using Data Access
Controls

Executing Command

OLEDB AND SQL CLIENT Providers

Accessing Stored Procedures

Accessing Stored Procedures with Parameters

Filter Data Using Database

Handling Database errors
XML INTRODUCTION

Role of XML in .Net

XML Table Manipulation

Insert

Update
[48]

Delete
ASSEMBLES

Name Spaces

Creating Private Assembly

Creating Shared Assembly

Strong Key

Public Key Token

Versioning

Configuration Files

Satellite Assemblies
COM INTEROPERABILITY

Creating COM Components

Runtime Callable Wrapper

Com Callable Wrapper

Calling COM Components Using C#

Assessing Assemblies through COM
MANIPULATING THE FILES & REGISTRY

Managing the Files

Creating Directory

Reading and Writing of Files

File Security
INTRODUCTION TO GDI+

Creating Graphics Objects with GDI+
CREATING CONTROLS

Use Controls

Types of Controls

Adding Properties

Adding Events

User Windows in Control Form

Host a windows control inside Microsoft Internet
[49]
Explorer
MULTI THREADING

System Threading

Thread Synchronization

Thread Lifecycle
GLOBALIZATION

Globalization and Localization of the UI
SECURITY

Code Level Security
CRYPTOGRAPHY

Cryptography Services

Encrypt and Decrypt a file

Generate and compare Hash value

Cryptography primitive
WINDOW SERVICE
What is a Service?
Diff between Web Service and Window Service

Designing Windows services

Installing and restring windows services

Binding windows service to C# application

About SCM
DEPLOYMENT

Planning the deployment

Web based deployment, net-work based

deployment

Creating a Setup, Register Components and
Assemblies Install-Time compilation

Adding Assemblies to the GAC

Security

Policy Verifications
[50]
REPORTS

CRYSTAL REPORT

Crystal Report Viewer

Crystal Report Source
SERIALIZATION

What is Serialization?

What is De-Serialization?

Using Binary formatter

Using SOAP Formatter
REMOTING

Introduction to Remoting

Passing Objects to Remote Method
GENERICS

Generics Collection Classes

Create Customer Generic Class

Generic Delegates
MEMORY MANAGEMENT & POINTER

Memory Management under the hood

Freezing Unmanaged Resources

Unsafe Code
DATA CONTROLS

Data Grid View

Dataset

Binding Source

Binding Navigator
CONTAINER CONTROLS

Panel

Group Box

Flow Layout Control

Table Layout Control
[51]

Tab Control

Split Container
WPF

Introduction

What is WPF

Goals, Benefits & Drawbacks

First WPF Application

Types of WPF Application (Windows Based
and Browser Based)
XAML

Introduction to XAML

XAML – Extensible Application Markup
Language.

Content Models
WORKING WITH CONTROLS

Menus

Label

Button

Checkbox

Radio Button

Repeat Button

Toggle Button

ToolTip

Expander

Group Box

Textbox

Combo Box

List Box

Menu
[52]

Status Bar

Tab Control

Toolbar

Tree View

Notify Icon

Menus and Toolbars
Layout

Border

Canvas

Dock Panel

Grid

Stack Panel

Wrap Panel
ASP.NET 4.5, 4.6
INTRODUCTION TO WEB APPLICATIONS

Overview of ASP

Overview of ASP.Net Page

Code In-Line Model

Code Behind Model
HTML

Introduction to .Net Frame Work

Working with HTML Controls

Overview of Attributes.
WHAT IS DOTNET FRAME WORK

Common Language Runtime (CLR)

.Net Class Framework–User and Program
Interface. Net

Common Type System(CTS)

Common Language Specification (CLS).
[53]

MSIL(Microsoft Intermediate Language)
INTRODUCTION TO ASP.NET

What is ASP.Net?

Complete Life Cycle of Asp.Net Page.

Difference between ASP and ASP.Net.

Execution Process of .Net Application.
ADVANCE FEATURES OF .NET FRAME WORK

Windows Communication Foundation (WCF)

Windows Presentation Foundation (WPF)

Windows Card Spaces (WCS)

Windows Work Flow Foundation (WFF)

Client Server Architecture

3-Tier/N-Tier Architecture
INTRODUCTION TO VB.NET AND C#.NET LANGUAGE

Variables declaration

Encapsulation

Abstraction

Inheritance

Polymorphism

Delegates

Exception Handling
ASP.NET WEB FORMS

Introduction to Web Forms

Working with Server Controls

Rich Controls

Customization
ASP.NET WEB CONTROLS

HTML Server Controls

Web Server Controls
[54]

Data Bound Controls.

Grid View

Data List

Repeater

Details View

Forms View

List View
VALIDATION CONTROLS

Required Field Validate

Compare Validate

Regular Expression Validate

Range Validate

Custom Validate

Validation Summary
WORKING WITH MASTER PAGE

Creation of Master Page.

Creation of Content Page.

Working with Content Placeholder

Creation of Main Page

Including Navigation Controls.
DATA ACCESS USING ADO.NET

Overview of ADO.NET

ADO.NET architecture and object model

Introduction to Dataset

Difference between Dataset and Record set

Data binding

Retrieving data using OLEDB and SQLCLIENT

Providers

Introduction to Data adapter

Manipulating databases using Dataset
[55]

Manipulating of Oracle database using Dataset

Manipulating of SQL Server database using
Dataset

Manipulation of Remote Access Database

Manipulation using XML datasheet

Using Data access controls

Executing Command

Populate Dataset

Filter Data
WORKING WITH BUSINESS OBJECTS
NAMESPACE WITH DLL

Creating DLL

Calling DLL

Database Connectivity Using DLL
COM INTEROPERABILITY

RCW

CCW
CONFIGURATION

Configuration overview

Overview of WEB.Config file

Configuration file format

CONFIGURATION FILES

Overview of Machine.Config file

Working with WEB.Config File

Retrieving configuration

Provide connection string

Difference between WEB.Config file and
Machine.Config file
XML WEB SERVICES

Create Web Services
[56]

Consuming Web Services.

WSDL (metadata generation).
INTRODUCTION TO SOAP, UDDI, WSDL
WEB FORMS USER CONTROL

Introduction to User Control (.ascx)

Creating User Control for Asp.Net page

Customizing ASP.Net application

Using user control-Assemblies
ASP.NET WEB APPLICATION

Application overview

Using the Global.asax file

Managing application state

Event Handlers
CACHE FEATURES

What is Caching?

Use of Cache.

Caching overview

Data caching

Page output caching

Fragment caching
DEBUGGING

The SDK Debugger
SECURITY OVERVIEW

Authentication and Authorization

Windows based Authentication

Forms based Authentication

Authorizing users and roles

Users account Impersonation

Security and Web Services

Passport Authentication
[57]
GLOBALIZATION

User encodings

Setting current culture and region

Handling multiple encoding

Globalization and Localization of the UI

Changing culture by using Config.file
TRACING

Tracing overview

Trace logging to page output

Application level traces logging

Writing Trace Messages.
DEPLOYMENT

Deploying Applications

Using the Process Models

Types of Deployment.
IIS (Internet Information Server).
Introduction to IIS.

Different Version of IIS

Deploy Asp.Net Application using IIS.
STATE MANAGEMENT

What is State Management?

Type of Techniques used.

Page Life Cycle without state.

Page Life Cycle with State.
STATE TECHNIQUES

Sessions

Cookies

View State

Query String

Application.
[58]

Hidden Fields.

Diff between session and Application

Choosing best State Management
WITH DATASOURCES

SqlData Source

Access Data Source

Object Data Source

XML Data Source

Sitemap Data Source

Linq Data Source

Entity Data Source
WCF
Introduction Architecture of WCF

Evolution of WCF

Evolution of Service Oriented Architecture
(SOA)

What is WCF
Developing WCF Service Application and Client

Hosting
WCF
Service
in
IIS/ASP.NET
Development Server

Using a Service in the client application
Contracts

Service Contract.

Operation Contract.

Data Contract.
Endpoints in configuration file

What are End points?

ABC - Address, Binding & Contract.
[59]

Importance of IMetadataExchange Contract /
Endpoint.

Configuring service behavior in configuration
file

WCF Service Configuration Editor
AJAX
Introduction to AJAX

What is AJAX?

Ajax rich clients in the real world

Ajax advantages and disadvantages

The purpose of AJAX

Traditional web application

An AJAX web application

Alternatives to Ajax

AJAX Components

key elements of Ajax
Ajax Controls

Script Manager

Script Manager Proxy

Update Panel

Update Progress Control

Timer Control
Ajax Extension Control Tool Kit
[60]
SILVERLIGHT
INTRODUCTION TO SILVERLIGHT

What is Silver light?

Tools for creating Silver light Applications

Difference in versions

Different types of Applications in Silver light
ARCHITECTURE OF SILVERLIGHT
HOW IT IS USED WITH .NET
DEVELOPING FIRST SILVERLIGHT APPLICATION
SILVERLIGHT AND XAML
SILVERLIGHT UI CONTROLS

Layout Management and Grouping Controls

Form Controls

Data Integration and Data Manipulation
Controls

Functional Controls

Navigation
[61]
CLOUD COMPUTING
OVERVIEW D-COMPUTING

Trends of computing

Introduction to distributed computing

Next big thing: cloud computing
INTRODUCTION

What’s cloud computing

Properties & Characteristics

Service models

Deployment models
IAAS

Introduction to IAAS
PAAS

Introduction to PAAS

Cloud platform & Management


Computation

Storage
Case studies
SAAS

Introduction to SAAS

Web services
CLOUD ISSUES AND CHALLENGES
[62]
SPOTFIRE
Introduction

Introduction to business analytical tools

What is spot fire
Data access

Interactive visualizations

Underlying data tables(s)

Basic layout

Open form files

Import settings

Open from databases

Library
Create visualizations

Bar chart & properties

Histogram & trellis

Line chart & dates

Graphical tables

Lines as patterns

Combination charts

Scatter plots & coloring

Pie charts & size scale

Tables and display value
Interactivity

Tooltip display
[63]

How to mark, drill down

Details on demand

Multiple marking

Details visualization

Filter types , hide filters

Marking to filter data

Filtering scheme

Ways to limit data
Save & export

Save linked to source data

Save data embedded

Save analysis as a file

Save as a library item

Reload linked data

Replace data table

Export data

Export images
Add data

Calculated columns

Binned columns

Hierarchies

Insert columns

Insert rows

Multiple data tables

Manage relations

Transformations
[64]
Capturing the analysis

Add bookmark

Apply bookmark

Special bookmark
Other visualizations

Tree map

Box plot

Map chart

Heat map
Advanced concepts

Custom expressions

K-means clustering

Information model

Information designer

Information links
Administration

Architecture
Mange services

Schedule updates
[65]
TABLEAU
Interdiction and overview

Why tableau? Why visualization?

Level setting – terminology

Getting started – creating some powerful
visualization quickly

Things you should known about tableau
Getting started

Connecting to data and introduction to data
source concepts of working with data files
versus database servers

Understanding the tableau workspace

Dimensions and measures

Using show me!

Tour of shelves (how shelves and marks work)

Building basic views

Help menu and samples

Shaving and sharing your work
Concepts and options when connecting to data

Overview of other connection options

Joining multiple tables

Data blending copy and paste data extracts

Custom SQL

Publishing and Re-using data connections
[66]

Understand how to deal with data changes in
your data source such as field addition, deletion
or name change

Re-using and sharing data connections – the
concept of meta data

Working with multiple connections in the same
workbook
Analysis

Creating views

Marks

Size and transparency

Highlighting

Working with dates

Date aggregations and date parts

Discrete versus continuous

Dual axis / multiple measures

Combo charts with different marks types
o
Geographic map
o
Page trails
o
Heat map
o
Density chart
o
Scatter plots
o
Pie charts and bar charts
o
Small multiples
o
Working with aggregate versus
disaggregate data
Analyzing
[67]
o
Sorting & grouping
o
Aliases
o
Filtering and quick filters
o
Cross – tabs (pivot tables ) totals and
subtotals
o
Drilling and drill through
o
Aggregation and disaggregation
percent of total
o
Working with statistics and trend lines
Getting started with calculated fields

Working with string functions

Basic arithmetic calculations

Date math

Working with totals

Custom aggregations

Logic statements
Formatting

Options in formatting your visualization

Working with labels and annotations

Effective use of titles and captions

Introduction to visual vest practices
Building interactive dashboards

Combining multiple visualizations into a
dashboard

Making your worksheet interactive by using
actions and filters
[68]

An introduction to best practices in visualization
Sharing workbooks

Publish to reader

Packaged workbooks

Publish to office

Publish to pdf

Publish to tableau server and sharing over the
web
Putting it all together

Scenario-based review exercises

Best practices
Where to get further assistance

The help file / product manual

Knowledge base

Forums

Whitepapers & books

Further training offerings & professional
services technical support
[69]
Download