The document provides a table of contents listing various Dot Net and Java project titles related to domains like cloud computing, mobile computing, network security, data mining, image processing, and more. It then describes the services offered by Skiveprojects such as project guidance, training, seminars, and internships to help students with their projects and career development. The document aims to provide students with IEEE project ideas and guidance for their final year studies.
This document provides an overview and introduction to an iOS App Development course. It includes acknowledgements, course descriptions and objectives, evaluation criteria involving homework and projects, an overview of the iOS architecture and developer tools, and a basic "Hello World" example in Objective-C using Xcode. The course aims to teach students Objective-C, the iOS SDK frameworks, and design patterns for building iPhone and iPod touch applications.
This document describes a final project report for a CyberGIS system. The project aimed to enhance an existing GIS solution by adding customizable domain maps, reporting and analysis features, and mobile capabilities. It includes sections on the literature review, proposed method, system design, software development, testing, results, and conclusions. Diagrams and appendices provide additional details on use cases, classes, sequences, activities, and screen designs for the CyberGIS modules.
KaaShiv InfoTech, A Software Company run by Microsoft Most Valuable Professional, Anna Nagar, Chennai –
WWW.Kaashivinfotech.com ; Email: kaashiv.info@gmail.com ; venkat@kaashivinfotech.com.....FINAL YEAR PROJECT
The document discusses applying a methodology to network design. It introduces Cisco's Service-Oriented Network Architecture (SONA) framework, which aims to build intelligence in the network. SONA has three layers: an integrated infrastructure layer, an interactive services layer, and an application layer. The document also discusses identifying customer requirements, which is the first step in Cisco's PPDIOO network life-cycle design methodology. It involves identifying planned applications and their criticality levels.
http://prolifics.com/
This presentation takes a deep dive into the latest features of IBM WebSphere MQ and Message Broker to see how these new capabilities are changing the world. It examines how MQ and Message Broker can connect anything, anywhere and achieve universal connectivity with:
- Enhanced file and messaging capabilities of IBM WebSphere Message Broker 8.0 and WebSphere MQ 7.5, including the ability to handle many formats (i.e. XML, CSV, etc.)
- The ability of WebSphere MQ Telemetry Transport (MQTT) to connect through the web or through devices
- An extended reach of WebSphere MQ via the new HTTP and FTP bridges
- High Availability that makes the system more reliable than ever and allows WebSphere MQ clients to automatically reconnect
Windows Server 2008 Certification PathsPipeline Srl
This document outlines various certification paths for Microsoft's Windows Server 2008 technologies. It provides an overview of:
1) Technology Specialist certifications which each require passing one exam to earn an MCTS in specific areas like Active Directory, Networking, or Applications.
2) MCITP certifications like Server Administrator which require passing multiple exams to demonstrate broader server skills.
3) Upgrade paths for existing MCSE and MCSA professionals to transition their skills to the new Windows Server 2008 technologies through one or two additional exams.
This document provides an overview and introduction to an iOS App Development course. It includes acknowledgements, course descriptions and objectives, evaluation criteria involving homework and projects, an overview of the iOS architecture and developer tools, and a basic "Hello World" example in Objective-C using Xcode. The course aims to teach students Objective-C, the iOS SDK frameworks, and design patterns for building iPhone and iPod touch applications.
This document describes a final project report for a CyberGIS system. The project aimed to enhance an existing GIS solution by adding customizable domain maps, reporting and analysis features, and mobile capabilities. It includes sections on the literature review, proposed method, system design, software development, testing, results, and conclusions. Diagrams and appendices provide additional details on use cases, classes, sequences, activities, and screen designs for the CyberGIS modules.
KaaShiv InfoTech, A Software Company run by Microsoft Most Valuable Professional, Anna Nagar, Chennai –
WWW.Kaashivinfotech.com ; Email: kaashiv.info@gmail.com ; venkat@kaashivinfotech.com.....FINAL YEAR PROJECT
The document discusses applying a methodology to network design. It introduces Cisco's Service-Oriented Network Architecture (SONA) framework, which aims to build intelligence in the network. SONA has three layers: an integrated infrastructure layer, an interactive services layer, and an application layer. The document also discusses identifying customer requirements, which is the first step in Cisco's PPDIOO network life-cycle design methodology. It involves identifying planned applications and their criticality levels.
http://prolifics.com/
This presentation takes a deep dive into the latest features of IBM WebSphere MQ and Message Broker to see how these new capabilities are changing the world. It examines how MQ and Message Broker can connect anything, anywhere and achieve universal connectivity with:
- Enhanced file and messaging capabilities of IBM WebSphere Message Broker 8.0 and WebSphere MQ 7.5, including the ability to handle many formats (i.e. XML, CSV, etc.)
- The ability of WebSphere MQ Telemetry Transport (MQTT) to connect through the web or through devices
- An extended reach of WebSphere MQ via the new HTTP and FTP bridges
- High Availability that makes the system more reliable than ever and allows WebSphere MQ clients to automatically reconnect
Windows Server 2008 Certification PathsPipeline Srl
This document outlines various certification paths for Microsoft's Windows Server 2008 technologies. It provides an overview of:
1) Technology Specialist certifications which each require passing one exam to earn an MCTS in specific areas like Active Directory, Networking, or Applications.
2) MCITP certifications like Server Administrator which require passing multiple exams to demonstrate broader server skills.
3) Upgrade paths for existing MCSE and MCSA professionals to transition their skills to the new Windows Server 2008 technologies through one or two additional exams.
The document contains a table of contents listing various project titles related to different technologies like Dot NET, Java, Network Simulator (NS2), embedded systems, MATLAB etc. It then provides a brief introduction about the organization called Skiveprojects which provides guidance and training for student projects. It lists some benefits of doing IEEE projects for final year students. It also mentions that they can help develop custom projects according to students' requirements. The first section focuses on Dot NET IEEE titles related to cloud computing and lists 7 project titles along with their codes, descriptions, technologies used and application areas.
The document contains a table of contents listing various project titles related to different technologies like Dot NET, Java, Network Simulator (NS2), Embedded Systems etc. It provides 7 project titles related to cloud computing in Dot NET including projects on cloud usage for education, scalable transactions in cloud, data integrity and security in cloud, optimal service pricing in cloud, failure avoidance through fault prediction and multi-level intrusion detection in cloud. It also provides information on the organization providing the projects and benefits of doing projects.
Spectrum at 25: One agency's story of transformationAaron Johannes
Spectrum Society has tried to be thoughtful about the focus of our supports for 25 years, and this is our story about becoming a learning organization. Originally presented by Susan Stanfield and Ernie Baatz at the InclusionBC 2013 Conference in Vancouver B.C.
This document is a letter from Milestone Knowledge Consultancy introducing themselves as a professionally managed human resource consultancy that provides recruitment services. They offer placement of candidates in various industries like IT, software, automobiles, life sciences, engineering, manufacturing, exports, hospitality, real estate, telecom, power, oil and gas, packaging, FMCG, computer peripherals, KPO, BPO and more. Their placement charges are 8.33% of the gross annual emoluments (total cost to company) offered to candidates. They guarantee replacement of any candidate who leaves within 90 days of joining at no extra cost.
Momotaro is a Japanese folktale about a brave baby boy born from a peach who grows up and goes on a journey with a dog, monkey, and pheasant to defeat demons on an island. After killing the demons, Momotaro obtains treasure from the island.
FABSYS Technologies Pvt.Ltd., one of the leading R&D company situated near guindy which offersfinal year project guidance in various technology and domain such as JAVA DOTNET MYSQL PHP NS2 MATLAB EMBEDDED SYSTEM VLSI..etc., For titles and abstract log on to www.skiveprojects.com or mail to skiveprojects@gmail.com Ph: 9176990090, 044-42712737.Company offers 25 days training make use of it. Pass this message to your friends too. Note: Limited no of seats only certificate with incentives...Hurry....
Momotaro is a Japanese folktale about a brave baby boy born from a peach who grows up and goes on a journey with a dog, monkey, and pheasant to defeat demons on an island. After killing the demons, Momotaro obtains treasure from the island.
Reflecting on:What Works: Self Advocates as Leaders in their Lives, Groups, ...Aaron Johannes
Reflections on a presentation by Barb Goode, Liz Etmanski and Aaron Johannes on inclusive research about leadership and people with intellectual disabilities at the 2015 Inclusion B.C. conference in Vancouver, B.C..
This article provides a critique of the paper "Connectivism and Dimensions of Individual Experience" by Carmen Tschofen and Jenny Mackness. It summarizes the key themes of connectivism explored in their paper, such as autonomy, connectedness, diversity and openness. It also discusses some of the tensions identified between these connectivist ideals and the realities of individual experience in MOOCs. However, the critique finds the original paper difficult to understand for those unfamiliar with MOOCs and connectivism concepts due to its use of jargon and limited research scope.
Social Media Citizenship: Please leave your cell phone on! How People with D...Aaron Johannes
The document provides an overview of using social media for social change and advocacy. It discusses various social media platforms like Facebook, Twitter, and LinkedIn and how they can be used to spread messages and engage with elected officials and causes. Specific tips are provided for using hashtags, sharing content, and building relationships online. The document also discusses internet safety and creating social media plans for both individuals and organizations.
Inquizitiive 2016 General quiz Finals as part of Agon 2016 (CNMC) by Partha S...Partha Abarki
Finals of Inquizitive 2016 -the General quiz of Agon 2016 (the cultural fest of Calcutta National Medical College) - conducted by Partha Sarathi Ghatak (Partha Abarki)
Inquizitive 2016 Prelims at Agon 2016 (CNMC) by Partha Sarathi Ghatak (Partha...Partha Abarki
- The document discusses the preliminaries of a quiz competition held by Agon 2016, with 25 questions and the top 8 teams advancing. It provides the questions and answers to the first 5 questions, which relate to saints, sports brands, country names, horse racing terms, and a song by Gypsy Kings.
The document provides information about Aadhavan Technology Solutions (P) Limited (ATSPL), a technology company focused on software, web, embedded systems, VLSI, and DSP product development. ATSPL has state-of-the-art facilities for academic project training in these areas. Their facilities include classrooms equipped with design software tools. Their objective is to bridge the gap between university curriculum and industry needs by providing hands-on project training and guidance for final year projects. They are located in Chennai, India near public transportation.
The document discusses the rise of network virtualization and software-defined networking (SDN). It describes early research projects on campus networks like Ethane in 2007 that led to the OpenFlow specification in 2008. This allowed experiments with new network protocols. The document outlines the founding of Nicira in 2007 and the company's product launch of the Network Virtualization Platform in 2012, which used SDN to virtualize networks.
This document provides an overview of emerging machine learning architectures, including cloud, edge, fog, and mist computing. It discusses the timeline of remote and machine learning computing from early cloud computing to current edge and fog approaches. The need for edge computing to address latency issues for applications like augmented reality and face recognition is explained. Key aspects of fog computing like its role in scalably extending cloud computing to network edges are covered. The document also provides an example of implementing deep learning for an IoT video recognition application across edge and cloud resources.
Model Driven Architecture (MDA): Motivations, Status & Futureelliando dias
The document discusses Model Driven Architecture (MDA), an approach developed by the Object Management Group (OMG) that uses models to manage complexity in software development. MDA aims to improve productivity by making applications more portable, interoperable, and able to evolve independently of platforms. It promotes modeling software at a platform-independent level and then mapping models to specific platforms. The document provides an overview of MDA and examples of how it has been applied to areas like application integration, metadata integration, and data warehousing. It also outlines some ongoing MDA work related to topics like enterprise application integration and model transformations.
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...Ishan Vaishnavi
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
Next-Generation Closed-Loop Automation - an Inside ViewLaurent Ciavaglia
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
The document contains a table of contents listing various project titles related to different technologies like Dot NET, Java, Network Simulator (NS2), embedded systems, MATLAB etc. It then provides a brief introduction about the organization called Skiveprojects which provides guidance and training for student projects. It lists some benefits of doing IEEE projects for final year students. It also mentions that they can help develop custom projects according to students' requirements. The first section focuses on Dot NET IEEE titles related to cloud computing and lists 7 project titles along with their codes, descriptions, technologies used and application areas.
The document contains a table of contents listing various project titles related to different technologies like Dot NET, Java, Network Simulator (NS2), Embedded Systems etc. It provides 7 project titles related to cloud computing in Dot NET including projects on cloud usage for education, scalable transactions in cloud, data integrity and security in cloud, optimal service pricing in cloud, failure avoidance through fault prediction and multi-level intrusion detection in cloud. It also provides information on the organization providing the projects and benefits of doing projects.
Spectrum at 25: One agency's story of transformationAaron Johannes
Spectrum Society has tried to be thoughtful about the focus of our supports for 25 years, and this is our story about becoming a learning organization. Originally presented by Susan Stanfield and Ernie Baatz at the InclusionBC 2013 Conference in Vancouver B.C.
This document is a letter from Milestone Knowledge Consultancy introducing themselves as a professionally managed human resource consultancy that provides recruitment services. They offer placement of candidates in various industries like IT, software, automobiles, life sciences, engineering, manufacturing, exports, hospitality, real estate, telecom, power, oil and gas, packaging, FMCG, computer peripherals, KPO, BPO and more. Their placement charges are 8.33% of the gross annual emoluments (total cost to company) offered to candidates. They guarantee replacement of any candidate who leaves within 90 days of joining at no extra cost.
Momotaro is a Japanese folktale about a brave baby boy born from a peach who grows up and goes on a journey with a dog, monkey, and pheasant to defeat demons on an island. After killing the demons, Momotaro obtains treasure from the island.
FABSYS Technologies Pvt.Ltd., one of the leading R&D company situated near guindy which offersfinal year project guidance in various technology and domain such as JAVA DOTNET MYSQL PHP NS2 MATLAB EMBEDDED SYSTEM VLSI..etc., For titles and abstract log on to www.skiveprojects.com or mail to skiveprojects@gmail.com Ph: 9176990090, 044-42712737.Company offers 25 days training make use of it. Pass this message to your friends too. Note: Limited no of seats only certificate with incentives...Hurry....
Momotaro is a Japanese folktale about a brave baby boy born from a peach who grows up and goes on a journey with a dog, monkey, and pheasant to defeat demons on an island. After killing the demons, Momotaro obtains treasure from the island.
Reflecting on:What Works: Self Advocates as Leaders in their Lives, Groups, ...Aaron Johannes
Reflections on a presentation by Barb Goode, Liz Etmanski and Aaron Johannes on inclusive research about leadership and people with intellectual disabilities at the 2015 Inclusion B.C. conference in Vancouver, B.C..
This article provides a critique of the paper "Connectivism and Dimensions of Individual Experience" by Carmen Tschofen and Jenny Mackness. It summarizes the key themes of connectivism explored in their paper, such as autonomy, connectedness, diversity and openness. It also discusses some of the tensions identified between these connectivist ideals and the realities of individual experience in MOOCs. However, the critique finds the original paper difficult to understand for those unfamiliar with MOOCs and connectivism concepts due to its use of jargon and limited research scope.
Social Media Citizenship: Please leave your cell phone on! How People with D...Aaron Johannes
The document provides an overview of using social media for social change and advocacy. It discusses various social media platforms like Facebook, Twitter, and LinkedIn and how they can be used to spread messages and engage with elected officials and causes. Specific tips are provided for using hashtags, sharing content, and building relationships online. The document also discusses internet safety and creating social media plans for both individuals and organizations.
Inquizitiive 2016 General quiz Finals as part of Agon 2016 (CNMC) by Partha S...Partha Abarki
Finals of Inquizitive 2016 -the General quiz of Agon 2016 (the cultural fest of Calcutta National Medical College) - conducted by Partha Sarathi Ghatak (Partha Abarki)
Inquizitive 2016 Prelims at Agon 2016 (CNMC) by Partha Sarathi Ghatak (Partha...Partha Abarki
- The document discusses the preliminaries of a quiz competition held by Agon 2016, with 25 questions and the top 8 teams advancing. It provides the questions and answers to the first 5 questions, which relate to saints, sports brands, country names, horse racing terms, and a song by Gypsy Kings.
The document provides information about Aadhavan Technology Solutions (P) Limited (ATSPL), a technology company focused on software, web, embedded systems, VLSI, and DSP product development. ATSPL has state-of-the-art facilities for academic project training in these areas. Their facilities include classrooms equipped with design software tools. Their objective is to bridge the gap between university curriculum and industry needs by providing hands-on project training and guidance for final year projects. They are located in Chennai, India near public transportation.
The document discusses the rise of network virtualization and software-defined networking (SDN). It describes early research projects on campus networks like Ethane in 2007 that led to the OpenFlow specification in 2008. This allowed experiments with new network protocols. The document outlines the founding of Nicira in 2007 and the company's product launch of the Network Virtualization Platform in 2012, which used SDN to virtualize networks.
This document provides an overview of emerging machine learning architectures, including cloud, edge, fog, and mist computing. It discusses the timeline of remote and machine learning computing from early cloud computing to current edge and fog approaches. The need for edge computing to address latency issues for applications like augmented reality and face recognition is explained. Key aspects of fog computing like its role in scalably extending cloud computing to network edges are covered. The document also provides an example of implementing deep learning for an IoT video recognition application across edge and cloud resources.
Model Driven Architecture (MDA): Motivations, Status & Futureelliando dias
The document discusses Model Driven Architecture (MDA), an approach developed by the Object Management Group (OMG) that uses models to manage complexity in software development. MDA aims to improve productivity by making applications more portable, interoperable, and able to evolve independently of platforms. It promotes modeling software at a platform-independent level and then mapping models to specific platforms. The document provides an overview of MDA and examples of how it has been applied to areas like application integration, metadata integration, and data warehousing. It also outlines some ongoing MDA work related to topics like enterprise application integration and model transformations.
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...Ishan Vaishnavi
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
Next-Generation Closed-Loop Automation - an Inside ViewLaurent Ciavaglia
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside viewPedro Henrique Gomes
The document provides an overview of next-generation closed-loop automation by three experts - Laurent Ciavaglia from Nokia, Pedro Henrique Gomes from Ericsson, and Ishan Vaishnavi from Lenovo. It introduces the speakers and their backgrounds working on closed-loop automation standards. The tutorial aims to share experience in standards development and present the latest developments in standards and open source towards multi-vendor coordinated closed-loop automation solutions.
Orange Labs uses model-driven software development tools to optimize resources, minimize defects, and maintain a flexible architecture. Their initial goals were to reduce costs through preliminary design work, improve quality by sharing a common model, and maintain flexibility. They have evolved their process to use Maven, Jonas, and Enterprise Architect with Acceleo code generation instead of their previous tools. Feedback indicates benefits of increased accessibility and reduced licensing costs, though a complete Eclipse UML modeler would be preferable.
This document introduces the topic of using semantic web services for computational mechanics. It discusses how current structural analysis software requires close human guidance and can be tedious and time-consuming. Distributed computing technologies like web services and the semantic web can help unify scattered computational resources and automate structural analysis. By augmenting web pages with machine-readable semantic data, computers can intelligently discover, execute, and compose web services to perform complex analysis tasks with less human involvement. The goal is to transform the web into a large-scale distributed computational platform for engineering applications.
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012Arun Gupta
This document discusses Oracle WebLogic Server 12c and its ability to develop modern, lightweight Java EE 6 applications for both conventional and cloud deployment environments. It highlights how WebLogic Server 12c allows developers to extend their existing skills with the latest Java standards and integrate with open source frameworks. Developers can write less glue code and focus more on business logic by leveraging WebLogic Server's integrated services.
Challenges and solutions in Cloud computing for the Future InternetSOFIProject
This document discusses two projects - REMICS and Cloud4Trends - that address challenges in cloud computing. REMICS develops a model-driven methodology for migrating legacy applications to cloud services and addresses interoperability issues. It focuses on providing a domain-specific language for abstracting cloud deployment complexity and solving behavioral and data interoperability. Cloud4Trends leverages cloud infrastructure for real-time trend detection in social media streams, providing a scalable solution for analyzing large-scale data. It detects variations and trends using a cloud computing service developed by the VENUS-C project.
This document provides a summary of William McGrath's experience as an IT professional with over 26 years of experience in storage architecture, implementation, and maintenance. He has expertise in technologies from vendors such as EMC, NetApp, Cisco, HP, Oracle, and more. His most recent role involved architecting and implementing a hybrid cloud infrastructure delivering storage as a service.
This document outlines a course on network design. The course emphasizes analyzing, designing, and implementing typical data communication networks. Students will learn techniques for network infrastructure design and how to apply their knowledge to implement real networks. They will study topics like local area network design, high-speed network design, and top-down network design approaches. Assessment includes coursework, a final exam, and activities like designing and analyzing networks to address organizational requirements.
This document describes Model2Roo, a web application development tool based on the Eclipse Modeling Framework and Spring Roo. It allows generating web applications by transforming UML class diagrams into Spring Roo commands. The document discusses the background of the project, its objectives, related work, issues identified by users, technical issues addressed, and recent improvements made, including implementing transformations with Acceleo templates and improving support for properties and installation.
Cloud computing promises to offer great opportunities for research groups; however when researchers want to execute applications in cloud infrastructures many complex processes must be accomplished. In this presentation we present the e-Clouds project which will allow researchers to easily execute many applications on public Infrastructure as a Service (IaaS) solutions. Designed for being a Software as a Service (SaaS) marketplace for scientific applications, e-Clouds allows researchers to submit jobs which are transparently executed on public IaaS platforms, such as Amazon Web Services (AWS). e-Clouds manages the on-demand provisioning and configuration of computing instances, storage, applications, schedulers, jobs, and data. The architectural design and how a first application has been supported on e-Clouds are presented. e-Clouds will allow researchers to easily share and execute applications in the cloud at low TCO (Total Cost of Ownership) and without the complexities associated with details of IT configurations and management. e-Clouds provides new opportunities for research groups with low or none budget for dedicated cluster or grid solutions, providing on-demand access to ready-to-use applications and accelerating the result generation of e-Science projects.
PATHS Final prototype interface design v1.0pathsproject
This document summarizes the design methodology and current status of the interface design for the second prototype of the PATHS project. It begins with a three-stage design methodology that includes: evaluating the first prototype design process, creating low-fidelity storyboards, and developing high-fidelity interaction designs. It then reviews lessons learned from developing the first prototype interface. The document introduces new user interface components and presents preliminary high-fidelity designs for key pages like the landing page, path editing, and item pages. Expert evaluation of the designs is planned along with user evaluation of a working prototype. The goal is to address issues identified in prior evaluations and create an intuitive interface for the PATHS cultural heritage system.
This document provides an overview of the J2EE platform and architecture. It discusses the history of distributed computing and evolution of enterprise application development frameworks. The key aspects of J2EE covered include the APIs and technologies such as servlets, JSP, EJB, connectors, security. Benefits to developers include portability, choice of implementations, and community resources. Benefits to businesses include application portability and choice of vendors.
Exploring MERN Stack and Tech Stacks: A Comparative AnalysisIRJET Journal
This document provides a comparative analysis of the MERN stack and other technology stacks for web development. It begins with an overview of the MERN stack components - MongoDB for the database, Express.js for the backend framework, React.js for the frontend interface, and Node.js for running JavaScript on the server-side. Alternative stacks discussed include MEAN, Django, Ruby on Rails, LAMP, Python Flask, and Spring Boot. The efficiency of each stack depends on factors like the project requirements, developer expertise, and scalability needs. An example application of an e-learning platform using the MERN stack is also presented to illustrate its capabilities. The document concludes that the MERN stack is a powerful and versatile framework
The emerging technologies are replacing the old hardware and software. Today the speed & security of data is most important. Since data storing and its sharing has become very important in today’s world of globalization, so a platform is required which can provide us secure and platform independent file storing and sharing. Now-a-days Internet is available with tablets and mobile devices as well as personal computers. So a service should be accessible from desktop, website (browser) and Mobile platforms so that we can use Internet to store data securely and share data. Android is emerging Mobile platform now-a-days as well as in future as published by Google.
We designed this project to fulfil all this demands and requirements and with a full-fledged business model, which can make this project commercially viable, so that we can bring this from a project to real-time Product.
This System is a server-based hosting service designed as client-server model that uses server storage to enable users to store and share files and folders with others across the internet. The server is hosted on three Linux based servers. The client is having three modes of communication. It has a desktop application, Web-site and an Android Mobile application. The Desktop module is having a folder containing important files synchronized with server. The regular update of folder is synchronized with server which ensures the secure storage of files. The website is the gateway to see all the files and the download them on the Desktops where the application is not installed. Android application is to be installed on Mobiles and tablets for availing the services.
As per security requirement of the files the project uses GPS service, and Encryption of files, to avoid many types of Security flaws. The use of Cloud Storage will be done in the next phase of the project
As per business aspect the mobile advertising and Website-advertising is used to earn revenues. For better revenue Web-mining and Data-mining of the account information helps us to provide advertising of client’s interest to earn Good revenues.
Getting Started Developing with Platform as a ServiceCloudBees
The document provides an overview of getting started with platform as a service (PaaS). It begins with the speaker's background and then discusses how cloud computing represents an inevitable shift similar to the transition to electricity. The rest of the document focuses on explaining key concepts regarding PaaS, including differences between infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It also provides recommendations for getting started with PaaS.
Similar to 2011 updated titles [ skiveprojects ] (20)
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Driving Business Innovation: Latest Generative AI Advancements & Success Story
2011 updated titles [ skiveprojects ]
1. Skiveprojects
TABLE OF CONTENTS
S. No PROJECT TITLES PAGE.NO
1 DOT NET IEEE TITLES 3
1.1 Cloud Computing 3
1.2 Mobile Computing 4
1.3 Network Security 5
1.4 Data Mining 8
1.5 Image Processing 11
1.6 Distributed Networking 12
1.7 Parallel & Distributed Computing 15
17
2 JAVA IEEE TITLES
2.1 Data Mining 17
2.2 Network Security 19
2.3 Parallel and Distributed Computing 20
2.4 Distributed Networking 21
2.5 Image Processing 23
3 NETWORK SIMULATOR(NS2) TITLES 25
4 APPLICATION PROJECT TITLES 26
4.1 DOT NET APPLICATION TITLES 26
4.2 JAVA APPLICATION TITLES 28
5 FLASH AND ANIMATION TITLES 29
6 EMBEDDED SYSTEM IEEE TITLES 30
7 EMBEDDED SYSTEM NON IEEE TITLES 33
8 MATLAB IEEE TITLES 35
8.1 Communication 35
8.2 Image Processing 36
9 VLSI IEEE TITLES 36
Fabsys Technologies Pvt.Ltd | 1
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
2. Skiveprojects
About Skiveprojects
Skiveprojects.com is a division of Fabsys Technologies (P) Ltd. It is specially organized for students’
guidance in their project work as well as in career development. As a team, we provide technical
assistance in various technologies and domains. By efficient training methodologies, we train students in
their desired field. We focus on needs of the students. To make students career brighter in desired field,
we are functioning as a bridge for students.
We provide
Project Guidance for all departments(UG & PG)
In plant training for IT, CSE, ECE departments respectively
Career Development programs
Seminars in various Domain & Technology every day!!
Internship Training & Certification
What is the real use of doing IEEE Project in final year?
Well, it is simple. Doing Project in final year will help you
To make an entry in Real time working environment
In most of the technical interview, Companies will ask questions around your final year projects
Exposure in latest technology in the field
Backbone for placement
Real time Training in an organization
Bring Own Concepts!!
You can bring your own concepts to us. We will develop projects according your requirement.
Project Guidance with Short Term Course.
Online Training for out-station students
Fabsys Technologies Pvt.Ltd | 2
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
3. Skiveprojects
DOT NET IEEE TITLES
IEEE TRANSACTION ON: CLOUD COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLE & DESCRIPTION Published
Year
1. SDCC01 EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced 2011
Computer Science Course.
Description: Platform clouds are valued by both students and professors to achieve the
course objectives and that clouds offer a significant improvement over the previous
situation in labs.
Technology: Paas Cloud Usage : Cloud In Education
2. SDCC02 CloudTPS: Scalable Transactions for Web Applications in the Cloud. 2011
Description: CloudTPS (scalable transaction manager) guarantees full ACID properties
for multi-item transactions issued by Web applications, even in the presence of server
failures and network partitions.
Technology: Local Transaction Manager Usage: Acid Properties To Nosql
3. SDCC03 A Privacy-Preserving Remote Data Integrity Checking Protocol with 2011
Data Dynamics and Public Verifiability.
Description: Proposed protocol supports public verifiability without help of a third party
auditor. In addition, the proposed protocol does not leak any private information to third
party verifiers.
Technology: Public Verifiability Usage : Integrity In Cloud
4. SDCC04 Enabling Public Auditability and Data Dynamics for Storage Security 2011
in Cloud Computing.
Description: Identifying the difficulties & potential security problems of direct
extensions with fully dynamic data updates from prior works and then construct an
elegant verification scheme for the seamless integration.
Technology: Third Party auditor Usage : Data Security in Cloud
5. SDCC05 Optimal Service Pricing for a Cloud Cache. 2011
Description: A novel SOA-aware approach with a special focus on the data flow. The
tight interaction of new cloud technologies with SOA technologies enables us to
optimize the execution of data-intensive service.
Technology: Framework For Dynamic Pricing Usage : Cloud Profit
Fabsys Technologies Pvt.Ltd | 3
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4. Skiveprojects
6. SDCC06 Failure Avoidance through Fault Prediction Based on Synthetic 2011
Transactions.
Description: Enhancing an online service’s reliability, availability and performance.
Synthetic transactions in pre-production environments, and combined with data-mining
on compact, specialized logs.
Technology: Synthetic Transactions Usage : Eliminate Failure
7. SDCC07 Multi-level Intrusion Detection system and Log Management in 2011
Cloud Computing.
Description: A method that enables cloud computing systems both effectiveness of
using system resource and system strength of security.
Technology: Levels of IDS Usage: Security with high Accessibility
8. SDCC08 Using Cloud Technologies to Optimize Data-Intensive Service 2010
Applications
Description: The tight interaction of new cloud technologies with SOA technologies
enables us to optimize the execution of data-intensive service applications by reducing
the data exchange tasks to a minimum.
Technology: Cloud SOA Usage : Eliminate Unwanted Data
IEEE TRANSACTION ON: MOBILE COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDMC01 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011
Networks.
Description: Efficient Geographic Multicast Protocol -uses a virtual-zone-based
structure to implement scalable and efficient group membership management.
Technology: Virtual Zone Usage: Reliable Packet Transmissions
2. SDMC02 Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh 2010
Networks.
Description: A specialization that accounts for peculiar features of wireless mesh
networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast
nature of wireless communication.
Technology: 1-Hop Broadcast Usage :Information retrieval efficiency
3. SDMC03 A Distributed and Scalable Time Slot Allocation Protocol for Wireless 2011
Sensor Networks.
Description: A distributed and scalable scheduling access scheme that mitigates high
data loss in data-intensive sensor networks and can also handle some mobility.
Technology: Latin Squares Usage: Eliminate Collision
Fabsys Technologies Pvt.Ltd | 4
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
5. Skiveprojects
4. SDMC04 Secure High-Throughput Multicast Routing in Wireless Mesh 2011
Networks.
Description: Identifying novel attacks against high throughput multicast protocols in
wireless mesh networks.
Technology: Defense Mechanisms Usage: Prevent from identified attacks
5. SDMC05 Message Authentication in Computationally Constrained 2010
Environments.
Description: An approach to implement a compact HMAC by the use of stream
ciphering is presented in this paper.
Technology: Stream Cipher Usage: Authentication, Integrity
6. SDMC06 Efficient Broadcasting in Mobile AD-Hoc Network. 2010
Description: New broadcasting algorithm that constructs a CDS "on the fly" and can
guarantee both full delivery and a constant approximation ratio to the optimal solution.
Technology: Broadcasting Algorithms Usage: Reliable Transmission
7. SDMC07 Multicasting with Localized Control in Wireless AD-Hoc Network 2010
Description: The proposed scheme combines the layered multicast concept with the
routing-based congestion avoidance idea to reduce the aggregated rate of multicast flows.
Technology: cross-layer approach Usage: Congestion Avoidance
IEEE TRANSACTION ON : NETWORK SECURITY
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDNS01 SAT: A Security Architecture Achieving Anonymity and 2011
Traceability in Wireless.
Description: Ensure unconditional anonymity for honest users and traceability of
misbehaving users for network authorities in WMNs.
Technology: Anonymity And Traceability Usage : Identify Users
2. SDNS02 Replica Placement for Route Diversity in Tree-based Routing 2011
Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
diversity for these DHTs.
Technology: Route Diversity Usage : Response Time Reduced
3. SDNS03 Privacy-Preserving Updates to Anonymous and Confidential 2011
Databases
Description: Protocols solving suppression-based and generalization-based k-
anonymous and confidential databases. And it will rely on well-known cryptographic
assumptions.
Technology: Secure Computation Usage : Privacy-Preserving
Fabsys Technologies Pvt.Ltd | 5
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
6. Skiveprojects
4. SDNS04 Revisiting Defenses Against Large-Scale Online Password Guessing 2011
Attacks
Description: A new Password Guessing Resistant Protocol (PGRP), derived upon
revisiting prior proposals designed to restrict such attacks.
Technology: Automated Turing Tests Usage : Identify Malicious Login
5. SDNS05 Balancing Revocation and Storage Trade-Offs in Secure Group 2011
Communication
Description: Hybrid key management algorithm. Trade-offs between storage cost and
rekeying cost for secure multicast.
Technology: A Family Of Algorithms Usage : Reduce Cost Of Rekeying
6. SDNS06 Nymble: Blocking Misbehaving Users in Anonymizing Networks 2011
Description: Servers can “blacklist” misbehaving users, thereby blocking users
without compromising their anonymity. Nymble Tickets and Credentials, Blacklist.
Technology: A Secure System Usage : Block Misbehaving Users
7. SDNS07 Blind Authentication: A Secure Crypto-Biometric Verification 2010
Protocol
Description: A Provably secure and blind biometric authentication protocol, which
addresses the concerns of user’s privacy, template protection, and trust issues.
Technology: Biometric Authentication Usage : Nonrepudiable identity
8. SDNS08 An Architectural Approach to Preventing Code Injection Attacks 2010
Description: The memory architecture of modern processors that addresses the code
injection problem at its very root by virtually splitting memory into code memory and
data memory.
Technology: Memory Architecture Usage : Improved Protection
9. SDNS09 Authenticated Group Key Transfer Protocol Based on Secret 2010
Sharing
Description: An authenticated key transfer protocol based on secret sharing scheme
that KGC can broadcast group key information to all group members at once.
Technology: Trusted Key Generation Center Usage : Secret Sharing
10. SDNS10 Beyond Output Voting: Detecting Compromised Replicas Using 2009
HMM-Based Behavioral Distance
Description: A novel approach to behavioral distance measurement using a new type
of Hidden Markov Model, and present an architecture realizing this new approach.
Technology: Hidden Markov Model Usage : Detect Mimicry Attacks
11. SDNS11 Flexible and Rollback recovery for grid environment 2009
Description: Two fault-tolerance mechanisms called Theft-Induced Check pointing
and Systematic Event Logging.
Technology: Theft-Induced Check Usage : Controlling The Overhead
12. SDNS12 Accurately Measuring Denial of Service in Simulation and Testbed 2009
Experiments
Description: Several DoS impact metrics that measure the quality of service
experienced by users during an attack. Our metrics are quantitative
Technology: Denial of Service Metrics Usage :Measure service quality
Fabsys Technologies Pvt.Ltd | 6
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
7. Skiveprojects
13. SDNS13 Credit card fraud detection using hidden Markov model 2009
Description: An HMM is initially trained with the normal behavior of a cardholder. If
an incoming credit card transaction is not accepted by the trained HMM with
sufficiently high probability.
Technology: Hidden Markov Model Usage :Most accurate detection
14. SDNS14 In-depth packet inspection using a hierarchical pattern matching 2010
algorithm.
Description: EHMA is a two-tier and cluster-wise matching algorithm, which
significantly reduces the amount of external memory accesses and the capacity of
memory.
Technology: Cluster-Wise Matching Usage : Fast scanning process
15. SDNS15 Practical Management And Standard Administrative System 2010
Description: To reduce the manual workload of the administrative activities,
organizations began to electronically automate many of these processes.
Technology: Electronic Automation Usage : increasing scalability
16. SDNS16 Predictive Network Anomaly Detection And Visualization 2010
Description: An approach that uses short-term observations of network features and
their respective time averaged entropies. Acute changes are localized in network
feature space using adaptive Wiener filtering.
Technology: Fisher linear discriminant Usage : Identifying Anomalies
17. Network Traffic Monitor 2010
SDNS17
Description: UniMon (Universal Network Traffic Monitor) is an external and
passive network traffic monitor designed to adapt any type of network and protocols.
Technology: Entropy of Network Traffic Usage: Monitor User Activity
18. Steward : Scaling Byzantine Fault-Tolerant Replication To Wide 2010
SDNS18
Area Networks
Description: The architecture confines the effects of any malicious replica to its local
site, reduces message complexity of wide-area communication.
Technology: Fault-Tolerant Replication Usage :Secure Transmission
Do you need more Explanation for any Project? Contact Skiveprojects @ 9176990090
Fabsys Technologies Pvt.Ltd | 7
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
8. Skiveprojects
IEEE TRANSACTION ON : DATAMINING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDDM01 Mining Group Movement Patterns For Tracking Moving Objects
Efficiently.
Description: A local mining phase & cluster ensembling phase to find movement 2011
patterns based on local trajectories and computing the similarity of moving objects &
identify the local group relationships.
Technology: Distributed clustering Usage : Track Moving Objects
2. SDDM02 Efficient Periodicity Mining In Time Series Databases Using Suffix
Trees.
Description: The algorithm uses suffix tree as the underlying data structure. Detect 2011
symbol, sequence (partial), and segment (full cycle) periodicity in time series.
Technology: Suffix Tree Usage : Time Efficient
3. SDDM03 Automatic Discovery of Personal Name Aliases From the Web
Description: Automatically extracted lexical pattern-based approach to efficiently
extract a large set of candidate aliases from snippets retrieved from a web search engine. 2011
Technology: Lexical Pattern Approach Usage : Information Retrieval
4. SDDM04 Experience Transfer for the Configuration Tuning in Large-Scale 2011
Computing Systems
Description: The utilization of management experiences in one system to benefit the
same management task in other systems (or current systems). Bayesian network to
model configuration dependencies.
Technology: Configuration Tuning Usage : Configuration Tuning
5. SDDM05 A Web Search Engine-Based Approach to Measure Semantic 2011
Similarity between Words.
Description: An empirical method to estimate semantic similarity using page counts
and text snippets retrieved from a web search engine for two words.
Technology: Empirical Method Usage : Improves The Accuracy
6. SDDM06 Data Leakage Detection. 2011
Description: Data allocation strategies that improve the probability of identifying
leakages and develop a model for assessing the “guilt” of agents. That improves chances
of identifying the guilty agents.
Technology: Data Allocation Strategies Usage : Identifying Guilty Party
7. SDDM07 A Machine Learning Approach for Identifying Disease-Treatment 2011
Relations in Short Texts.
Description: A ML-based methodology for building an application that is capable of
identifying and disseminating healthcare information Identifies semantic relations that
exist between diseases and treatments.
Technology: ML-based methodology Usage : Integrated Application
Fabsys Technologies Pvt.Ltd | 8
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
9. Skiveprojects
8. SDDM08 Authenticated Multistep Nearest Neighbor Search 2011
Description: The multistep NN algorithm incurs prohibitive network overhead due to
the transmission of false hits, but are nevertheless necessary for its verification.
Technology: Query Authentication Usage : Reduces Size Of False Hit
9. SDDM09 Optimizing Resource Conflicts in Workflow Management Systems 2011
Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource
conflicts subject to temporal constraints and simultaneously optimizes throughput.
Technology: Eigen-value Analysis Usage :Minimize Resource Conflicts
10. SDDM10 Closeness: A New Privacy Measure for Data Publishing 2010
Description: A new notion of privacy called "closeness." It present the base model -
closeness, which requires that the distribution of a sensitive attribute
Technology: Closeness Usage : Offers Higher Utility
11. SDDM11 Record Matching over Query Results from Multiple Web Databases. 2010
Description: An unsupervised, online record matching method, UDD, where a given
query, can effectively identify duplicates from the query result records of multiple Web
databases.
Technology: Data Deduplication Usage : Get accurate results
12. SDDM12 Towards an Effective XML Keyword Search. 2010
Description: A novel formulae to identify the search for nodes and search via nodes of
a query, and present a novel XML TF*IDF ranking strategy to rank the individual
matches of all possible search intentions.
Technology: Relevance Ranking Usage : Rank the individual matches
13. SDDM13 Bridging Domains Using World Wide Knowledge for Transfer 2010
Learning
Description: A novel transfer learning approach, called BIG to effectively extract
useful knowledge in a worldwide knowledge base, which is then used to link the source
and target domains.
Technology: Cross-Domain Usage: Cross-domain text classification
14. SDDM14 Personalizing web directories with the aid of web usage data 2010
Description: A novel methodology that combines the users' browsing behavior with
thematic information from the Web directories.
Technology: Personalization Methodology Usage : Web Directories
15. SDDM15 Filter-Based Data Partitioning for Training Multiple Classifier 2010
Systems
Description: To assess the effectiveness of different types of training partitions, It
generated a large number of disjoint training partitions with distinctive distributions.
Technology: Clustering and Selection Usage : Classifier Systems
Fabsys Technologies Pvt.Ltd | 9
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
10. Skiveprojects
16. SDDM16 FiVaTech: Page-Level Web Data Extraction from Template Pages 2010
Description: An unsupervised, page-level data extraction approach to deduce the
schema and templates for each individual Deep Website, which contains either singleton
or multiple data records in one Webpage.
Technology: Multiple Trees Merging Usage : Web Data Extraction
17. SDDM17 Histogram-Based Global Load Balancing in Structured Peer-to-Peer 2009
Systems
Description: A general framework, HiGLOB, for global load balancing in structured
P2P systems. Each node with 1) a histogram manager, and 2) a load-balancing manager.
Technology: Histogram Buckets Usage : Load-Balancing
18. SDDM18 Interactive Correction and Recommendation for Computer 2009
Language Learning and Training
Description: An automated learning and skills training system for a database
programming environment that promotes procedural knowledge acquisition and skills
training.
Technology: Error Classification Usage : Personalized Guidance
19. SDDM19 Optimal Lot Sizing Policies for Sequential Online Auctions 2009
Description: A goal programming approach for estimating the bid distribution for the
bidder population from the observed bids, readily available in these auctions.
Technology: Closed-Form Solution Usage : Increases users holding costs
20. SDDM20 Intrusion Detection System based on Data Mining 2009
Description: The system that performs anomaly detection can detect intrusions known
and unknown, reduce omissions and misstatements, improve accuracy and speed of
intrusion detection.
Technology: Hidden Honey pot Usage : Solicit possible attacks
21. SDDM21 Fast Query Point Movement Techniques for Large CBIR Systems 2009
Description: A new index structure and query processing technique to improve retrieval
effectiveness and efficiency.
Technology: Relevance Feedback Usage : Retrieval Performance
22. SDDM22 Exact Knowledge Hiding Through Database Extension 2009
Description: A novel, exact border-based approach that provides an optimal solution
for the hiding of sensitive frequent item.
Technology: Exact Border Approach Usage : Hiding The Sensitive Item
23. SDDM23 Hierarchical distribute p2p document clustering and clustering 2009
summarization
Description: A Hierarchically distributed Peer-to-Peer (HP2PC) architecture and
clustering algorithm. The architecture is based on a multilayer overlay network of peer
neighborhoods.
Technology: distributed key phrase extraction Usage : Global Clustering
Fabsys Technologies Pvt.Ltd | 10
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
11. Skiveprojects
24. SDDM24 Vide: A Vision-Based Approach For Deep Web Data Extraction 2010
Description: A novel technique is proposed for data extraction from deep Web pages
using primarily visual features. A new performance measure, revision, is proposed to
evaluate Web data extraction tools.
Technology: Visual Features Of Web Pages Usage : Web data extraction
25. Multidimensional Suppressions For K-Anonymity 2010
SDDM25
Description: A new method for achieving k-anonymity named K-anonymity of
Classification Trees Using Suppression (kACTUS).
Technology: De-Indentified Data Usage : Multidimensional Suppression
26. Voting Systems With Trust Mechanisms In Cyberspace: 2010
SDDM26
Vulnerabilities And Defenses
Description: Proposing two defense schemes 1. Hide correlation knowledge from
attackers 2. Introduce robustness-of-evidence, a new metric, in trust calculation
Technology: RepTrap Usage : Reduce rate of attacks
IEEE TRANSACTION ON: IMAGE PROCESSING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1. SDIP01 1-D Transforms for the Motion Compensation Residual 2011
Description: An adaptive auto-covariance characterization for the MC-residual that
shows some statistical differences between the MC-residual and the image.
Technology:1D directional transform Usage: Conventional Transforms
2. SDIP02 A Stochastic Approach to Image Retrieval Using Relevance 2011
Feedback and Particle Swarm Optimization
Description: An innovative approach is proposed with combination of relevance
feedback (RF) approach & evolutionary stochastic algorithm, called particle swarm
optimizer (PSO).
Technology: Particle Swarm Optimizer Usage : Visual Query
3. SDIP03 Contourlet-Based Image Watermarking Using Optimum Detector in 2010
a Noisy Environment
Description: A new Watermarking technique for eliminating the noises in the
environment by using the optimum detector.
Technology: General Gaussian Distribution Usage : Watermarking
Fabsys Technologies Pvt.Ltd | 11
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
12. Skiveprojects
4. SDIP04 Latent Finger print matching 2010
Description: A system for matching latent fingerprints found at crime scenes to rolled
fingerprints enrolled in law enforcement databases with extended features.
Technology: Matching Fingerprints Usage : fingerprint quality measure
5. SDIP05 Reversible Image Watermarking Using Interpolation Technique 2010
Description: A novel reversible watermarking scheme using an interpolation technique,
which can embed a large amount of covert data into images with imperceptible
modification.
Technology: Interpolation Technique Usage :Higher Image Fidelity
6. SDIP06 Generic Lossless visible Watermarking 2010
Description: The new watermarking methosd is based on the use of deterministic one-
to-one compound mappings of image pixel values.
Technology:1-To-1 Compound Mappings Usage : Recover Image
7. SDIP07 Bridging The Semantic Gap Between Image Contents And Tags 2010
Description: A unified framework which stems from a two-level data fusions between
the image contents and tags: 1) A unified graph is built and; 2) A novel random walk
model is then proposed.
Technology: Random Walk Model Usage : Image Annotation
IEEE TRANSACTION ON: DISTRIBUTED NETWORKING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1. SDNW01 An Authentication Code Against Pollution Attacks in Network 2011
Coding
Description: Unconditionally secure authentication code for multicast network coding,
where the trusted authority gives the key rights to the destinations and intermediate
nodes.
Technology: Secure Authentication Code Usage :Pollution Is Canceled
2. SDNW02 Network-Coding Multicast Networks With QoS Guarantees 2011
Description: Proposing a System where Each edge node admits not more than a
specified amount of traffic; the network will never experience link congestion.
Technology: Network Coding Usage : Multicast Network
Fabsys Technologies Pvt.Ltd | 12
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
13. Skiveprojects
3. SDNW03 A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless 2011
Networks
Description: TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling
of transmissions within the TCP Congestion window.
Technology: Rate-Based Scheduling Usage :Overcome deficiencies
4. SDNW04 On the Fair Coexistence of Loss-and Delay-Based TCP 2011
Description: A novel delay-based additive increase, multiplicative decrease (AIMD)
congestion control algorithm which depends on a nonzero average queuing delay.
Technology: Congestion Control Usage : Fair Coexistence Possible
5. SDNW05 Energy-Efficient Protocol for Cooperative Networks 2011
Description: Derive the upper bound of the capacity of the protocol, and it analyze the
end-to-end robustness of the protocol to data-packet loss, along with the tradeoff
between energy consumption and error rate.
Technology: Cooperative Communication Usage : Congestion Control
6. SDNW06 DTRAB: Combating Against Attacks on Encrypted Protocols 2010
Through Traffic-Feature Analysis
Description: An anomaly-based detection system by using strategically distributed
monitoring stubs (MSs). The MSs, by sniffing the encrypted traffic, extract features for
detecting these attacks.
Technology: Anomaly-Based Detection Usage : Avoid False Alarms
7. SDNW07 Efficient and Dynamic Routing Topology Inference From End-to- 2010
End Measurements
Description: A framework for designing topology inference algorithms based on
additive metrics. The framework can flexibly fuse information from multiple
measurements to achieve better estimation accuracy.
Technology: Topology Inference Usage : Faster Convergence Rate
8. SDNW08 A Queuing Model for Evaluating the Transfer Latency of Peer-to- 2010
Peer Systems
Description: A new Modeling Framework for the peers that accounts for the file size
distribution, the search time, load distribution at peers, and number of concurrent
downloads allowed by a peer.
Technology: Framework For Peers Usage : Reduces Probing Overhead
Fabsys Technologies Pvt.Ltd | 13
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
14. Skiveprojects
9. SDNW09 An Efficient and Adaptive Decentralized File Replication Algorithm 2010
in P2P File Sharing Systems
Description: This paper presents an Efficient and adaptive decentralized file replication
algorithm (EAD) that achieves high query efficiency and high replica utilization at a
significantly low cost.
Technology: EAD file replication Usage : Overloaded node reduction
10. SDNW10 Traceback of DDoS Attacks Using Entropy Variations 2010
Description: A novel trace back method for DDoS attacks during the process. The
proposed strategy is memory non-intensive, efficiently scalable, robust against packet
pollution.
Technology: Entropy Variations Usage : Memory Non-Intensive
11. SDNW11 POPI: A User-Level Tool for Inferring Router Packet Forwarding 2010
Priority
Description: An end-to-end approach for PFP inference and its associated tool, POPI. It
enables users to discover such network policies through measurements of packet losses
of different packet types.
Technology: End-To-End Approach Usage : Packet forwarding priority
12. SDNW12 A Directory Service for Perspective Access Networks 2010
Description: A perspective access network (PAN) is a peer-to-peer overlay network
that incorporates routing and directory services that allow network perspective-sharing
and nonhierarchical organization.
Technology: Directory Service For Networks Usage : Network Sharing
13. SDNW13 Web User-Session Inference by Means of Clustering Techniques 2010
Description: A novel methodology with clustering techniques to identify Web user-
sessions without requiring an a priori definition of threshold values.
Technology: Web Usage Mining Techniques Usage : User-Sessions
14. SDNW14 Mitigating Attacks on Open Functionality in SMS-Capable Cellular 2010
Networks
Description: A combination of modeling and simulation to demonstrate the feasibility
of targeted text messaging attacks.
Technology: Queue Management Usage: Mitigating messaging attacks.
15. SDNW15 Plexus-A scalable p2p Protocol enabling efficient subset search 2009
Description: Plexus, a peer-to-peer search protocol that provides an efficient
mechanism for advertising a bit-sequence (pattern) & discovering it using any subset of
its 1-bits.
Technology: Peer-To-Peer Search Usage : Discovery Of Information
Fabsys Technologies Pvt.Ltd | 14
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
15. Skiveprojects
16. SDNW16 Incentive-Based Scheduling for Market-Like Computational Grids 2009
Description: An incentive-based scheduling scheme, which utilizes a peer-to-peer
decentralized scheduling framework, a set of local heuristic algorithms, and three
market instruments of job announcement, price, and competition degree.
Technology: Heuristic Algorithms Usage : Fair Profit Allocation
17. SDNW17 Multiple Routing Configurations for Fast IP Network Recovery 2009
Description: MRC is strictly connectionless, and assumes only destination based hop-
by-hop forwarding, keeps additional routing information in the routers, and allows
packet forwarding to continue.
Technology: Hop-By-Hop Forwarding Usage : Load Distribution
18. SDNW18 Distributed Computing For E-Learning 2010
Description: Applying Distributed Computing strategy in E-Learning Environment to
make the learning process more interactive.
Technology: Semantic Applications Usage: Centralized E-Learning
IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SDP01 A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad 2011
hoc Networks
Description: Cooperative Diversity MAC, which exploits the cooperative communication
capability of the physical layer to improve robustness in wireless ad hoc networks.
Technology: Partner Selection Usage : Mitigates Interference
2 SDP02 Collective Receiver-Initiated Multicast for Grid Applications 2011
Description: Present Robber, a collective, receiver-initiated, high-throughput multicast
approach inspired by the Bit Torrent protocol to maximize the throughput between multiple
cluster computers.
Technology: High-Throughput Multicast Usage: Static Load Balancing
3 SDP03 Compressing Network Access Control Lists 2011
Description: ACL Compressor, a framework that can significantly reduce the number of
rules in an access control list while maintaining the same semantics.
Technology: Dynamic Programming Usage : Access Control Lists
Fabsys Technologies Pvt.Ltd | 15
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
16. Skiveprojects
4 SDP04 A Distributed Algorithm for the Replica Placement Problem 2011
Description: A new Distributed Algorithm to Improve the efficiency of object replication
within a given distributed replication group.
Technology: Distributed Approximation Usage : Object Replication
5 SDP05 A Generic Framework for Three-Factor Authentication: Preserving 2011
Security and Privacy in Distributed Systems
Description: A systematic approach for authenticating clients by three factors, namely
password, smart card, and biometrics.
Technology: 3-Factor Authentication Usage: Identity Of Remote Client
6 SDP06 TASA: Tag-Free Activity Sensing using RFID Tag Arrays 2011
Description: TASA For location sensing and frequent route detection. TASA can locate
objects more accurately.
Technology: Frequent Route Detection Usage : Location Sensing
7 SDP07 Flexible Robust Group key Agreement 2011
Description: A new robust group key agreement protocol (GKA) allows a set of players to
establish a shared secret key, regardless of network/node failures.
Technology: Group Key Agreement Usage: logarithmic-sized message
8 SDP08 Symmetric Key Approaches to Securing BGP-A Little Bit Trust is 2011
Enough
Description: Key approach for Trade-off between efficiency and security by giving a little
dose of trust to BGP routers.
Technology: Central Key Distribution Usage : Signature Verification
DO YOU HAVE OWN CONCEPT!!! Come Let’s Discuss at Skiveprojects corporate office.
What is your department!! Now, you can Select project based on your dept at skiveprojects.com
Need BASEPAPER or ABSTRACT ? Send a mail to skiveprojects@gmail.com
Fabsys Technologies Pvt.Ltd | 16
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
17. Skiveprojects
JAVA IEEE TITLES
IEEE TRANSACTION ON : DATAMINING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
SJDM01 Authenticated Multistep Nearest Neighbor Search 2011
1.
Description: We propose a new technique multi-step NN Algorithm that reduces the size
of each false hit. Moreover, we generalize our solution for a distributed setting, where the
database is horizontally partitioned over several servers.
Technology: Query Authentication Usage : Reduces Size Of False Hit
2. SJDM02 A Machine Learning Approach for Identifying Disease-Treatment 2011
Relations in Short Texts
Description: In this we Describes a ML-based Technology for identifying and
disseminating healthcare information. It extracts sentences from published medical papers
that mention diseases and treatments in short text format.
Technology: ML-based Technology Usage : Integrated Application
3 SJDM03 Automatic Discovery of Personal Name Aliases from the Web 2011
Description: We describes the method numerous baselines and previously proposed
name alias extraction methods, achieving a statistically significant mean reciprocal rank
(MRR) of 0.67.
Technology: Mean Reciprocal Rank Usage: Information Retrieval
4 SJDM04 Design and Implementation of Enterprise Financing Decision Model 2011
Based on Data Mining
Description: In proposed system we have response policy such as Conservative,
Aggressive, and Fine grant and here we are going to implement hashed messaged
authentication (HMAC) for secure process.
Technology: Financing decision Usage: Heterogeneous data integration
Fabsys Technologies Pvt.Ltd | 17
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
18. Skiveprojects
5 SJDM05 Enhancing the k-means clustering algorithm by using a O(n 2011
logn)heuristic method for finding better initial centroids.
Description: This project proposes an improvement on the classic k-means algorithm to
produce more accurate clusters. For that we comprises of a O(n logn) heuristic method,
based on sorting and partitioning the input data, for finding the centroids .
Technology: Enhanced k-meansAlgorithm Usage : Accurate Clusters
6 SJDM06 Clustering with Multi-Viewpoint based Similarity Measure 2011
Description: Two criterion functions for document clustering are proposed based on this
new measure. We compare them with several well-known similarity and dissimilarity with
dataset from this we are Getting accurate cluster.
Technology: Text mining Usage : Informative Assessment
7 SJDM07 Publishing Search Logs – A Comparative Study of Privacy Guarantees 2011
Description: We propose a k-anonymity in search log publishing. comparable utility to
k−anonymity while at the same time it achieving much stronger privacy guarantee
Technology: Security, integrity, and protection Usage : Probabilistic Privacy
8 SJDM08 Bin Rank: Scaling Dynamic Authority-Based Search Using 2011
Materialized Sub graphs
Description: we shows Dynamic authority-based keyword search algorithms, such as
Object Rank and personalized Page Rank, link information to provide high quality, high
recall search in databases, and the Web.
Technology: Object Rank Usage: High Quality Search Results
9 SJDM09 Asking Generalized Queries to Domain Experts to Improve Learning 2011
Description: we propose a novel active learning algorithm that asks good generalized
queries. It improves the knowledge of domain experts.
Technology: Generalized query Usage: Good Generalized Queries
10 SJDM10 Constrained Skyline Query Processing against Distributed Data Sites 2011
Description: We first propose a partition algorithm that divides all data sites into
incomparable groups. We also implement multi filtering technique to improve the skyline
query processes.
Technology: Filtering Point Usage: Parallel Skyline Query Processing
11 SJDM11 Managing Multidimensional Historical Aggregate Data in 2011
Unstructured P2P Networks
Description: In this project historical multidimensional data aggregates and supported by
P2P-based framework which provides efficient and robust query evaluation.
Technology: Data compression Usage : Extraction of Aggregates
Fabsys Technologies Pvt.Ltd | 18
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
19. Skiveprojects
12 SJDM12 Knowledge-Based Interactive Post mining of Association Rules Using 2011
Ontologies
Description: This paper proposes a prune and filter discovered rules. And it describes
ontologies to improve the integration of user knowledge in the post processing.
Technology: Data exploration and discovery Usage : Prune And Filter Rule
13 SJDM13 C-Trend : Temporal Cluster Graphs for Identifying and Visualizing 2011
Description: This paper introduces Cluster-based Temporal Representation of Event
Data (C-TREND), that system implements dendogram algorithm for sorting. It takes very
less time for sorting.
Technology: Temporal Data Mining Usage : Discover Patterns
IEEE TRANSACTION ON : NETWORK SECURITY
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJNS01 Flexible Robust Group Key Agreement 2011
Description: We propose a novel 2-round group key agreement protocol .We show that
the new protocol implies a fully-robust group key agreement with logarithmic-sized
messages and expected round complexity close to 2 and finding random node faults.
Technology: fault-tolerance Usage: Logarithmic-Sized Messages
2 SJNS02 Replica Placement for Route Diversity in Tree-Based Routing 2011
Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
diversity for these DHTs. Using this We prove that this placement creates disjoint
routes and find the replication degree necessary to produce a desired number of disjoint
routes.
Technology: Route Diversity Usage: Response Time Reduced
3 SJNS03 Design and Implementation of an Intrusion Response System for 2011
Relational Databases
Description: we propose Joint Threshold Administration Model that efficiently
searches the policy database for policies that match an anomalous request. This is used
to overcoming the policy matching problem.
Technology: Threshold signatures Usage: Specify Appropriate Response
Fabsys Technologies Pvt.Ltd | 19
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
20. Skiveprojects
4 SJNS04 A Puzzle-Based Defense Strategy Against Flooding Attacks Using 2010
Game Theory
Description: It describes the game theory to propose a series of optimal puzzle-based
strategies for handling increasingly sophisticated flooding attack.
Technology: Client-Puzzle Approach Usage : Handling Distributed Attacks
5 SJNS05 Layered Approach Using Conditional Random Fields for Intrusion 2010
Detection
Description: We propose high attack detection accuracy that can be achieved by
using Conditional Random Fields and high efficiency it show that our system is
robust and is able to handle noisy data without compromising performance
Technology: Decision trees Usage: Detect Malicious Activities
6 SJNS06 An Identity-Based Security System for User Privacy in Vehicular Ad 2010
Hoc Networks
Description: We propose a privacy-preserving defense technique For network
authorities to handle misbehavior in VANET access and it challenge that privacy
provides avenue for misbehavior.
Technology: Identity-Based Cryptography Usage: Privacy And Traceability
IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJP01 Joint Optimization of Complexity and Overhead for the Routing in 2011
Hierarchical Networks
Description: We show that area-based link-vector algorithm (ALVA) which is used to
analyze the routing complexity and the routing table size in the hierarchical network.
Technology: Area-Based Link-Vector Usage: Find Best Routing Policy
2 SJP02 Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems(S) 2011
Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
sequential probability ratio test in Unstructured Peer-to-Peer Systems for finding
anomaly intruder.
Technology: Mutual Anonymity Usage: Achieving Anonymity
Fabsys Technologies Pvt.Ltd | 20
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
21. Skiveprojects
3 SJP03 Cooperative Channelization in Wireless Networks with Network 2011
Coding
Description: We propose cooperative channelization technique, this is used to find
which portions of the transmission media are allocated to links which are congested at
the point and where network coding cannot efficiently repair loss.
Technology: Resource Reservation Usage: Reduce No of Transmissions
4 SJP04 Load Balance with Imperfect Information in Structured Peer-to- 2011
Peer Systems
Description: We propose a novel load balancing algorithm it is used to estimate
the probability distributions of the capacities of peers and the loads of virtual servers.
Technology: Virtual Server Usage : Probability Distributions
IEEE TRANSACTION ON: DISTRIBUTED NETWORKING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJNW01 Energy-Efficient Protocol for Cooperative Networks 2011
Description: We propose a cooperative communication protocol, which is used to
controlling traffic, and delay process. And we analyzed the robustness of the protocol
to data packet loss.
Technology: cooperative communication protocol Usage : Congestion Control
2 SJNW02 Parametric Methods for Anomaly Detection in Aggregate Traffic 2011
Description: We introduce the bi-variate Parametric Detection Mechanism (bPDM),
which can detect anomalies and low-rate attacks in a few seconds.
Technology: Bi-variate Parametric Detection Usage: Detect Network Anomalies
3 SJNW03 Self-Reconfigurable Wireless Mesh Networks 2011
Description: This paper presented an autonomous network reconfiguration system
(ARS) that enables a multi-radio WMN to autonomously recover from wireless link
failures.
Technology: Cooperatively reconfiguration Usage: Preserve Network Performance
Fabsys Technologies Pvt.Ltd | 21
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
22. Skiveprojects
4 SJNW04 Rumor Riding: Anonymzing Unstructured Peer-to-Peer Systems 2011
Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
sequential probability ratio test for finding anomaly intruder.
Technology: Mutual Anonymity Usage : To Achieve Anonymity
5 SJNW05 Joint Optimization of Complexity and Overhead for the Routing in 2011
Hierarchical Networks
Description: We show that area-based link-vector algorithm (ALVA) which is used is
to analyze the routing complexity and the routing table size in the hierarchical
network.
Technology: Area-based link-vector Usage: Find Best Routing Policy
6 SJNW06 Cooperative Channelization in Wireless Networks with Network 2011
Coding
Description: We propose cooperative channelization, this is used to find which
portions of the transmission media are allocated to links and which are congested at the
point and where network coding cannot efficiently repair loss.
Technology: Resource Reservation Usage : Reduce No of Transmissions
7 SJNW07 Load Balance with Imperfect Information in Structured Peer-to- 2011
Peer Systems
Description: We propose a novel load balancing algorithm it is used to estimate the
probability distributions of the capacities of peers and the loads of virtual servers
Technology: Virtual Server Usage : Load-Balancing
8 SJNW08 Path Diversity Over Packet Switched Networks: Performance 2010
Analysis and Rate Allocation
Description: In this paper, Forward Error Correction (FEC) is applied across multiple
independent paths to enhance the end-to-end reliability. We prove that the probability of
irrecoverable loss (PE) decays exponentially with the number of paths.
Technology: Gilbert-Elliot channels Usage : End-To-End Reliability
9 SJNW09 Normalized queuing delay: congestion control jointly utilizing delay 2010
and marking
Description: In this paper, we consider the design of a congestion control scheme and
the concept of normalized queuing delay. Which is used to reduces the bottleneck
problem. And controlling traffic congestion
Technology: Network Calculus Usage : Congestion Measure
Fabsys Technologies Pvt.Ltd | 22
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
23. Skiveprojects
10 SJNW10 Multiple Routing Configurations For Fast IP Network Recovery 2009
Description: we present a new recovery scheme called MRC is based on keeping
additional routing information in the routers, and allows packet forwarding to continue
on an alter native output link immediately after the detection of a failure.
Technology: Hop-by-Hop Forwarding Usage: Handle Link And Node Failures
11 SJNW11 Differentiated bandwidth allocation with TCP protection in core 2009
routers
Description: We present an Active Queue Management (AQM) scheme. which draws
a packet at random from the buffer, compares it with the arriving packet, and drops both
if they are from the same flow.
Technology: Active Queue Management (AQM) Usage : Flows In Same Priority
12 SJNW12 Node Isolation Model And Age-Based Neighbor Selection In 2009
Unstructured P2p Networks
Description: we show that two age-biased neighbor-selection strategies, which
dramatically reduces the probability of user isolation and graph partitioning compared
with uniform selection of neighbors.
Technology: Node isolation model Usage: Reduce Probability Of User Isolation
13 SJNW13 A Traffic Engineering Approach For Placement And Selection Of 2009
Network Services
Description: We propose service placement problem which is used finding the best
location for each service gateway, and selecting the best service gateway for each flow.
Technology: Service gateway placement Usage : Minimize Traffic Flow
14 SJNW14 Dynamic Routing With Security Consideration 2009
Description: We proposing a dynamic routing algorithm such as the Routing
Information Protocol in wired networks and Destination-Sequenced Distance Vector
protocol in wireless networks that could randomize delivery paths for data transmission.
Technology: Security-enhanced data transmission Usage: Defeat Various Threats
15 SJNW15 Colored Tree 2009
Description: We show through extensive simulations that the average length of the
disjoint paths obtained using the SimCT algorithm is lesser compared to the previously
known techniques.
Technology: SimCT algorithm Usage: Minimize Cost Of Routing
You Can Register project free at skiveprojects.com Technical Assistance any time @ 9176990090
Fabsys Technologies Pvt.Ltd | 23
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
24. Skiveprojects
IEEE TRANSACTION ON: IMAGE PROCESSING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1 SJIP01 Graph Cuts for Curvature Based Image Denoising
Description: we will present an efficient minimization algorithm based on graph cuts
2011
for minimizing the energy in the Euler’s elastic model which is used to minimizing the
staircase effects.
Technology: Binary MRF models Usage :Image Denoising
2. SJIP02 Image Denoising in Mixed Poisson–Gaussian Noise
Description: We propose a general Technology (PURE-LET) to design and optimize a
2011
wide class of transform domain thresholding algorithms for denoising images corrupted
by mixed Poisson-Gaussian noise.
Technology: Linear expansion of thresholds Usage : Image Denoising
3 SJIP03 Practical Bounds on Image Denoising: From Estimation to
Information
Description: We show that the, cluster co variances and level of redundancy for 2011
patches in the image, can be estimated directly from the noise corrupted image.
Technology: Shannon entropy Usage : Noise-Free Image
4 SJIP04 From Tiger to Panda: Animal Head Detection 2011
Description: we proposed two detection algorithms, namely Brute force detection and
Deformable detection for capture the shape and texture features on animal head.
Technology: Fusion Usage: Animal Head Detection
5 SJIP05 On High-Order Denoising Models and Fast Algorithms for Vector-
Valued Images
Description: we introduce three high-order and curvature-based model and a fast multi
2010
grid algorithm which proves image denosing calculation. And removes staircase effects.
Technology: partial differential equations(PDEs) Usage :Vector Denoising
6 SJIP06 A Perceptually Relevant Approach to Ringing Region Detection
Description: The proposed ringing regions detection method which is used to show
2010
the ringing regions resulting images in psycho visual experiment
Technology: Luminance masking Usage : Automatic Detection
Fabsys Technologies Pvt.Ltd | 24
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
25. Skiveprojects
NETWORK SIMULATOR (NS2) TITLES
IEEE TRANSACTION ON: NS2 - NETWORK SIMULATOR
Domain: NS2
S.NO CODE PROJECT TITLES Published
year
1. S11NS01 Secure Trust Management Model for Peer-to-Peer File Sharing System 2011
2. S11NS02 Channel-Aware Routing in MANETs With Route Handoff 2011
3. S11NS03 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2011
4. S11NS04 ConverSS: A Hybrid MAC/Routing Solution for Small-Scale, 2011
Convergecast Wireless Networks
5. S11NS05 Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks 2011
Using SVM and FDA
6. S11NS06 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011
Networks
7. S11NS07 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2010
Networks
8. S11NS08 Trust Management in Mobile Ad Hoc Networks Using a Scalable 2010
Maturity-Based Model
9. S11NS09 Channel Assignment for Multihop Cellular Networks: Minimum Delay 2010
Training provided by experienced IT Professionals.
Own Concepts can be developed in NS2
Fabsys Technologies Pvt.Ltd | 25
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
26. Skiveprojects
APPLICATION PROJECT TITLES
Web and Windows Application: DOT NET
REALTIME APPLICATION PROJECT TITLES
S.No CODE PROJECT TITLES LANGUAGE
1 SDAP01 An Intelligent tutoring system with web enhanced training Dotnet
assessments
2 SDAP02 Role Engineering via role based access control Dotnet
3 SDAP03 A Relation-Based Page Ranking in Web Search Engines Dotnet
4 SDAP04 Database Enterprise Manager Dotnet
5 SDAP05 Online Bug tracking System Dotnet
6 SDAP06 Trace back of DoS Attacks using Entropy Variations Dotnet
7 SDAP07 A new steganographic method based on information sharing via Dotnet
PNG images
8 SDAP08 Step Construction of Visual Cryptography Schemes (VCS) Dotnet
9 SDAP09 Efficient Compression of Encrypted Grayscale Images Dotnet
10 SDAP10 Latent Fingerprint Matching Dotnet
11 SDAP11 Online Data leakage detection Dotnet
12 SDAP12 Online Buying and Selling System. Dotnet
13 SDAP13 Secure Mobile health care for rural with electronic alerts Dotnet
14 SDAP14 Southern Railway Recruitment Portal Dotnet
15 SDAP15 Web-based Recruitment Process System for the HR group for a Dotnet
company
16 SDAP16 Fast firewall implementations for software and hardware-based Dotnet
routers
Fabsys Technologies Pvt.Ltd | 26
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
27. Skiveprojects
17 SDAP17 File Replication Detection Algorithm in P2P File Sharing Systems Dotnet
18 SDAP18 Dynamic Routing Topology with Security Consideration Dotnet/Java
19 SDAP19 Incentive-Based Scheduling for Market-Like Computational Grids Dotnet
20 SDAP20 Approximate query processing in peer to peer networks Dotnet
21 SDAP21 XML Based Ranking and Keyword Search Dotnet
22 SDAP22 Secured Data Object Replication in data grid Dotnet
23 SDAP23 Medical Anonymity Processing And Publishing Dotnet
24 SDAP24 Object Tracking System Dotnet
25 SDAP25 Secure Data Transformation System Dotnet
26 SDAP26 Effective blogger with XML interchange Dotnet
27 SDAP27 Alert based monitoring and scheduling on Proportional shares Dotnet
28 SDAP28 Exact Knowledge hiding for automobiles industry Dotnet
29 SDAP29 Efficient Property Interpreter Dotnet
30 SDAP30 Blind Banking Transformation System Dotnet
31 SDAP31 Security and Privacy for Social Networks. Dotnet
32 SDAP32 Still to animation movie creation Dotnet
33 SDAP33 Medical anonymity processing and publishing Dotnet
34 SDAP34 Global roaming and target tracking in mobile sensor network Dotnet
35 SDAP35 Development Of A Campaign Information System Dotnet
36 SDAP36 Perspective Access Management Dotnet
37 SDAP37 Email Proxy Server with Secure Service Dotnet
38 SDAP38 Online Bus Ticket Booking Dotnet
39 SDAP39 Dotnet
Customer Relationship Management
Fabsys Technologies Pvt.Ltd | 27
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
28. Skiveprojects
APPLICATION PROJECT TITLES
Web and Windows Application: JAVA
REALTIME APPLICATION PROJECT TITLES
DOMAIN: JAVA
S.NO CODE PROJECT TITLES DOMAIN
1 SJAP Normalized queuing delay: congestion control jointly utilizing Java
delay and marking
2 SJAP Distributed Algorithm for Minimum path Java
3 SJAP Path Diversity for packets Java
4 SJAP Node isolation model and age-based neighbor selection in Java
unstructured p2p networks
5 SJAP An Identity-Based Security System for User Privacy in Vehicular Java
Ad Hoc Networks
6 SJAP Layered Approach Using Conditional Random Fields for Intrusion Java
Detection.
7 SJAP A Puzzle based defense strategy against flooding attacks using Java
game theory
8 SJAP Adaptive Join Operators for Result Rate Optimization on Java
Streaming Inputs
9 SJAP Bin Rank: Scaling Dynamic Authority-Based Search Using Java
Materialized Sub graphs
Fabsys Technologies Pvt.Ltd | 28
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
29. Skiveprojects
10 SJAP NNexus: An automatic linker for collaborative web based corpora Java
11 SJAP SSUM: Smart Server Update Mechanism for Maintaining Cache Java
Consistency in Mobile Environments
12 SJAP CAR: context aware adaptive routing for delay tolerant mobile Java
networks
13 SJAP Generic Loss Less Watermarking Java
14 SJAP Unseen Visible Water Marking Java
15 SJAP Colored tree Java
16 SJAP QKDP: Provably secured third party authenticated quantum key Java
distribution protocol
17 SJAP Controlling IP spoofing through inter-domain packet filters Java
18 SJAP A service centric multicast architecture and routing protocol Java
19 SJAP Enhancing search performance in unstructured p2p networks Java
based on users’ common interest
20 SJAP Two Techniques for Fast computation of constrained shortest path Java
For Application Project Description, visit Skiveprojects.com!!
Get free Project Explanation @ 9176990090, 044-42712737
Fabsys Technologies Pvt.Ltd | 29
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software