SBGC provides IEEE software projects for students in various domains including Java, J2ME, J2EE, .NET and MATLAB. It offers two categories of projects - projects with new ideas/papers and selecting from their project list. They ensure projects are implemented satisfactorily and students understand all aspects. SBGC provides latest 2012-2013 projects for various engineering and technology students as well as MBA students. It offers project support including abstracts, reports, presentations and certificates.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Abstract
Researchers in the field of software engineering, business process improvement and information engineering all want to drastically modernize software life-cycle processes and technologies to correct the problems and to improve the quality of software. Research goals have included ancillary issues, such as improving user services through conversion to new platforms and facilitating software processes by adopting automated tools. Automated tools for software development, understanding, maintenance, and documentation add to process maturity, leading to better quality and reliability of computer services and greater customer satisfaction. This paper focuses on critical issues of legacy program improvement. The program improvement needs the estimation of program from various perspectives. The paper highlights various elements of legacy program complexity which further can be taken in account for further program development.
Keywords: Legacy, Program, Software complexity, Code, Integration
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Abstract
Researchers in the field of software engineering, business process improvement and information engineering all want to drastically modernize software life-cycle processes and technologies to correct the problems and to improve the quality of software. Research goals have included ancillary issues, such as improving user services through conversion to new platforms and facilitating software processes by adopting automated tools. Automated tools for software development, understanding, maintenance, and documentation add to process maturity, leading to better quality and reliability of computer services and greater customer satisfaction. This paper focuses on critical issues of legacy program improvement. The program improvement needs the estimation of program from various perspectives. The paper highlights various elements of legacy program complexity which further can be taken in account for further program development.
Keywords: Legacy, Program, Software complexity, Code, Integration
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...ijseajournal
This article is an extended version of a previously published conference paper. In this research, JHotDraw (JHD), a well-tested and widely used open source Java-based graphics framework developed with the best software engineering practice was selected as a test suite. Six versions of this software were profiled, and data collected dynamically, from which four metrics namely (1) entropy (2) software maturity index, COCOMO effort and duration metrics were used to analyze software degradation, maturity level and use
the obtained results as input to time series analysis in order to predict effort and duration period that may
be needed for the development of future versions. The novel idea is that, historical evolution data is used to
project, predict and forecast resource requirements for future developments. The technique presented in
this paper will empower software development decision makers with a viable tool for planning and decision
making.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Unsustainable Regaining Control of Uncontrollable AppsCAST
The ever-growing cost to maintain systems continues to crush IT organizations robbing their ability to fund innovation while increasing risks across the organization. There are, however, some tactics to reduce application total ownership cost, reduce complexity and improve sustainability across your portfolio.
Software Testing and Quality Assurance Assignment 2Gurpreet singh
Short questions :
Q1: What is stress testing?
Q2: What is Cyclomatic complexity?
Q3: Define Object Oriented Testing
Q4: What is regression testing? When it is done?
Q5: How loop testing is different from the path testing?
Q6: What is client server environment?
Q7: What is graph based testing?
Q8: How security testing is useful in real applications?
Q9: What are main characteristics of real time system?
Q10: What are the benefits of data flow testing?
Long Questions:
Q1: Design test case for: ERP, Traffic controller and university management system?
Q2: Assuming a real time system of your choice, discuss the concepts. Analysis and design factors of same, elaborate
Q3: How testing in multiplatform environment is performed?
Q4: Explain graph based testing in detail
Q5: Differentiate between Equivalence partitioning and boundary value analysis
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSIJSEA
Computer programs often behave differently under different compilers or in different computing
environments. Relative debugging is a collection of techniques by which these differences are analysed.
Differences may arise because of different interpretations of errors in the code, because of bugs in the
compilers or because of numerical drift, and all of these were observed in the present study. Numerical
drift arises when small and acceptable differences in values computed by different systems are
integrated, so that the results drift apart. This is well understood and need not degrade the validity of the
program results. Coding errors and compiler bugs may degrade the results and should be removed. This
paper describes a technique for the comparison of two program runs which removes numerical drift and
therefore exposes coding and compiler errors. The procedure is highly automated and requires very little
intervention by the user. The technique is applied to the Weather Research and Forecasting model, the
most widely used weather and climate modelling code.
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...Amine Barrak
Presentation of Best student paper award on CASCON2018 intitled: Just-in-time Detection of Protection-Impacting Changes on WordPress and MediaWiki
Link to the paper: https://dl.acm.org/citation.cfm?id=3291310
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
In this paper, a model of protection services in the antivirus system is proposed. The antivirus system
behavior separate in to preventive and control behaviors. We extract the properties which are expected
from the model of antivirus system approach from control behavior in the form of CTL and LTL temporal
logic formulas. To implement the behavior models of antivirus system approach, the ArgoUML tool and the
NuSMV model checker are employed. The results show that the antivirus system approach can detects
fairness, reachability, deadlock free and verify some properties of the proposed model verified by using
NuSMV model checker.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...ijseajournal
This article is an extended version of a previously published conference paper. In this research, JHotDraw (JHD), a well-tested and widely used open source Java-based graphics framework developed with the best software engineering practice was selected as a test suite. Six versions of this software were profiled, and data collected dynamically, from which four metrics namely (1) entropy (2) software maturity index, COCOMO effort and duration metrics were used to analyze software degradation, maturity level and use
the obtained results as input to time series analysis in order to predict effort and duration period that may
be needed for the development of future versions. The novel idea is that, historical evolution data is used to
project, predict and forecast resource requirements for future developments. The technique presented in
this paper will empower software development decision makers with a viable tool for planning and decision
making.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Unsustainable Regaining Control of Uncontrollable AppsCAST
The ever-growing cost to maintain systems continues to crush IT organizations robbing their ability to fund innovation while increasing risks across the organization. There are, however, some tactics to reduce application total ownership cost, reduce complexity and improve sustainability across your portfolio.
Software Testing and Quality Assurance Assignment 2Gurpreet singh
Short questions :
Q1: What is stress testing?
Q2: What is Cyclomatic complexity?
Q3: Define Object Oriented Testing
Q4: What is regression testing? When it is done?
Q5: How loop testing is different from the path testing?
Q6: What is client server environment?
Q7: What is graph based testing?
Q8: How security testing is useful in real applications?
Q9: What are main characteristics of real time system?
Q10: What are the benefits of data flow testing?
Long Questions:
Q1: Design test case for: ERP, Traffic controller and university management system?
Q2: Assuming a real time system of your choice, discuss the concepts. Analysis and design factors of same, elaborate
Q3: How testing in multiplatform environment is performed?
Q4: Explain graph based testing in detail
Q5: Differentiate between Equivalence partitioning and boundary value analysis
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSIJSEA
Computer programs often behave differently under different compilers or in different computing
environments. Relative debugging is a collection of techniques by which these differences are analysed.
Differences may arise because of different interpretations of errors in the code, because of bugs in the
compilers or because of numerical drift, and all of these were observed in the present study. Numerical
drift arises when small and acceptable differences in values computed by different systems are
integrated, so that the results drift apart. This is well understood and need not degrade the validity of the
program results. Coding errors and compiler bugs may degrade the results and should be removed. This
paper describes a technique for the comparison of two program runs which removes numerical drift and
therefore exposes coding and compiler errors. The procedure is highly automated and requires very little
intervention by the user. The technique is applied to the Weather Research and Forecasting model, the
most widely used weather and climate modelling code.
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...Amine Barrak
Presentation of Best student paper award on CASCON2018 intitled: Just-in-time Detection of Protection-Impacting Changes on WordPress and MediaWiki
Link to the paper: https://dl.acm.org/citation.cfm?id=3291310
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
In this paper, a model of protection services in the antivirus system is proposed. The antivirus system
behavior separate in to preventive and control behaviors. We extract the properties which are expected
from the model of antivirus system approach from control behavior in the form of CTL and LTL temporal
logic formulas. To implement the behavior models of antivirus system approach, the ArgoUML tool and the
NuSMV model checker are employed. The results show that the antivirus system approach can detects
fairness, reachability, deadlock free and verify some properties of the proposed model verified by using
NuSMV model checker.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
Finding Bad Code Smells with Neural Network Models IJECEIAES
Code smell refers to any symptom introduced in design or implementation phases in the source code of a program. Such a code smell can potentially cause deeper and serious problems during software maintenance. The existing approaches to detect bad smells use detection rules or standards using a combination of different object-oriented metrics. Although a variety of software detection tools have been developed, they still have limitations and constraints in their capabilities. In this paper, a code smell detection system is presented with the neural network model that delivers the relationship between bad smells and object-oriented metrics by taking a corpus of Java projects as experimental dataset. The most well-known objectoriented metrics are considered to identify the presence of bad smells. The code smell detection system uses the twenty Java projects which are shared by many users in the GitHub repositories. The dataset of these Java projects is partitioned into mutually exclusive training and test sets. The training dataset is used to learn the network model which will predict smelly classes in this study. The optimized network model will be chosen to be evaluated on the test dataset. The experimental results show when the modelis highly trained with more dataset, the prediction outcomes are improved more and more. In addition, the accuracy of the model increases when it performs with higher epochs and many hidden layers.
Improved Strategy for Distributed Processing and Network Application Developm...Editor IJCATR
The complexity of software development abstraction and the new development in multi-core computers have shifted the burden of distributed software performance from network and chip designers to software architectures and developers. We need to look at software development strategies that will integrate parallelization of code, concurrency factors, multithreading, distributed resources allocation and distributed processing. In this paper, a new software development strategy that integrates these factors is further experimented on parallelism. The strategy is multidimensional aligns distributed conceptualization along a path. This development strategy mandates application developers to reason along usability, simplicity, resource distribution, parallelization of code where necessary, processing time and cost factors realignment as well as security and concurrency issues in a balanced path from the originating point of the network application to its retirement.
Improved Strategy for Distributed Processing and Network Application DevelopmentEditor IJCATR
The complexity of software development abstraction and the new development in multi-core computers have shifted the
burden of distributed software performance from network and chip designers to software architectures and developers. We need to
look at software development strategies that will integrate parallelization of code, concurrency factors, multithreading, distributed
resources allocation and distributed processing. In this paper, a new software development strategy that integrates these factors is
further experimented on parallelism. The strategy is multidimensional aligns distributed conceptualization along a path. This
development strategy mandates application developers to reason along usability, simplicity, resource distribution, parallelization of
code where necessary, processing time and cost factors realignment as well as security and concurrency issues in a balanced path from
the originating point of the network application to its retirement.
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Development of software defect prediction system using artificial neural networkIJAAS Team
Software testing is an activity to enable a system is bug free during execution process. The software bug prediction is one of the most encouraging exercises of the testing phase of the software improvement life cycle. In any case, in this paper, a framework was created to anticipate the modules that deformity inclined in order to be utilized to all the more likely organize software quality affirmation exertion. Genetic Algorithm was used to extract relevant features from the acquired datasets to eliminate the possibility of overfitting and the relevant features were classified to defective or otherwise modules using the Artificial Neural Network. The system was executed in MATLAB (R2018a) Runtime environment utilizing a statistical toolkit and the performance of the system was assessed dependent on the accuracy, precision, recall, and the f-score to check the effectiveness of the system. In the finish of the led explores, the outcome indicated that ECLIPSE JDT CORE, ECLIPSE PDE UI, EQUINOX FRAMEWORK and LUCENE has the accuracy, precision, recall and the f-score of 86.93, 53.49, 79.31 and 63.89% respectively, 83.28, 31.91, 45.45 and 37.50% respectively, 83.43, 57.69, 45.45 and 50.84% respectively and 91.30, 33.33, 50.00 and 40.00% respectively. This paper presents an improved software predictive system for the software defect detections.
ieee projects is the most important projects for engineering students like BE Projects and ME Projects, MCA students Projects, BCA students Projects, MPhile Projects
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
ieee projects 2013 for me cse trichy, ieee projects 2013 for me cse Karur, ieee projects 2013 for me cse chennai, ieee projects 2013 for me cse, ieee projects, ieee projects for cse, ieee projects 2013, ieee projects 2013 for me cse Thanjavur, ieee projects 2013 for me cse Perambalur,
ieee projects 2012, ieee 2012 projects, 2012 ieee projects, ieee projects 2012 for it with abstract, ieee projects titles 2012 for it, ieee final year projects 2012 for it
ieee projects 2012 for cse in mobile computing, ieee projects mobile computing 2012, bulk ieee projects, bulk ieee projects 2012, bulk ieee projects 2012 for cse, bulk ieee projects 2012 for cse with abstract, bulk ieee projects 2012 for cse in mobile computing, bulk ieee projects 2012 mobile computing, ieee projects 2012 mobile computing, ieee 2012 projects, ieee 2012 projects for cse, ieee projects for cse 2012 free download, ieee projects for cse 2012 with abstract, ieee 2012 papers, ieee 2012 projects on mobile computing, ieee 2012 projects in mobile computing, ieee 2012 projects for it, ieee projects 2012 for cse in java, 2012 ieee projects, 2012 ieee projects for cse, 2012 ieee projects list, latest ieee projects 2012 for cse, latest ieee projects 2012 for it
ieee projects 2012 for cse in networking trichy, ieee projects 2012 for networking chennai, ieee projects 2012 for cse bangalore, ieee projects 2012 for it hyderabad, ieee projects 2012 for me pune, ieee projects 2012 for mca nagpur, ieee projects 2012 for me cse tirupati, ieee projects for cse 2012 titles cochin, ieee projects for cse 2012 free download mysore, ieee projects for cse 2012 hubli, ieee mini projects for cse 2012 vijayawada
ieee projects 2012 trichy, java ieee projects 2012 chennai, java ieee projects 2012 for cse with abstract thanjavur, java ieee projects 2012 for cse in data mining pudukkottai, java ieee projects 2012 for it with abstract namakkal, java ieee projects 2012 for mca salem, java ieee projects 2012 for mca with abstract pondicherry, java ieee projects 2012 for me vellore, java ieee projects 2012 for me cse Tiruvannamalai, ieee java projects 2012 karaikal, ieee 2012 projects Villupuram, ieee 2012 projects for cse Kanchipuram, java ieee 2012 projects for cse Chengalpattu, java ieee 2012 projects for cse in data mining Dindigul, java ieee 2012 projects for cse with abstract Perambalur, java ieee 2012 projects for mca Tirupati, java ieee 2012 projects for me cse Bangalore, 2012 ieee projects Mumbai, 2012 ieee projects for cse Pune
ieee projects 2012 for cse, ieee projects 2012, ieee projects for cse, ieee projects for cse 2012, ieee project for cse 2012, ieee projects for cse 2012 titles, ieee projects for cse 2012 free download, ieee mini projects for cse 2012, ieee projects 2012 for cse with abstract, ieee final year projects 2012 for cse, ieee projects titles 2012 for cse, ieee projects titles 2012 for mca, ieee projects titles 2012 for it, ieee projects titles 2012, ieee projects 2012 for it, ieee projects 2012 for mca, ieee projects 2012 for me, ieee projects 2012 for me cse, ieee projects 2012 for me cse with abstract, latest ieee projects 2012 for cse, latest ieee projects 2012 for it, latest ieee projects 2012, ieee projects 2012 in networking, ieee projects 2012 in data mining, ieee 2012 projects on cloud computing, ieee projects mobile computing 2012, ieee projects networking, ieee projects network security, ieee projects 2012 for it with abstract, ieee image processing projects 2012
ieee projects 2012 for cse, ieee projects 2012, ieee projects for cse, ieee projects for cse 2012, ieee project for cse 2012, ieee projects for cse 2012 titles, ieee projects for cse 2012 free download, ieee mini projects for cse 2012, ieee projects 2012 for cse with abstract, ieee final year projects 2012 for cse, ieee projects titles 2012 for cse, ieee projects titles 2012 for mca, ieee projects titles 2012 for it, ieee projects titles 2012, ieee projects 2012 for it, ieee projects 2012 for mca, ieee projects 2012 for me, ieee projects 2012 for me cse, ieee projects 2012 for me cse with abstract, latest ieee projects 2012 for cse, latest ieee projects 2012 for it, latest ieee projects 2012, ieee projects 2012 in networking, ieee projects 2012 in data mining, ieee 2012 projects on cloud computing, ieee projects mobile computing 2012, ieee projects networking, ieee projects network security, ieee projects 2012 for it with abstract, ieee image processing projects 2012
ieee projects 2012 for cse, ieee projects 2012, ieee projects for cse, ieee projects for cse 2012, ieee project for cse 2012, ieee projects for cse 2012 titles, ieee projects for cse 2012 free download, ieee mini projects for cse 2012, ieee projects 2012 for cse with abstract, ieee final year projects 2012 for cse, ieee projects titles 2012 for cse, ieee projects titles 2012 for mca, ieee projects titles 2012 for it, ieee projects titles 2012, ieee projects 2012 for it, ieee projects 2012 for mca, ieee projects 2012 for me, ieee projects 2012 for me cse, ieee projects 2012 for me cse with abstract, latest ieee projects 2012 for cse, latest ieee projects 2012 for it, latest ieee projects 2012, ieee projects 2012 in networking, ieee projects 2012 in data mining, ieee 2012 projects on cloud computing, ieee projects mobile computing 2012, ieee projects networking, ieee projects network security, ieee projects 2012 for it with abstract, ieee image processing projects 2012
1. SEABIRDS
IEEE 2012 – 2013
SOFTWARE PROJECTS IN
VARIOUS DOMAINS
| JAVA | J2ME | J2EE |
DOTNET |MATLAB |NS2 |
SBGC SBGC
24/83, O Block, MMDA COLONY 4th FLOOR SURYA COMPLEX,
ARUMBAKKAM SINGARATHOPE BUS STOP,
CHENNAI-600106 OLD MADURAI ROAD, TRICHY- 620002
Web: www.ieeeproject.in
E-Mail: ieeeproject@hotmail.com
Trichy Chennai
Mobile:- 09003012150 Mobile:- 09944361169
Phone:- 0431-4012303
2. SBGC Provides IEEE 2012-2013 projects for all Final Year Students. We do assist the students
with Technical Guidance for two categories.
Category 1 : Students with new project ideas / New or Old
IEEE Papers.
Category 2 : Students selecting from our project list.
When you register for a project we ensure that the project is implemented to your fullest
satisfaction and you have a thorough understanding of every aspect of the project.
SBGC PROVIDES YOU THE LATEST IEEE 2012 PROJECTS / IEEE 2013 PROJECTS
FOR FOLLOWING DEPARTMENT STUDENTS
B.E, B.TECH, M.TECH, M.E, DIPLOMA, MS, BSC, MSC, BCA, MCA, MBA, BBA, PHD,
B.E (ECE, EEE, E&I, ICE, MECH, PROD, CSE, IT, THERMAL, AUTOMOBILE,
MECATRONICS, ROBOTICS) B.TECH(ECE, MECATRONICS, E&I, EEE, MECH , CSE, IT,
ROBOTICS) M.TECH(EMBEDDED SYSTEMS, COMMUNICATION SYSTEMS, POWER
ELECTRONICS, COMPUTER SCIENCE, SOFTWARE ENGINEERING, APPLIED
ELECTRONICS, VLSI Design) M.E(EMBEDDED SYSTEMS, COMMUNICATION
SYSTEMS, POWER ELECTRONICS, COMPUTER SCIENCE, SOFTWARE
ENGINEERING, APPLIED ELECTRONICS, VLSI Design) DIPLOMA (CE, EEE, E&I, ICE,
MECH,PROD, CSE, IT)
MBA(HR, FINANCE, MANAGEMENT, HOTEL MANAGEMENT, SYSTEM
MANAGEMENT, PROJECT MANAGEMENT, HOSPITAL MANAGEMENT, SCHOOL
MANAGEMENT, MARKETING MANAGEMENT, SAFETY MANAGEMENT)
We also have training and project, R & D division to serve the students and make them job
oriented professionals
3. PROJECT SUPPORTS AND DELIVERABLES
Project Abstract
IEEE PAPER
IEEE Reference Papers, Materials &
Books in CD
PPT / Review Material
Project Report (All Diagrams & Screen
shots)
Working Procedures
Algorithm Explanations
Project Installation in Laptops
Project Certificate
4. TECHNOLOGY : JAVA
DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
S.No. IEEE TITLE ABSTRACT IEEE
YEAR
1. Automatic Dynamic loading of software components (e.g., libraries 2012
Detection of or modules) is a widely used mechanism for an
Unsafe improved system modularity and flexibility. Correct
Dynamic component resolution is critical for reliable and secure
Component software execution. However, programming mistakes
Loadings may lead to unintended or even malicious components
being resolved and loaded. In particular, dynamic
loading can be hijacked by placing an arbitrary file with
the specified name in a directory searched before
resolving the target component. Although this issue has
been known for quite some time, it was not considered
serious because exploiting it requires access to the local
file system on the vulnerable host. Recently, such
vulnerabilities have started to receive considerable
attention as their remote exploitation became realistic. It
is now important to detect and fix these vulnerabilities.
In this paper, we present the first automated technique to
detect vulnerable and unsafe dynamic component
loadings. Our analysis has two phases: 1) apply dynamic
binary instrumentation to collect runtime information on
component loading (online phase), and 2) analyze the
collected information to detect vulnerable component
loadings (offline phase). For evaluation, we
implemented our technique to detect vulnerable and
unsafe component loadings in popular software on
Microsoft Windows and Linux. Our evaluation results
show that unsafe component loading is prevalent in
software on both OS platforms, and it is more severe on
Microsoft Windows. In particular, our tool detected
more than 4,000 unsafe component loadings in our
evaluation, and some can lead to remote code execution
on Microsoft Windows.
2. Fault In recent years, there has been significant interest in 2012
Localization fault-localization techniques that are based on statistical
for Dynamic analysis of program constructs executed by passing and
Web failing executions. This paper shows how the Tarantula,
Applications Ochiai, and Jaccard fault-localization algorithms can be
5. enhanced to localize faults effectively in web
applications written in PHP by using an extended
domain for conditional and function-call statements and
by using a source mapping. We also propose several
novel test-generation strategies that are geared toward
producing test suites that have maximal fault-
localization effectiveness. We implemented various
fault-localization techniques and test-generation
strategies in Apollo, and evaluated them on several
open-source PHP applications. Our results indicate that a
variant of the Ochiai algorithm that includes all our
enhancements localizes 87.8 percent of all faults to
within 1 percent of all executed statements, compared to
only 37.4 percent for the unenhanced Ochiai algorithm.
We also found that all the test-generation strategies that
we considered are capable of generating test suites with
maximal fault-localization effectiveness when given an
infinite time budget for test generation. However, on
average, a directed strategy based on path-constraint
similarity achieves this maximal effectiveness after
generating only 6.5 tests, compared to 46.8 tests for an
undirected test-generation strategy.
3. Input Domain Search-Based Test Data Generation reformulates testing 2012
Reduction goals as fitness functions so that test input generation
through can be automated by some chosen search-based
Irrelevant optimization algorithm. The optimization algorithm
Variable searches the space of potential inputs, seeking those that
Removal and are “fit for purpose,” guided by the fitness function. The
Its Effect on search space of potential inputs can be very large, even
Local, Global, for very small systems under test. Its size is, of course, a
and Hybrid key determining factor affecting the performance of any
Search- search-based approach. However, despite the large
Based volume of work on Search-Based Software Testing, the
literature contains little that concerns the performance
impact of search space reduction. This paper proposes a
static dependence analysis derived from program slicing
that can be used to support search space reduction. The
paper presents both a theoretical and empirical analysis
of the application of this approach to open source and
industrial production code. The results provide evidence
to support the claim that input domain reduction has a
significant effect on the performance of local, global,
and hybrid search, while a purely random search is
unaffected.
4. PerLa:A A declarative SQL-like language and a middleware 2012
Language and infrastructure are presented for collecting data from
6. Middleware different nodes of a pervasive system. Data management
Architecture is performed by hiding the complexity due to the large
for Data underlying heterogeneity of devices, which can span
Management from passive RFID(s) to ad hoc sensor boards to
and Integration portable computers. An important feature of the
presented middleware is to make the integration of new
device types in the system easy through the use of device
self-description. Two case studies are described for
PerLa usage, and a survey is made for comparing our
approach with other projects in the area.
5. Comparing Current and future information systems require a better 2012
Semi- understanding of the interactions between users and
Automated systems in order to improve system use and, ultimately,
Clustering success. The use of personas as design tools is becoming
Methods for more widespread as researchers and practitioners
Persona discover its benefits. This paper presents an empirical
Development study comparing the performance of existing qualitative
and quantitative clustering techniques for the task of
identifying personas and grouping system users into
those personas. A method based on Factor (Principal
Components) Analysis performs better than two other
methods which use Latent Semantic Analysis and
Cluster Analysis as measured by similarity to expert
manually defined clusters
6. StakeRare: Requirements elicitation is the software engineering
Using Social activity in which stakeholder needs are understood. It
Networks and involves identifying and prioritizing requirements-a
Collaborative process difficult to scale to large software projects with
Filtering for many stakeholders. This paper proposes StakeRare, a
Large-Scale novel method that uses social networks and collaborative
Requirements filtering to identify and prioritize requirements in large
Elicitation software projects. StakeRare identifies stakeholders and
asks them to recommend other stakeholders and
stakeholder roles, builds a social network with
stakeholders as nodes and their recommendations as
links, and prioritizes stakeholders using a variety of
social network measures to determine their project
influence. It then asks the stakeholders to rate an initial
list of requirements, recommends other relevant
requirements to them using collaborative filtering, and
prioritizes their requirements using their ratings
weighted by their project influence. StakeRare was
evaluated by applying it to a software project for a
30,000-user system, and a substantial empirical study of
requirements elicitation was conducted. Using the data
collected from surveying and interviewing 87
7. stakeholders, the study demonstrated that StakeRare
predicts stakeholder needs accurately and arrives at a
more complete and accurately prioritized list of
requirements compared to the existing method used in
the project, taking only a fraction of the time
7. QoS A major challenge of dynamic reconfiguration is Quality 2012
Assurance for of Service (QoS) assurance, which is meant to reduce
Dynamic application disruption to the minimum for the system's
Reconfiguratio transformation. However, this problem has not been well
n of studied. This paper investigates the problem for
Component- component-based software systems from three points of
Based view. First, the whole spectrum of QoS characteristics is
Software defined. Second, the logical and physical requirements
for QoS characteristics are analyzed and solutions to
achieve them are proposed. Third, prior work is
classified by QoS characteristics and then realized by
abstract reconfiguration strategies. On this basis,
quantitative evaluation of the QoS assurance abilities of
existing work and our own approach is conducted
through three steps. First, a proof-of-concept prototype
called the reconfigurable component model is
implemented to support the representation and testing of
the reconfiguration strategies. Second, a reconfiguration
benchmark is proposed to expose the whole spectrum of
QoS problems. Third, each reconfiguration strategy is
tested against the benchmark and the testing results are
evaluated. The most important conclusion from our
investigation is that the classified QoS characteristics
can be fully achieved under some acceptable constraints.