Upload
lykien
View
247
Download
4
Embed Size (px)
Citation preview
IEEE 2016-2017 PROJECTS Technology: JAVA (J2SE & J2EE)
S. No
PROJECT TITLES
1 Trust Agent-Based Behavior Induction in Social Networks
2
Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
3 Data Lineage in Malicious Environments 4 ID2S Password Authenticated key exchange protocol 5 Profiling Online Social Behaviors for Compromised
Account Detection 6 Quantifying Political Leaning from Tweets, Re tweets, and
Re tweeters
7Connecting Social Media to E-Commerce Cold-Start Product Recommendation Using Micro blogging Information
8A Novel Recommendation Model Regularized with User Trust and Item Ratings
9Automatically Mining Facets for Queries from Their Search Results
10Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search
11KNNVWC An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering
12Location Aware Keyword Query Suggestion Based on Document Proximity
13Mining User-Aware Rare Sequential Topic Patterns in Document Streams
14Nearest Keyword Set Search in Multi-Dimensional Datasets
[1]
15Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
16Topic Sketch Real-time Bursty Topic Detection from Twitter
17 Top-k Dominating Queries on Incomplete Data
18Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
19User-Service Rating Prediction by Exploring Social Users' Rating Behaviors
20 Data Lineage in Malicious Environments
21Mitigating Cross-Site Scripting Attacks with a Content Security Policy
22Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
23Social Friend Recommendation Based on Multiple Network Correlation
24User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
25 FRODO: Fraud Resilient Device for Off-line micro-payments
26 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
27 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
28Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
29 Learning to Rank Image Tags With Limited Training Examples
30Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
31 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
[2]
32 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
33 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
34 Detecting Malicious Face book Applications35 Key Updating for Leakage Resiliency with Application to
AES Modes of Operation36 Booster in High Dimensional Data Classification37 Efficient Cache-Supported Path Planning on Roads38 Top-Down XML Keyword Query Processing39 Understanding Short Texts through Semantic Enrichment
and Hashing40 Building an intrusion detection system using a filter-
based feature selection algorithm41 Domain-Sensitive Recommendation with User-Item
Subgroup Analysis42 Relevance Feedback Algorithms Inspired By Quantum
Detection43 A Stable Approach for Routing Queries in Unstructured
P2P Networks44 Spatial Reusability-Aware Routing in Multi-Hop Wireless
Networks45 Profiling Online Social Behaviors for Compromised
Account Detection46 I Path: Path Inference in Wireless Sensor Networks47 A Scalable Approach for Content-Based Image Retrieval in
Peer-to-Peer Networks48 Online Multi-Modal Distance Metric Learning with
Application to Image Retrieval49 Tag Based Image Search by Social Re-ranking50 Learning of Multimodal Representations With Random
Walks on the Click Graph51 Detection And Localization Of Multiple Spoofing
52A Proximity-Aware Interest-Clustered P2P File Sharing System
53 User-Defined Privacy Grid System for Continuous Location-Based Services
54Continuous and Transparent User Identity Verification for Secure Internet Services
55 DDSGA: A Data-Driven Semi-Global Alignment Approach
[3]
for Detecting Masquerade Attacks
56 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
57 Effective Key Management in Dynamic Wireless Sensor Networks
58 An Attribute-Assisted Re ranking Model for Web Image Search
59 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
60 Security-Evaluation-Of-Pattern-Classifiers-Under-Attack
JAVA ANDROID PROJECTSENVIRONMENT DETAILS:ANDROID,SQLITE
S. No PROJECT TITLES
1 A Location- and Diversity-aware News Feed System for Mobile Users
2 Context-Based Access Control Systems for Mobile Devices
3 Cooperative Positioning and Tracking in Disruption Tolerant Networks
4 CWC: A Distributed Computing Infrastructure Using Smartphone’s
5 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile
6 Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
7 Privacy-Preserving Relative Location Based Services for Mobile Users
8 The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
9 Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds
[4]
10 User Privacy and Data Trustworthiness in Mobile Crowd Sensing
11 User-Defined Privacy Grid System for Continuous Location-Based Services
12 Effective Risk Communication for Android Apps13 Catch Me If You Can: Evaluating Android Anti-Malware
Against Transformation Attacks14 Meet You – Social Networking on Android
15 MOSES: Supporting and Enforcing Security Profiles on Smart phones
16 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
CLOUD COMPUTINGTechnology:JAVA,J2EE&MYSQL
S. No PROJECT TITLES
1 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
2 A Secure and Dynamic Multi-keyword Ranked Search Scheme
3 Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
4 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
5Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
6 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
7 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
8 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems
9DeyPoS De duplicatable Dynamic Proof of Storage for Multi-User Environments
10Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
11Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
12 Providing User Security Guarantees in Public
[5]
Infrastructure Clouds
13 EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
14Dynamic and Public Auditing with Fair Arbitration for Cloud Data
15An Efficient Privacy-Preserving Ranked Keyword Search Method
16Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
17 Malware Detection in Cloud Computing Infrastructures
18Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
19Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
20 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
21 Fine Grained Two Factor Access Control for Web Based Cloud Computing Services
22 Cloud workflow scheduling with deadlines and time slot availability
23 Cloud Armor Supporting Reputation-based Trust Management for Cloud Services
24 Privacy Preserving Ranked Multi Keyword Search for Multiple Data Owners in Cloud Computing
25 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub dictionaries over Encrypted Cloud Data
26 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
27 Two Factor Data Security Protection Mechanism for Cloud Storage System
28A Privacy Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains
[6]
29Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
30 PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
WEB APPLICATIONS
Technology: JAVA J2EE,TOMCAT,ORACLES. No PROJECT TITLES1 Advanced Google map For even Management System2 Graphical Representation of Sorting Algorithm3 Students Bus Pass Reservation System 4 DVD-Rental System5 Profile Evolution Technique6 Business Directory Search and add Business in your city7 E-Dues Online Due Date Reminders8 E-Print Order For stationery Shop 9 Health care for you 24x7 medical helpline10 Offers A Marketing Challenge11 Performance Analyzer How is Your Employee Performing12 RTO management System13 Shaadi Shopping Online Shopping14 Video Hub Video management System15 Map-Reduction In java16 Pattern Matching Algorithms17 Mentors & Proteges Empowering Women18 Fighting Hunger 19 Online student feedback system20 Hybrid-Book Collection Management System21 An Intelligent Heart Disease Prediction System sing K-
Means Clustering and Naïve Bayes Algorithm22 Secure Cloud Computing through Homomorphic
Encryption23 Implementation of Cloud Storage System using Multiple
Cloud Services24 Fraud Detection In E-Shopping25 Car Parking System using Bar Code Reader
[7]
Technology: DOTNET IEEE PROJECTSS. No PROJECT TITLES
01 Efficient Certificate less Access Control for Wireless Body Area Networks
02 Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage
03 Geographic and Opportunistic Routing for Underwater Sensor Networks
04 Optimizing Cost for Online Social Networks on Geo-Distributed Clouds
05 Secure and Efficient data communication protocol for Wireless Body Area Networks
06 Authenticated Key Exchange Protocols for Parallel Network File System
07 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
08 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
09Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data
10 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
11 Content-Adaptive Steganography by Minimizing Statistical Detectability
12 ID2S Password-Authenticated Key Exchange Protocols13 Real-Time Semantic Search Using Approximate
Methodology for Large-Scale Storage Systems14 Authenticated Key Exchange Protocols for Parallel
Network File Systems15 A Joint Time Synchronization and Localization Design for
Mobile Underwater Sensor Networks16 DAGCM: A Concurrent Data Uploading Framework for
Mobile Data Gathering in Wireless Sensor Networks17 Service Usage Classification with Encrypted Internet
Traffic in Mobile Messaging Apps18 Traffic Décor relation Techniques for Countering a Global
Eavesdropper in WSNs19 WORAL: A Witness Oriented Secure Location Provenance
Framework for Mobile Devices
[8]
20 A Mixed Generative-Discriminative Based Hashing Method21 Text Mining the Contributors to Rail Accidents22 Optimal Content Downloading in Vehicular Networks23 A Cocktail Approach for Travel Package Recommendation24 An Empirical Performance Evaluation of Relational
Keyword Search Techniques25 LARS*: An Efficient and Scalable Location-Aware
Recommender System26 Product Aspect Ranking and Its Applications27 Secure and Efficient Data Transmission for Cluster-Based
Wireless Sensor Networks28 Secure Mining of Association Rules in Horizontally
Distributed Databases29 Supporting Privacy Protection in Personalized Web Search30 Trusted DB: A Trusted Hardware-Based Database with
Privacy and Data Confidentiality31 Typicality-Based Collaborative Filtering Recommendation32 Content Caching and Scheduling in Wireless Networks
With Elastic and Inelastic Traffic33 Secure Data Retrieval for Decentralized Disruption-
Tolerant Military Networks34 An Error-Minimizing Framework for Localizing Jammers in
Wireless Networks35 Certificate less Remote Anonymous Authentication
Schemes for Wireless Body Area Networks36 Efficient Data Query in Intermittently-Connected Mobile
Ad Hoc Social Networks37 Multicast Capacity in MANET with Infrastructure Support38 Transmission-Efficient Clustering Method for Wireless
Sensor Networks Using Compressive Sensing39 Autonomous Mobile Mesh Networks40 Preserving Location Privacy in Geosocial Applications41 EMAP: Expedite Message Authentication Protocol for
Vehicular Ad Hoc Networks42 User-Service Rating Prediction by Exploring Social Users’
Rating Behaviors43 Practical Approximate k Nearest Neighbor Queries with
Location and Query Privacy
44Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
45 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
[9]
CLOUD COMPUTING
01 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
02 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
03 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
04 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
05 Leveraging Data De duplication to Improve the Performance of Primary Storage Systems in the Cloud
06 MMB cloud-tree: Authenticated Index for Verifiable Cloud Service Selection
07 Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
08 Content-Adaptive Steganography by Minimizing Statistical Detectability
09 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
10 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
11 Discovery of Ranking Fraud for Mobile Apps12 CAM: Cloud-Assisted Privacy Preserving Mobile
Health Monitoring13 MONA- secures multi owner data sharing for dynamic
groups in the cloud.
14PSMA-patient self-Controllable and multi-level privacy preserving cooperative authentication in distributed healthcare cloud computing.
15 Balancing performance, accuracy and precision for secure cloud transactions.
16 Consistency as a Service: Auditing Cloud Consistency17 Privacy-Preserving Public Auditing for Secure Cloud Storage18 Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases19 Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud data.20 Cloud Based Multimedia content protection system.21 Identity-Based distributed provable data possession in
multi cloud storage.22 Key aggregate cryptosystem for scalable data sharing in
cloud storage.23 Scalable and Secure Sharing of Personal Health Records in
[10]
Cloud Computing Using Attribute-Based Encryption.24 Decentralized access control with anonymous
authentication of data stored in clouds.25 Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
WEB APPLICATIONS
01 Cybernetics protector.02 Digital Eye.03 Error Tracking System.04 Expert answer.05 Asset boutique.06 Village morphogenesis.07 E-Budget.08 Air freight carrier.09 Census.10 Web pool processor.11 Smart knowledge provider.12 Logistic data system.13 Secure data communication.14 Vehicle hiring system.15 Inventory control system.16 Wealth bridging.17 Neural network for Unicode optical character recognition.18 Evaluating.19 A Gen2-based RFID Authentication Protocol for Security
and Privacy.20 Cellular banking.21 Online Art Gallery.22 Gateway Accessory.23 Outlet store.24 SMTP mail server.25 Active visual segmentation.
2016-17 PROJECTS TECHNOLOGY: EMBEDDED SYSTEM
S.NO PROJECT TITLES
[11]
1. Remote controlling of home appliances using mobile2. Safe driving system for mobile phone users
3. A wireless-enabled, cell-phone-incorporated personal assistant system for independent and assisted living
4. Smart card based fuel supply system5. Live bus stops and modern buses technology6. Auto speed controlling of vehicles7. Smart host micro controller for optimal battery usage8. Advanced remote control robot for industries9. An advanced robot for military application10. Vehicle accident avoidance system11. Railway track pedestrian crossing without using staircase12. Zig bee based automatic street light controlling system13. RFID and zig bee based airport luggage security system14. Auto speed controlling of vehicles15. Emergency alert for women safety with location tracking16. Arm platform for vehicular monitoring and tracking17. Advance question paper leakage control system design18. GPS based asset/vehicle/animal/child tracking system19. Automatic Power Meter Reading Using GSM Network.20. Advance home security for intruder detection with auto
paging/dialing21. Vehicle ignition security with dynamic password generation22. Emergency alert for women safety with location tracking23. E-voting system to avoid anti rigging24. A proposed system for advance security and automation in
metro trains to prevent accidents25. Advance home security for intruder detection with auto
paging/dialing26. Micro controller based customizable wireless sensor node
to detect hazardous gas pipeline leakage27. Real time vehicle parameter monitoring with continuously
tracking of a VIP vehicle28. Real-time control system for air pollution detection in
vehicles29. Human health monitoring mobile phone application by
using embedded system30. Electronic service provider with billing 31. RFID and zig-bee based manufacturing monitoring system32. The design and implementation of intelligent campus
security tracking system based on RFID and zig bee
[12]
33. RFID and GSM based intelligent courier mailbox system34. RFID remote parent care35. RFID assisted navigation systems in public VEHICLES36. Universal remote control with haptic interface37. Construction of microcontroller based touch screen mobile
phone with password protected features38. Modern prepaid energy system39. E-medical emergency for patients40. Smart pad for examination41. E-wallet system for salary payment of employs42. Employee login and logout management system43. High secured data exchange with encryption44. Smart remote control system of high efficiency and
intelligent street lighting45. Economical fully centralized system in building automation
with wireless sensor networks46. Smart remote control system of high efficiency and
intelligent street lighting
47.Green home energy management system through comparison of energy usage between the same kinds of home appliances
48. Live bus stops and modern buses technology49. Automatic parking guidance with prepaid car parking50. Traffic congestion control with automatic signal clearance
[13]
51.
Perpetual and low-cost power meter for monitoring residential and industrial appliances
[14]
52. Smart back pack for visually impaired person 53. Multi-patient health monitoring system for corporate
hospitals54. Design of sphygmus data acquisition platform 55. College bus information to students56. Intelligent street light automation with illumination control57. The remote control of mobile robot based on embedded
technology58. A multipurpose robot for military59. Ultrasonic spectacles and waist-belt for visually impaired
and blind person60. Vehicle accident avoidance with road adverse conditions
monitoring61. A safety system for mine workers in heavy industries
PROJECTS Technology: MATLAB 2016-2017 IEEE PROJECTSS. No PROJECT TITLES1
A Feature-Enriched Completely Blind Image Quality Evaluator
2A No-Reference Texture Regularity Metric Based on Visual Saliency
3A Probabilistic Approach for Color Correction in ImageMosaic king Applications
4Boundary Detection Using Double-Opponency and Spatial Sparseness Constraint
5Combining Left and Right Palm print Images for More Accurate Personal Identification
6Face Recognition across Non-Uniform Motion Blur, Illumination, and Pose
7Face Sketch Synthesis via Sparse Representation-Based Greedy Search
8Fractal Analysis for Reduced Reference Image QualityAssessment
9Image Delousing by Exploring External and Internal Correlations
10Image Super-Resolution Based on Structure-Modulated Sparse Representation
11Multifocal Image Fusion Based on NSCT and Focused Area Detection
12 Pareto-Depth for Multiple-Query Image Retrieval
[15]
13Revealing the Trace of High-Quality JPEG Compression through Quantization Noise Analysis
14 Reversible Image Data Hiding with Contrast Enhancement15
Robust Representation and Recognition of Facial Emotions Using Extreme Sparse Learning
16 Steganography Using Reversible Texture Synthesis17
Variable-Length Signature for Near-Duplicate Image Matching
18A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations
19An Efficient Parallel Approach for Sclera Vein Recognition
20BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification
21Designing an Efficient Image Encryption-Then Compression System via Prediction Error Clustering and Random Permutation
22 Digital Image Sharing by Diverse Image Media23
Dual-Geometric Neighbor Embedding for Image Super Resolution With Sparse Tensor
24Exposing Digital Image Forgeries by Illumination ColorClassification
25 Fingerprint Compression Based on Sparse Representation26
Hyper spectral Image Classification Through Bilayer Graph-Based Learning
27Images as Occlusions of Textures: A Framework for Segmentation
28Low-Rank Neighbor Embedding for Single Image Super-Resolution
29Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
30Phase-Based Binarization of Ancient Document Images: Model and Applications
31Progressive Image Delousing Through Hybrid Graph Laplacian Regularization: A Unified Framework
32Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration
33 A Unified Data Embedding and Scrambling Method
34 Characterless: An Indicator of Text in the WildPROJECTS Technology: VLSI
2016-2017
[16]
IEEE PROJECTS
S. No PROJECT TITLES
01 A Combined SDC-SDF Architecture for Normal I/O Pipelined Radix-2 FFT
02 A High-Performance FIR Filter Architecture for Fixed andReconfigurable Applications
03 A High-Speed FPGA Implementation of an RSD-Based ECC Processor
04 Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic
05 An Accuracy-Adjustment Fixed-Width Booth Multiplier Based on Multilevel Conditional Probability
06An Efficient Constant Multiplier Architecture Based on Vertical-Horizontal Binary Common Sub-expression Elimination Algorithm for Reconfigurable FIR Filter Synthesis
07 An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multi-standard DUC
08Array-Based Approximate Arithmetic Computing: A General Model and Applications to Multiplier and Squarer Design
09 Design of Self-Timed Reconfigurable Controllers for Parallel Synchronization via Wagging
10 Exact and Approximate Algorithms for the Filter DesignOptimization Problem
11 Fault Tolerant Parallel Filters Based on Error Correction Codes
12 Graph-Based Transistor Network Generation Method forSupergate Design
13 High - Throughput Finite Field Multipliers Using Redundant Basis for FPGA and ASIC Implementations
14 Level-Converting Retention Flip-Flop for Reducing Standby Power in Zig Bee SoCs
15Novel Design Algorithm for Low Complexity Programmable FIR Filters Based on Extended Double Base Number System
16 Optimal Factoring of FIR Filters
17 Recursive Approach to the Design of a Parallel Self-Timed Adder
[17]
18 Reliable Low-Power Multiplier Design Using Fixed-Width Replica Redundancy Block
19Reverse Converter Design via Parallel-Prefix Adders: NovelComponents, Methodology, and Implementations
20A New Efficiency-Improvement Low-Ripple Charge-Pump Boost Converter Using Adaptive Slope Generator With Hysteresis Voltage Comparison Techniques
21 A New Parallel VLSI Architecture for Real-time ElectricalCapacitance Tomography
22 A novel approach to realize Built-in-self-test(BIST) enabled UART using VHDL
23 A Novel Area-Efficient VLSI Architecture for RecursionComputation in LTE Turbo Decoders
24A Novel Photosensitive Tunneling Transistor for Near-Infrared Sensing Applications: Design, Modeling, and Simulation
25A Relative Imaging CMOS Image Sensor for High Dynamic Range and High Frame-Rate Machine Vision Imaging Applications
26 A Voltage Monitoring IC With HV Multiplexer and HV Transceiver for Battery Management Systems
27 Accelerating Scalar Conversion for Koblitz CurveCrypto processors on Hardware Platforms
28 Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic
29 All Digital Energy Sensing for Minimum Energy Tracking
30 An Efficient List Decoder Architecture for Polar Codes
HADOOP BIG DATA 2016-2017
PROJECT TITLES
1 A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
2A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment
[18]
3 Adaptive Replication Management in HDFS based on Supervised Learning
4 CaCo: An Efficient Cauchy Coding Approach for Cloud Storage Systems
5 Clustering of Electricity Consumption Behavior Dynamics toward Big Data Applications
6 Dynamic Resource Allocation for Map Reduce with Partitioning Skew
7 FiDoop-DP: Data Partitioning in Frequent Itemset Mining on Hadoop Clusters
8 H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jobs
9 Hadoop Performance Modeling for Job Estimation and Resource Provisioning
10Novel Scheduling Algorithms for Efficient Deployment of MapReduce Applications in Heterogeneous Computing Environments
11 Optimization for Speculative Execution in Big Data Processing Clusters
12 Protection of Big Data Privacy
13 RFHOC: A Random-Forest Approach to Auto-Tuning Hadoop’s Configuration
14 Service Rating Prediction by Exploring Social Mobile Users’ Geographical Locations
15 Wide Area Analytics for Geographically Distributed Datacenters
SPOTFIRE & TABLEAU PROJECTS LIST
Sales analytics Cost analysis of pharma industryTrend analysis of oil and gas industryCouncil of medical and researchFinance score card of sales industrySpares analyticsPart analysisKeyword analysisSummary analysis of automobile industryCost driver analysis Growth trend analysis
[19]
Health care Performance analysis of wells in oil and gas
industry Clinical research on diseases Power Distribution & Energy Utilities Transportation & logistics Product Comparison Analysis Inventory Analysis Top Bottom Analysis of organizationDrill down Analysis
TRAINING COURSES ON DIFFERENT TECHNOLOGIES
CORE - JAVA
Introduction to Java Framework What is Java Architecture of JVM Characteristic of java Technology Importance for Internet
Fundamentals of Java Data Types Operators Control Statements Arrays Loop Variables arguments
OOP with Java Classes and Objects Data Member Method Static Constructor This Keyword Casting Object Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface Using Interface
Packages
[20]
Why Package Understanding Class path Access Modifiers & their Scope
Java Utile Package Date Enumeration Vector Properties Hash table Collection & Iterate interface List and Array List
Exception Handling Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception
I/O Operation in Java Byte Oriented Streams File Handling Reader and Writers
Multithreaded programming Introduction to Multi-Threading Understanding Thread Java Threading Model Thread class & Run able Interface Thread priorities Thread Synchronization Inter thread Communication Preventing Deadlocks
Network programming Introduction to Networking I net Address URL TCP Socket and Server Socket UDP Socket Developing a Chat Application
Abstract Window Toolkit Graphics Color and Font AWT Component/Controls Event handling &Layouts Frames and Menus Images and Animation
Applets
[21]
Applet Basics Applet Life Cycle Applet Skeleton Applet Example
Inner Classes Nested Top Level Classes Member Classes Local Classes Anonymous Classes
Swing Programming Introduction to Swing and MVC
Architecture
Light Weight Component Swing Hierarchy Atomic Component Intermediate Container Top-Level Container Swing related Events
ADVANCED - JAVA
Java Database Connectivity (JDBC) Introduction to JDBC JDBC Architecture Types of JDBC Drivers Establishing a JDBC Connection Using Statement Using Prepared Statement Using Callable Statement Using properties file Scrollable Result Set Editable Result Set Batch Updates New Feature introduced in JDBC 3.0 Fetching Generated Keys for Auto
WEB BASED TECHNOLOGIES Introduction Java Applet Dynamic Vs Static Content Common Gateway Interface (CGI) Java Script
Distributed Application Development Remote Method Invocation (RMI)
[22]
Object Persistence and Serialization Introduction to Distributed Technology RMI Architecture Importance of Naming Services RMI Registry Creating Registry Stub/ Skeleton Classes Developing Simple RMI Application
Java Beans Java Beans Java Beans Architecture Java Beans Characteristics Providing Properties & Methods Event in Java beans JAR File
Java Servlets Servlets Fundamentals /API Servlets as J2EE Web Component Servlets as an improved CGI Processing Html Forms What is Name-Value pair Content Types and MIME What is a Web-Container Servlets Life Cycle HTTP GET &POST Request Methods Configuration of Web Application Web.xml file Servlets URL Pattern Mapping Deployment Web Application in Tomcat & Web logic Servers State Management Cookies Hidden fields Http Session Filter URL Rewriting
Java Server Pages (JSP) Introduction Advantage-of-JSP-over-other Technology JSP Architecture Request/Response Application/Session Page Page Context JSP Basics & Syntax
[23]
JSP Directive Page Directive Include Directive Taglib Directive JSP Action Tags Forward Action Tag Include Action Tag JSP Script Related Tags Script let Tag Expression Tag Declaration Tag Use Bean Tag Set Property Tag Get Property Tag JSP Custom Tag Library Using Different Scope Objects Javax.sql (Extension to JDBC) Data source &Connection Pool
Using JDBC & JNDI
J2EE
J2EE J2EE Application J2EE Architecture Introduction to J2EE Components, Containers &Connectors. Packaging & Deploying J2EE Applications
Extensible Markup Language (XML) Introduction to XML XML DTD XML Schema JAXP- Java API for XML Processing (DOM & SAX)
JNDI Introduction to Naming & Directory Services Using JNDI JDBC Extension Review of JDBC
Enterprise Java Beans Introduction to Server-Side Components
[24]
EJB Architecture Java RMI Over IIOP
Types of EJB Session Beans Entity Beans Message Driven Beans
EJB Container Services Transactions Security Life Cycle Management State & Persistence of EJB Session Beans Designing & Developing Stateless Session Beans Designing & Developing State full Session Beans Deploying Session Beans Writing Standalone & Web Clients
Entity Beans Designing Persistent Components Difference Between “Create” of Session And Entity Beans Finding Entity Beans Bean vs. Container Managed Persistence Managed Persistence (CMP) Container Managed Fields Local Interfaces Mapping Relationship Between Entity Beans Mapping Relationships Between Database and Entity Beans Deployment Descriptor CMP EJB QL for Writing Custom Finders in CMP Invoking Entity Bean from Session Beans
JAVA Message Services (JMS) Introduction to Messaging Systems Benefits of Using JMS Pub / Sub Model Developing Message Driven Beans (MDB) Message Driven Beans & Transaction
FRAMEWORKS AND ADVANCED CONCEPTS
[25]
Struts and MVC Architecture MVC Architecture MVC Model 1 and 2 in web Application Introduction to Struts Framework Configuring Struts Application Struts Configuration File Strut Controller Components Struts Model Components Struts View Components Action Forms Action Messages Action Errors JSP Custom Tag Libraries Tag Library Overview Tag Libraries in Struts Using Java Beans with Struts Tags Struts HTML Tags Exception Handling Action Error & Action Errors Adding Error Handling Action Form Validate Method Handling exceptions Declarative Exception Handling Struts Validation Mask Range
Spring What is spring Framework Inversion of Control Dependency Injection Bean Factory Developing First Spring Application Spring Container Built-in Bean Factories Application Context Bean Lifecycle in Container Spring Events Spring AOP Introduction to AOP Role of AOP in Spring AOP Advice AOP Point cuts Spring AOP Introductions Proxy Factory Bean Spring Data Access
[26]
Spring O-R Mapping Spring Transaction Management Spring Web MVC Framework Hibernate O-R Mapping Manipulating and Querying Hibernate Query Language Criteria Queries
Hibernate Introduction to Hibernate Hibernate Configuration Hibernate Concepts Native SQL Transactions and Concurrency
AJAX Introduction AJAX AJAX Internals XML Http Request Object AJAX UI Tags Div Tag Submit Tag Anchor Tag Tabbed Panel Tag Auto Completer Tag
JSF Introduction to JSF Overview on JSF Architecture JSF Request Processing Life Cycle Using JSF tag libraries Core tags and Html Tags Page Navigation
Handling Events Performing Validation Navigating between Pages
Web Services Introduction to Web Services SOAP request and response UDDI Services WSDL Examples on Web Services
JQUERY
INTRODUCTION
What is J Query?
[27]
Pre Requirements Download & install J Query Creating first page Tools Required HTML & CSS Overview
EVENTS
Bind & Unbind Helper Functions Event Object Other Event FunctionsMANIPULATING PAGE CONTENT
Creating New Content Manipulating Attributes Inserting Content Wrapping, Replacing, Removing Content Working with CSSJQUERY UI LIBRARY
Overview Widgets Effects & Theme Installations ANIMATION AND EFFECTS Showing & Hiding Elements Fading Elements Sliding Elements Custom Animations
TOOLS Log4j ANT CVSNT JASPER REPORTS JUNIT NSIS
DESIGN – PATTERNS
[28]
Standalone Application level
Singleton Java Class Synchronized Singleton Java Class Factory Method Factory Abstract Factory DTO/VO Class Template Method Fast line Reader Adaptor Class Prototype Builder Inversion Of ControlWeb Application Level
MVC1 &MVC2 Front Controller Abstract Controller View Helper Composite View Intercepting Filter
Enterprise Application Level
DAO DAO Factory Business Delegate Service Locator Session Façade Message Façade
ANDROID
Chapter 1: Getting Started with Android Programming What is Android? Android Versions Features of Android Architecture of Android Android Devices in the Market The Android Market Obtaining the Required Tools Eclipse
[29]
Android SDK Android Development Tools (ADT) Creating Android Virtual Devices (AVDs) Creating Your First Android Application Anatomy of an Android ApplicationChapter 2: Activities and Intents
Understanding Activities Applying Styles and Themes to Activity Hiding the Activity Title Displaying a Dialog Window Displaying a Progress Dialog Linking Activities Using intents Resolving Intent Filter Collision Returning Results from an Intent Passing Data Using an Intent Object Calling Built-in Applications Using intents Understanding the Intent Object Using Intent Filters Adding Categories Displaying notificationsChapter 3: Getting to know the Android user interface
Understanding the Components of a Screen Views and View Groups Linear Layout Absolute Layout Table Layout Relative Layout Frame Layout Scroll View Adapting to Display Orientation Anchoring Views Resizing and Repositioning Managing Changes to Screen Orientation Persisting State Information during Changes
in Configuration Detecting Orientation Changes Controlling the Orientation of the Activity Creating the User interface Programmatically Listening for UI notifications Overriding Methods Defined in an Activity Registering Events for Views
[30]
Chapter 4: Designing your user interface using views
Basic Views Text View ,Button, Image Button, Edit Text,
Check Box, Toggle Button, Radio Button, and Radio Group Views
Progress Bar View Auto Complete Text View Picker Views Time Picker View Displaying the Time Picker in a Dialog Window Date Picker View Displaying the Date Picker View in a Dialog
Window List Views List View Customizing the List View Using the Spinner ViewChapter 5: Displaying pictures and menus with views
Using image Views to Display Pictures Gallery and Image View Views Image Switcher Grid View Using Menus with Views Creating the Helper Methods Options Menu Context Menu Some Additional Views Analog Clock and Digital Clock ViewsChapter 6: Data Persistence
Saving and Loading User Preferences Using get Shared Preferences() Using get Preferences() Persisting Data to Files Saving to Internal Storage Saving to External Storage (SD Card) Choosing the Best Storage Option Using Static Resources Creating and Using Databases Creating the DB Adapter Helper Class Using the Database Programmatically
[31]
Adding Contacts Retrieving All the Contacts Retrieving a Single Contact Updating a Contact Deleting a Contact Upgrading the Database Pre-Creating the Database Bundling the Database with an ApplicationChapter 7: Content Providers
Sharing Data in Android Using a Content Provider Predefined Query String Constants Contents Projections Filtering Sorting Creating Your Own Content Providers Using the Content ProviderChapter 8: Messaging and networking
SMS Messaging Sending SMS Messages Programmatically Getting Feedback After Sending the Message Sending SMS Messages Using Intent Receiving SMS Messages Updating an Activity from a Broadcast
Receiver Invoking an Activity from a Broadcast
Receiver Caveats and Warnings Sending e-Mail Networking Downloading Binary Data Downloading Text Files Accessing Web Services Performing Asynchronous CallsChapter 9: Location-Based Services
Displaying Maps Creating the Project Obtaining the Maps API Key Displaying the Map Displaying the Zoom Control Changing Views
[32]
Navigating to a Specific Location Adding Markers Getting the Location That Was Touched Geo coding and Reverse Geo coding Getting Location Data Monitoring a LocationChapter 10: Developing Android Services
Creating Your Own Services Performing Long-Running Tasks in a Service Performing Repeated Tasks in a Service Executing Asynchronous Tasks on Separate Threads Using Intent Service Communicating between a Service and an
Activity Binding Activities to Services
Chapter 11: Publishing Android Applications
Preparing for Publishing Versioning Digitally Signing Your Android Applications Deploying APK Files Using the adb exe Tool Using a Web Server Publishing on the Android Market Creating a Developer Profile Submitting Your AppsChapter 12: Broadcast Receiver
Chapter 13: Notifications
Chapter 14: Android (Advanced)
Graphics Design Camera Handling Map Handling Video Handling Bluetooth Handlin
[33]
C#.NET 6.0
INTRODUCTION TO .NET What is .NET Purpose of .NET
DIFFERENCE BETWEEN .NET 3.0, 3.5, 4.0, 4.5 & 4.6INTRODUCTION TO .NET FRAMEWORK
What is .Net Framework CLR –what is Common Language Runtime .Net Class Library User and Program Interface Different Types of Application Working with Windows Application Working with Console Application Diff between Win forms and Console App ADVANCE FEATURES OF .NET FRAME
WORK 3.5,4.0 &4.5 What is a Service? Windows Communication Foundation
(WCF) Architecture of WCF Working with Different Contracts Difference between Web Services and
WCF Windows Presentation Foundation (WPF) Architecture of WPF Working with Different Layout Introduction to Windows Card Spaces
(WCS) Introduction to Windows Work Flow
Foundation (WFF)
INTRODUCTION TO C# What is C# Purpose of C# Language and Syntax
FUNDAMENTALS OF C# Data Types Operators Control Statements Arrays Loop Variables arguments
[34]
COLLECTIONSWhy Collections?
Stack Queue Array List Sorted List Hash Table
OBJECT ORIENTED FEATURES OF C# Classes and Objects Data Member Access Modifiers & their Scope Method Static Constructor This Keyword Garbage Collection Encapsulation Inheritance Polymorphism Method Overloading Method overriding Understanding Interface Using Interface Partial Class
FILE STREAMS Using File Classes File File Info Directory Directory Info Stream Writer Stream Reader Text Writer Text Reader
ARCHITECTURE OF WINDOWS FORMS Control Class Rich Control Class Scrollable Control Class Form Class
WINDOWS FORM CONTROL REFERENCE Link Label Panel Group Box Data Picker Progress Bar
[35]
Timer Login Grid view Masked Textbox Split Container Flow Layout Panel Folder Browser
VALIDATING CONTROLS Error Provider
DIALOG CONTROLS Color Dialog Save File Dialog Font File Dialog Open Dialog Folder Dialog
MENU CONTROLS Tool strip Status Strip Menu Strip Context Menu Strip Tool Strip Manager
EXCEPTION HANDLING Importance of Exception Handling Exception types Using Try and Catch Throw, throws, finally Writing user defined exception In-Built Exception Handling
NETWORK PROGRAMMING Introduction to Networking Ip net Address URL TCP Socket and Server Socket UDP Socket
XML Introduction User Input How to create an XML file Use of Ad rotator control Access XML file usingADO.Net Read XML file Write XML file
DATA ACCESS USING ADO.NET Over view of ADO.Net Life Cycle of ADO.Net Difference between ADO and ADO.Net
[36]
ADO.NET ARCHITECTURE AND OBJECT MODEL
Introduction to Dataset Introduction to Data adapter Manipulating database using Dataset Manipulating Oracle database using
Dataset Manipulating SQL Server database using
Dataset Manipulating of Remote database Manipulating XML Files using Data Access
Controls Executing Command OLEDB AND SQL CLIENT Providers Accessing Stored Procedures Accessing Stored Procedures with
Parameters Filter Data Using Database Handling Database errors
XML INTRODUCTION Role of XML in .Net XML Table Manipulation Insert Update Delete
ASSEMBLES Name Spaces Creating Private Assembly Creating Shared Assembly Strong Key Public Key Token Versioning Configuration Files Satellite Assemblies
COM INTEROPERABILITY Creating COM Components Runtime Callable Wrapper Com Callable Wrapper Calling COM Components Using C# Assessing Assemblies through COM
MANIPULATING THE FILES & REGISTRY Managing the Files Creating Directory Reading and Writing of Files File Security
[37]
INTRODUCTION TO GDI+ Creating Graphics Objects with GDI+
CREATING CONTROLS Use Controls Types of Controls Adding Properties Adding Events User Windows in Control Form Host a windows control inside Microsoft Internet
Explorer MULTI THREADING
System Threading Thread Synchronization Thread Lifecycle
GLOBALIZATION Globalization and Localization of the UI
SECURITY Code Level Security
CRYPTOGRAPHY Cryptography Services Encrypt and Decrypt a file Generate and compare Hash value Cryptography primitive
WINDOW SERVICEWhat is a Service?Diff between Web Service and Window Service
Designing Windows services Installing and restring windows services Binding windows service to C#
application About SCM
DEPLOYMENT Planning the deployment Web based deployment, net-work based deployment Creating a Setup, Register Components
and Assemblies Install-Time compilation Adding Assemblies to the GAC Security Policy Verifications
REPORTS CRYSTAL REPORT Crystal Report Viewer Crystal Report Source
[38]
SERIALIZATION What is Serialization? What is De-Serialization? Using Binary formatter Using SOAP Formatter
REMOTING Introduction to Remoting Passing Objects to Remote Method
GENERICS Generics Collection Classes Create Customer Generic Class Generic Delegates
MEMORY MANAGEMENT & POINTER Memory Management under the hood Freezing Unmanaged Resources Unsafe Code
DATA CONTROLS Data Grid View Dataset Binding Source Binding Navigator
CONTAINER CONTROLS Panel Group Box Flow Layout Control Table Layout Control Tab Control Split Container
WPF Introduction What is WPF Goals, Benefits & Drawbacks First WPF Application Types of WPF Application (Windows
Based and Browser Based) XAML
Introduction to XAML XAML – Extensible Application Markup
Language. Content Models
WORKING WITH CONTROLS Menus Label Button Checkbox
[39]
Radio Button Repeat Button Toggle Button ToolTip Expander Group Box Textbox Combo Box List Box Menu Status Bar Tab Control Toolbar Tree View Notify Icon Menus and Toolbars
Layout Border Canvas Dock Panel Grid Stack Panel Wrap Panel
ASP.NET 4.5, 4.6
INTRODUCTION TO WEB APPLICATIONS Overview of ASP Overview of ASP.Net Page Code In-Line Model Code Behind Model
HTML Introduction to .Net Frame Work Working with HTML Controls Overview of Attributes.
WHAT IS DOTNET FRAME WORK Common Language Runtime (CLR) .Net Class Framework–User and Program
Interface. Net Common Type System(CTS) Common Language Specification (CLS). MSIL(Microsoft Intermediate Language)
INTRODUCTION TO ASP.NET What is ASP.Net? Complete Life Cycle of Asp.Net Page. Difference between ASP and ASP.Net.
[40]
Execution Process of .Net Application. ADVANCE FEATURES OF .NET FRAME WORK
Windows Communication Foundation (WCF)
Windows Presentation Foundation (WPF) Windows Card Spaces (WCS) Windows Work Flow Foundation (WFF) Client Server Architecture 3-Tier/N-Tier Architecture
INTRODUCTION TO VB.NET AND C#.NET LANGUAGE
Variables declaration Encapsulation Abstraction Inheritance Polymorphism Delegates Exception Handling
ASP.NET WEB FORMS Introduction to Web Forms Working with Server Controls Rich Controls Customization
ASP.NET WEB CONTROLS HTML Server Controls Web Server Controls Data Bound Controls. Grid View Data List Repeater Details View Forms View List View
VALIDATION CONTROLS Required Field Validate Compare Validate Regular Expression Validate Range Validate Custom Validate Validation Summary
WORKING WITH MASTER PAGE Creation of Master Page. Creation of Content Page. Working with Content Placeholder
[41]
Creation of Main Page Including Navigation Controls.
DATA ACCESS USING ADO.NET Overview of ADO.NET ADO.NET architecture and object model Introduction to Dataset Difference between Dataset and Record
set Data binding Retrieving data using OLEDB and
SQLCLIENT Providers Introduction to Data adapter Manipulating databases using Dataset Manipulating of Oracle database using
Dataset Manipulating of SQL Server database
using Dataset Manipulation of Remote Access Database Manipulation using XML datasheet Using Data access controls Executing Command Populate Dataset Filter Data
WORKING WITH BUSINESS OBJECTSNAMESPACE WITH DLL
Creating DLL Calling DLL Database Connectivity Using DLL
COM INTEROPERABILITY RCW CCW
CONFIGURATION Configuration overview Overview of WEB. Config file Configuration file format CONFIGURATION FILES Overview of Machine. Config file Working with WEB. Config File Retrieving configuration Provide connection string Difference between WEB. Config file and
Machine. Config file XML WEB SERVICES
Create Web Services
[42]
Consuming Web Services. WSDL (metadata generation).
INTRODUCTION TO SOAP, UDDI, WSDLWEB FORMS USER CONTROL
Introduction to User Control (.ascx) Creating User Control for Asp.Net page Customizing ASP.Net application Using user control-Assemblies
ASP.NET WEB APPLICATION Application overview Using the Global.asax file Managing application state Event Handlers
CACHE FEATURES What is Caching? Use of Cache. Caching overview Data caching Page output caching Fragment caching
DEBUGGING The SDK Debugger
SECURITY OVERVIEW Authentication and Authorization Windows based Authentication Forms based Authentication Authorizing users and roles Users account Impersonation Security and Web Services Passport Authentication
GLOBALIZATION User encodings Setting current culture and region Handling multiple encoding Globalization and Localization of the UI Changing culture by using Config.file
TRACING Tracing overview Trace logging to page output Application level traces logging Writing Trace Messages.
DEPLOYMENT Deploying Applications Using the Process Models Types of Deployment.
[43]
IIS (Internet Information Server).Introduction to IIS.
Different Version of IIS Deploy Asp.Net Application using IIS.
STATE MANAGEMENT What is State Management? Type of Techniques used. Page Life Cycle without state. Page Life Cycle with State.
STATE TECHNIQUES Sessions Cookies View State Query String Application. Hidden Fields. Diff between session and Application Choosing best State Management
WITH DATASOURCES Sql Data Source Access Data Source Object Data Source XML Data Source Sitemap Data Source Linq Data Source Entity Data Source
WCF
Introduction Architecture of WCF Evolution of WCF Evolution of Service Oriented Architecture
(SOA) What is WCF
Developing WCF Service Application and Client
Hosting WCF Service in IIS/ASP.NET Development Server
Using a Service in the client application Contracts
Service Contract. Operation Contract. Data Contract.
Endpoints in configuration file
[44]
What are End points? ABC - Address, Binding & Contract. Importance of I Meta data Exchange
Contract / Endpoint. Configuring service behavior in
configuration file WCF Service Configuration Editor
AJAX
Introduction to AJAX
What is AJAX? Ajax rich clients in the real world Ajax advantages and disadvantages The purpose of AJAX Traditional web application An AJAX web application Alternatives to Ajax AJAX Components key elements of Ajax
Ajax Controls
Script Manager Script Manager Proxy Update Panel Update Progress Control Timer Control
Ajax Extension Control Tool Kit
SILVERLIGHT
INTRODUCTION TO SILVERLIGHT What is Silver light? Tools for creating Silver light Applications Difference in versions Different types of Applications in Silver
light ARCHITECTURE OF SILVERLIGHT
HOW IT IS USED WITH .NET
[45]
DEVELOPING FIRST SILVERLIGHT APPLICATION
SILVERLIGHT AND XAML
SILVERLIGHT UI CONTROLS Layout Management and Grouping
Controls Form Controls Data Integration and Data Manipulation
Controls Functional Controls Navigation
CLOUD COMPUTING
OVERVIEW D-COMPUTING Trends of computing Introduction to distributed computing Next big thing: cloud computing
INTRODUCTION What’s cloud computing Properties & Characteristics Service models Deployment models
IAAS Introduction to IAAS
PAAS Introduction to PAAS Cloud platform & Management
Computation Storage
Case studies SAAS
Introduction to SAAS Web services
CLOUD ISSUES AND CHALLENGES
[46]
Introduction
Introduction to business analytical tools What is spot fire
Data access
Interactive visualizations Underlying data tables(s) Basic layout Open form files Import settings Open from databases Library
Create visualizations
Bar chart & properties Histogram & trellis Line chart & dates Graphical tables Lines as patterns Combination charts Scatter plots & coloring Pie charts & size scale Tables and display value
Interactivity
Tooltip display
[47]
SPOTFIRE
How to mark, drill down Details on demand Multiple marking Details visualization Filter types , hide filters Marking to filter data Filtering scheme Ways to limit data
Save & export
Save linked to source data Save data embedded Save analysis as a file Save as a library item Reload linked data Replace data table Export data Export images
Add data Calculated columns Binned columns Hierarchies Insert columns Insert rows Multiple data tables Manage relations Transformations
Capturing the analysis
Add bookmark Apply bookmark Special bookmark
Other visualizations Tree map Box plot Map chart Heat map
Advanced concepts Custom expressions K-means clustering Information model Information designer Information links
[48]
Administration
Architecture
Mange services
Schedule updates
Interdiction and overview
Why tableau? Why visualization? Level setting – terminology Getting started – creating some powerful
visualization quickly Things you should known about tableau
Getting started
Connecting to data and introduction to data source concepts of working with data files versus database servers
Understanding the tableau workspace Dimensions and measures Using show me! Tour of shelves (how shelves and marks
work) Building basic views Help menu and samples Shaving and sharing your work
Concepts and options when connecting to data
Overview of other connection options
[49]
TABLEAU
Joining multiple tables Data blending copy and paste data
extracts Custom SQL Publishing and Re-using data connections Understand how to deal with data
changes in your data source such as field addition, deletion or name change
Re-using and sharing data connections – the concept of meta data
Working with multiple connections in the same workbook
Analysis
Creating views Marks Size and transparency Highlighting Working with dates Date aggregations and date parts Discrete versus continuous Dual axis / multiple measures Combo charts with different marks types
o Geographic mapo Page trails o Heat map o Density charto Scatter plotso Pie charts and bar charts o Small multiples o Working with aggregate versus
disaggregate data
Analyzing
o Sorting & grouping o Aliases o Filtering and quick filterso Cross – tabs (pivot tables ) totals
and subtotalso Drilling and drill through
[50]
o Aggregation and disaggregation percent of total
o Working with statistics and trend lines
Getting started with calculated fields
Working with string functions Basic arithmetic calculations Date math Working with totals Custom aggregations Logic statements
Formatting
Options in formatting your visualization Working with labels and annotations Effective use of titles and captions Introduction to visual vest practices
Building interactive dashboards
Combining multiple visualizations into a dashboard
Making your worksheet interactive by using actions and filters
An introduction to best practices in visualization
Sharing workbooks
Publish to reader Packaged workbooks Publish to office Publish to pdf Publish to tableau server and sharing
over the web
Putting it all together
Scenario-based review exercises Best practices
[51]
Where to get further assistance
The help file / product manual Knowledge base Forums Whitepapers & books Further training offerings & professional
services technical support
INTRODUCTION TO SCRIPTING & MARKUP LANGUAGE
Clint side scripting Server side scripting
IMPORTANCE OF PHP:
What, where and why PHP?
HTML:
Introduction to HTML Structure of HTML document What is tag & Attributes? Basic HTML Tags Working with Tables Working with from elements Working with images Working with list
Order list UN order list
Working with frames Working with CSS
[52]
PHP
Inline Internal External
Difference b/w HTML / XHTML About W3c Org/ validation
JAVA SCRIPTS:
Introduction What are client side scripting languages? Data types Operators How to embedded J.S with HTML code Functions:
Predefined functions User defined functions
Control statements If Nested if
Loops Break & continues statements
Math objects Array objects Data objects
Introduction to DOM DOM objects Navigator Window Document History …… etc
EVENT HANDLING
On load On unload On click On mouse over On focus On blur On submit… etc
[53]
FORM VALIDATIONS MY SQL:
What are data bases, DBMS, RDBMS? Data types in my SQL DDL, DML, TCC, statements Over view of PHP MY admin tool Storage engine (table types) Constraints Views, joins, functions Sub queries invent Introduction of working With SQL you tool
PHP:
Server side technologies
BASIC PHP:
PHP installation Apache & PHP Configuration PHP scripting fundamentals Variables operators & expressions Conditionals & looping constructs User defined functions In-Buit functions
(Strings, Arrays & Date) Error handling & Reporting
PHP WITH OOPS:
Over view to OOPS PHP4 OOPS Vs PHP5 OOPS Encapsulation Polymorphism Inheritance Abstract methods & abstract classes
[54]
Interface & implementation Static methods & static functions
ADVANCE PHP:
Over view of directory & files processing Functions of file component Form processing HTTP headers & Downloads Files uploads & downloads Intro to mail processing Session & cookie management
EXTRAS:
Introduction to AJAX AJAX with real time examples Open source tool
(Joomla / OS commerce / drupes)
Project explanation (Development to
deployment)
HADOOP
[55]
What is Big Data? What is Hadoop? Relation between Big Data and Hadoop. What is the need of going ahead with Hadoop? Scenarios to apt Hadoop technology in real time
projects Challenges with big data
Storage Processing
How Hadoop is addressing big data changes Comparison with other technologies
RDBMS Data Warehouse Tera Data
Different components of Hadoop echo system Storage components Processing components
HDFS {HADOOP DISTRIBUTED FILE SYSTEM}
What is a cluster Environment? Cluster Vs Hadoop cluster. Significance of HDFS in Hadoop Features of HDFS Storage aspects of HDFS
Block How to configure block size Default Vs configurable Block
size Why HDFS Block size so large? Design principles of Block size
HDFS Architecture – 5 Daemons of Hadoop Name node and its functionality Data node and its functionality Job tracker and its functionality Task tracker and its functionality Secondary name node and its
functionality
[56]
Replication in Hadoop – fail over mechanism Data storage in data nodes Fail over mechanism in Hadoop –
replication Replication configuration Custom replication Design constraints with
replication factor Accessing HDFS
CLI {command Line Interface} and HDFS commands
Java Based ApproachHadoop Archives Map Reduce
Why map reduce is essential in Hadoop? Processing daemons of Hadoop
Job tracker Roles of job tracker Drawbacks w.r.to job tracker failure in Hadoop
cluster How to configure job tracker in Hadoop cluster Task tracker Roles of task tracker Drawbacks w.r.to job tracker failure in Hadoop
cluster Input split Input split Need of input split in map reduce? Input split size Input split size Vs Block size Input split Vs Mappers Map Reduce life cycle Communication mechanism of job tracker & task
tracker Input format class Record reader class Success case scenarios Failure case scenarios Retry mechanism in map reduce Map reduce programming model
[57]
Different phases of map reduce algorithm Different data types in map reduce Primitive data types Vs map reduce data types How to write a basic map reduce program Driver code Mapper code Reducer code Driver code Importance of driver code in map reduce
program How to identify the driver code in map reduce
program Different sections of driver code Mapper code Importance of Mapper phase in map reduce How to write a Mapper class? Methods in Mapper class Reducer code Importance of reducer phase in map reduce How to write a reducer class? Methods in reducer class
IDENTITY MAPPER & IDENTITY REDUCER Input format’s in map reduce Text input format Key value text input format N Line text input format DB text input format Sequence file text input format How to use the specific text input format in map
reduce Output formats in map reduce Text output format Key value output format N Line text output format DB text output format Sequence file text output format How to use the specific text output format in
map reduce Map reduce API {application Programming
Interface}
[58]
New API Deprecated API Combiner in map reduce Is combiner mandate in map reduce How to use the combiner class in map reduce Performance tradeoffs w.r.to combiner Practitioner in map reduce Importance of practitioner class in map reduce How to use the practitioner class in map reduce Hash practitioner functionality How to write a custom practitioner Compression Techniques in Map reduce Importance of compression in map reduce What is CODEC? Compression types G zip codec B zip codec L ZO codec Snap codec Configurations w.r.to compression techniques How to customize the compression per one job
Vs the entire job. Joins – in map reduce Map side join Reduce side join
Performance trade off Distributed cache
How to debug map reduce jobs in local and pseudo cluster mode.
[59]
Introduction to map reduce streamingData localization in map reduce Secondary sorting using map reduce
Apache PIG
Introduction to apache pig Map reduce Vs apache pig SQL Vs apache pig Different data types in pig Modes of execution in pig
Local mode Map reduces or distributed mode
execution mechanism Grunt shell Script
Embedded Transformations in pig How to write a simple pig script How to develop the complex pig script Bags, topples and fields in pig UDFs in Pig Need of using UDFs in Pig How to use UDFs REGESTER key word in PIG When to use map reduce & Apache PIG in REAL time
projects
HIVE
Hive introduction Need of apache hive in Hadoop Hive architecture
Driver Compiler Executor (semantic analyzer)
Meta store in hive Impotence of hive Metastore Embedded metastore configuration External metastore configuration
[60]
Communication mechanism with metastore Hive integration with Hadoop Hive query language (hive SQL) Configuring hive with my SQL metastore SQL vs. hive QL Data slicing mechanism
Partitions in hive Buckets in hive Partitioning vs. bucketing Real time use cases
Collection data types in hive Array Struct Map
User defended functions (UDFs) In HIVE UDFS UDAFS UDTFS Need of UDFS in hive
Hive Serializer / Deserializer – Ser De HIVE – HBASE integration
SQOOP
Introduction to sqoop My SQL client and server installation How to connect to relational databases using sqoop Different Sqoop commands
Different flavors of imports Export Hive- imports
HBASE
Hbase introduction
[61]
HDFS vs. HBASE Hbase use cases Hbase basics
Column families Scans
Hbase architecture Clients
Rest Thrift Java based Avro
Map reduce integration Map reduce over hbase Hbase admin
Schema definition Basic CRUD operations
FLUME
Flume introduction Flume architecture Flume master flume collector and flume agent Flume configuration Real time use case using apache flume
Oozie
[62]
Oozie introduction Oozie architecture Oozie configuration files Oozie job submission
Work flow .xml Coordinator.xml Job Coordinator properties
YARN (Yet another Resource Negotiator) – Next Gen. Map Reduce
What is YARN? YARN Architecture
Resource manger Application master Node manger
When should we go ahead with YARN? Classic map reduce Vs YARN map reduce Different configuration files for YARN
Impala
What is impala? How can we use impala for query processing? When should we go ahead with impala? HIVE Vs impala REAL TIME use with impala
Mongo DB (As part of No SQL Databases)
Need of No SQL Databases Relational Vs Non- relational databases Introduction to mongo DB Features of mongo DB Mongo DB Basic operations
Mahout (As a part of BIGDATA ANALYTICS)
Introduction to machine learning (ML) languages
[63]
Types of machine learning Introduction to apache MAHOUT Categories of mahout algorithms Real time use case using classifier algorithm of mahout
– naive’s bays
Introduction to HADOOP ‘R’Introduction to SCALA Hadoop Administration
Hadoop single node cluster set up (Hands on installation on laptops) Operating system installation JDK installation SSH configuration Dedicated Group & User creation Hadoop installation Different configuration files setting Name node format Starting the Hadoop daemons
Multi node Hadoop cluster set up (Hands on installation on laptops) Network related settings Hosts configuration Password less SSH communication Hadoop installation Configuration files setting Name node format Starting the Hadoop daemons
PIG Local mode > Clustered mode > Basher
file configuration SQOOP Sqoop installation with MYSQL client HAVE installation (Hands on Installation on laptops) Local mode >clustered mode Hbase installation (Hands on Installation on laptops) Local mode >clustered mode OOZIE installation (hands on installation on laptops)
[64]
Mongo DB installation (hands on installation on laptops)
Commissioning of nodes in Hadoop cluster Decommissioning of nodes form Hadoop Cluster
FUNCTIONLA MODULES:
SAP – FI/CO
SAP –HR
SAP –SD
TECHNICAL MODULES
SAP – BASIS
SAP -BW/BI
SAP –BO
SAP-HANA
SAP – ABAP/4
SAP-BASIS INTRODUCTION
WHAT IS SAP? WHY SAP?
[65]
SAP
FEATURES OF SAPHW & SW Introduction
HW Introduction Architecture of different HW devices SW Introduction Language and software development Introduction to OS Types Of OS
DATABASE CONCEPTS Introduction Database architecture and concepts Types of database In depth discussion of oracle database
and architectureERP INTRODUCTION
ERP and its background Types of ERPs Evaluation of SAP Different versions of SAP New dimensional of oracle database and
architecture Modules of each SAP document
SAP NEW WEAVER ARCHITECTURE
Introduction Components Core architecture Application server, Central instance,
Dialogue instance ABAP and java stacks Message servers, Dispatchers WPs and the types System landscape
SAP COMPONENTS
Core component and functionality New dimensional components and basis
introduction of these functionality
[66]
Modules of SAP components Roles in SAP application Basis introduction to ABAP and T-Codes Basis introduction to SAP technical
workflowINSTALLATION
Layers of SAP application Pre-requisites for SAP installation SAP installation DB installation Application server installation Front end installation Start and Stop SAP Post installation Hosts and services files Directory structure of SAP
CLIENT ADMINISTRATION Client Concept Create Clients Pre-requisites for client copy SCCL and Client export/import, copy logs
and monitoring of client copyTMS, SUPPORT PACKS AND ADD-ONS
TMS introduction & Configuration TMS functionality and methods to use Support packs and installation ABAP and Java patching Kernel upgrade/patching
GENERAL ADMINISTRATION Daily, weekly, monthly monitoring the
system health T-Codes related to system monitoring Background jobs and monitoring Spool architecture and administration Language installation Oss notes and SAP service market place SAP NET uses Performance tuning methods and
implantation
[67]
DATABASE ADMINSTRATION Oracle DB Concepts Monitoring table spaces SAPDBA/BR Tools DB Activities and T-Codes
SAP R/3 ARCHITECTURE Distributed Presentation 2-Tier Configuration 3-Tier Configuration
SYSTEM LANDSCAPE AND FLOW Single System Landscape Two System Landscape Three System Landscape Multi System Landscape
GUI ADMINISTRATOR Optimization Security
OPERATION MODES Manual Switching of OP Modes Exceptional Mode Monitoring
PROFILE MAINTENANCE & PARAMETER SETTING
System Profile Transport Profile Client Profile Authorization Profile
USER ADMINISTRATION Creating and Maintaining Master Records,
Architecture Logon and Password Security, Protecting
Special Users Creating and Maintaining Single and Mass
Users and User Groups Copying, Deleting, Locking/Unlocking Users
[68]
Explanation of Terms Object Class, Authorization Object, Authorization, Profile
Create/Maintaining Authorization/Profile Manually
Create/Maintaining Roles/Generating Profiles by using PFCG
TRANSPORT MANAGEMENT SYSTEM TMS Terminology and Concepts Configuring TMS and Checking Transport
Directory Configuring Transport Domain, Domain
Controller and Group Configuring Virtual SAP System and
Displaying Configuration Including SAP systems in the Transport
Domain Creating Consolidation and Delivery Routes Maintaining SAP Systems without Common
Transport Directory Configuring External Systems Locking and Unlocking TMS for a SAP
System Deleting SAP System from the Transport
Domain Deleting TMS Configuration
CHANGE AND TRANSPORT SYSTEM Releasing and Transporting Change
Request and Tasks Customizing, Workbench, Transport
Organizer Importing Change Requests
SPOOL ADMINISTRATION Print related Terminology in OS/SAP Level Setting Local, Remote and Front-End
Printing Logical and Real Spool Server Managing Spool Requests using Output
Controller Connecting Output Devices to Window
System SAPLPD, Tem SE, Authorization
[69]
PATCH AND KERNEL ADMINISTRATION Checking the Patch, Spam, Kernel Levels Downloading Installing Patches, Kernel Applying at OS Level, SAPNET, Front-End Troubleshooting Various Issues CCMS Introduction to CCMS CCMS Monitors Alert Monitors Analyzing Alerts and Performance Tuning
BACKGROUND PROCESSING Background Dialogs Concept Defining Jobs Analyzing Jobs Maintenance Jobs
PERFORMANCE TUNING OS, H/W Performance Considerations Memory, Management R/3 Buffers, Page Buffers, Extended and
Heap Memory, PRIV ModeSYSTEM MONITORING
Daily, Weekly, Monthly Tasks SAP NETWEAVER introduction SOLUTION MANAGER User Administration
[70]