Professional Documents
Culture Documents
Software Project Titles 2013-14, IEEE
Software Project Titles 2013-14, IEEE
NCCT
SOFTWARE PROJECTS
IEEE 2013-14
JAVA * J2EE * J2ME ASP.NET * VB.NET * C#.NET MATLAB * NS2 * PHP ANDROID * CLOUDSIM
109, 2nd Floor, Bombay Flats Nungambakkam High Road, Nungambakkam Chennai 600 034
Near Ganpat / Taj Hotel, Above IOB, Next to ICICI Bank
PROJECTS SUPPORTS
PROJECT DELIVERABLES @ NCCT
PROJECT ABSTRACT PROJECT IEEE BASE PAPER / REFERENCE PAPER PROJECT PRESENTATION IN PPT FORMAT PROJECT REVIEW ASSISTANCE FOR VIVA PROJECT DIAGRAMS PROJECT SOURCE CODE PROJECT REPORT PROJECT SCREEN SHOTS PROJECT DEMO PROJECT EXPLANATION PROJECT ACCEPTANCE LETTER PROJECT COMPLETION CERTIFICATE OTHER REQUIRED LETTERS
For More Titles / Abstracts & PDF Papers, Latest Details and Downloads, Visit www.ncct.in, www.ncctieeeprojects.blogspot.in For Latest Updates, Job Fairs, Workshop, Placement Drive Information, Visit 044-28235816, 98411 93224, 89393 www.facebook.com/NCCTIEEEprojects
NCCT Smarter Way to do your Projects FIND ,THE PROJECT DETAILS @ PAGE NO
PROJECTS SUPPORTS - 02 SOFTWARE PROJECT DOMAINS OFFERED - 04 SOFTWARE PROJECT SOLUTIONS FOR - 04 JAVA IEEE PROJECTS @ NCCT - 05 DOTNET IEEE PROJECTS @ NCCT - 24 NS-2, NETWORK SIMULATOR PROJECT TITLES - 41 ANDROID PROJECT TITLES - 44 MATLAB PROJECT TITLES - 46 JAVA PROJECTS 2013-14, NON IEEE PROJECTS - 49 ASP.NET PROJECTS 2013, NON IEEE PROJECTS - 61 VB.NET PROJECTS, NON IEEE PROJECTS - 67
109, Floor, Bombay Flats ABOUT TOOLS &2 TECHNOLOGIES Nungambakkam High Road, Nungambakkam - 72 Chennai 600 034
nd
ABOUT NCCT 044-2823 -5816, 98411 93224, 89393 63501 3 74 044-28235816, 98411 93224, 89393 LAB FACILITIES AT A GLANCE 63501 - 75 www.ncct.in
ncct.in, ncctchennai@gmail.com
ncctchennai@gmail.com
- 76 PROJECT TRAINING METHODOLOGIES - 77 PLACEMENT SERVICES NCCT NCCT, Smarter Way@ to do your Projects - 78
NCCT
Experience the Projects with the latest new tools & technologies that will change the way we develop solutions, forever
For Latest Updates & To Download Full List of Titles / Abstracts / PPT / PDF, visit www.facebook.com\NCCTIEEEprojects www.ncctieeeprojects.blogspot.in
Mobile Computing * Networking * Network Security * Cloud Computing * Datamining * Image Processing * Knowledge & Data Engg * Dependable & Secure Computing * Parallel & Distributed Systems * Pattern Analysis
We can Implement your Own Papers / Project Ideas / Concepts in any Tools & Technologies Own Projects ! or New IEEE Paper Any Projects Mail your Requirements to us and Get is Done with us or Call us / Email us / SMS us or Visit us Directly We will do any Projects
Delay-Tolerant
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Efficient Rekeying Framework for Secure Diverse-Subscription-Period Mobile Users Multicast with
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Bicriteria Optimization in Multihop Wireless Characterizing the Throughput-Energy Envelope Networks:
16 17 18 19 20 21 22 23 24 25 26 27 28 29
2013 2013 2013 2013 2013 2012 2012 2011 2011 2011 2011 2011 2011 2011
Dynamic Switching based data forwarding for low duty cycle wireless sensor networks Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems Mobile Sampling Broadcast of Sensor Field Data using controlled
Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model
Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink Optimal Jamming Attack Strategies and Network Defense Secure Data Collection in Wireless Sensor networks using Randomized Desperive Routes
For More Titles, Abstracts, PPT & PDF visit www.ncct.in, www.ncctieeeprojects.blogspot.in
Delay-Based Network Utility Maximization Opportunistic MANETs: Transmission Power Mobility Can
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Design and Implementation of an Approximate Communication System for Wireless Media Applications On Distributed and Coordinated Resource Allocation Interference Mitigation in Self-Organizing LTE Networks An Efficient and Robust Addressing Autoconfiguration in Ad Hoc Networks Protocol for for
Node
Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability Randomized Information Dissemination in Dynamic
Balancing Reliability and Utilization in Dynamic Spectrum Access Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network Decomposition Approach Design of Detection Wireless Sensor Networks for Mobile Target
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks, IEEE 2012 Privacy and Integrity Preserving Range Queries in Sensor Networks A Secure Intrusion Detection system against DDOS attack Continuous Networks Neighbor Discovery in Asynchronous
Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks Design & Implementation of a Fast Dynamic Packet Filter Forward Correction and Fountain Codes in Delay-Tolerant Networks Jamming Aware traffic allocation for multipath routing using Routing using portfolio Selection
10
11
07 08 09 10 11 12 13 14 15
Computing
Environments:
Security and Privacy-Enhancing Multi-cloud Architectures Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data A Stochastic Model to Investigate Data Center Performance and
12
13
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia A System to Filter Unwanted Messages from OSN User Walls Comparable Entity Mining from Comparative Questions Facilitating Effective User Structure Improvement Navigation through Website
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Incentive Compatible Privacy-Preserving Data Analysis A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Efficient Processing of Uncertain Events in Rule-Based Systems ROAD: A New Spatial Object Search Framework for Road
14
Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems A fuzzy self Constructing Feature Clustering Alg for text Classification A Generic Multilevel Architecture for Time Series Prediction A Machine learning approach for identifying disease treatment relations in short test Adaptive Cluster Distance Bounding for High-Dimensional Indexing Analysis on Credit Card Fraud Detection Methods Continous Monitoring of distance based range query Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units, IEEE 2011 Adaptive Join Operators for Result Rate optimization False Negative Problem of Counting Bloom Filter
15
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing NICE: Network Intrusion Detection Selection in Virtual Network Systems and Countermeasure
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing SORT: A Systems Self-Organizing Trust Model for Peer-to-Peer
06 07 08 09 10 11 12 13 14 15 16
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data Secure Trust:-A dynamic trust compalation model for secured communication in multiagent system DoubleGuard: Applications Detecting Intrusions in Multitier Web
Packet Hiding Method For Preventing Selective Jamming Attacks Modeling and Detection of Camouflaging Worm Nymble: Blocking Networks Misbehaving Users in Anonymizing
Analyzing a Family of Key Protection Schemes against Modification Attacks Anomaly Detection in Network Traffic Based on Statistical Inference and -Stable Modeling Dynamics of Malware Spread in Decentralized Peer-to-Peer
16
17
18
Detecting Malicious Packet Losses Dynamic Routing with Security Considerations Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks Virtual-Force-Based Geometric Routing Protocol in MANETs A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
04 05
2013 2013
19
09 10 11 12 13 14 15 16 17 18 19
2013 2013 2013 2013 2013 2013 2013 2011 2010 2009 2009
Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation Performance Evaluation Methodology for Historical Document Image Binarization A memory learning framework for effective image retrieval Unequal Power Allocation for JPEG Transmission Over MIMO Systems Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos
20
Continuous Flow Wireless Data Broadcasting for High Speed Environments, IEEE 2009 Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks Single-Symbol ML Decodable Distributed STBCs for PartiallyCoherent Cooperative Networks SIR analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets
21
03 04 05
22
Cloud Computing for Agent-Based Urban Transportation Systems - Intelligent Transport System, IEEE 2011 Locating Equivalent servants over p2p networks - Network and Service Management, IEEE 2011 Ensuring Data Storage Security in Cloud Computing - Cloud Computing, IEEE 2010
23
Experience the Projects with the latest new tools & technologies that will change the way we develop solutions, forever
24
Load Rebalancing for Distributed File Systems in Clouds Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Cloud computing for mobile users can offloading compution save energy Mining Contracts for Business Constraints in Service Engagements Events and Temporal
25
15 16 17 18 19 20 21 22 23 24 25 26 27
2013 2013 2013 2013 2013 2013 2012 2011 2011 2011 2011 2011 2011
Multilevel intrusion detection system and log management in cloud computing Secure and Practical Outsourcing of Linear Programming in Cloud Computing
26
27
Multiparty Access Control for Online Social Networks: Model and Mechanisms Privacy Preserving Delegated Access Control in Public Clouds
28
Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation Efficient Computation of Range Aggregates against Uncertain Location Based queries A Generic Multilevel Architecture for Time Series Prediction A Personalized Ontology Model for Web Information Gathering A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
Energy time series forecasting based on pattern sequence 2011 similarity Publishing Search LogsA Comparative Study of Privacy 2011 Guarantees Anonymous Query processing in Road Networks 2010
Automated classification of customer e mails via association 2010 rule mining Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor 2010 Networks LIGHT: A Query-Efficient Scheme over DHTs Yet Low-Maintenance Indexing 2010
29
30
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Networks: A Coalitional Game Approach Wireless Mobile
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Toward Accurate Mobile Sensor Network Localization in Noisy Environments A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Towards a Statistical Framework for Source Anonymity in Sensor Networks Distributed Cooperative Caching in Social Wireless Networks STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks Autonomous Deployment of Heterogeneous Mobile Sensors Effective Scheduling in Infrastructure Based Cognitive Radio Networks
31
32
07 08 09 10 11 12 13 14 15 16 17 18 19 20 21
2013 2013 2013 2013 2013 2013 2013 2013 2012 2012 2011 2011 2011 2011 2011
Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition Cross-domain optimization privacy-preserving cooperative firewall
Entrusting Private Computation and Data to Untrusted Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Accelerating Traffic Design of Detection Multipattern Wireless Matching on Compressed for Mobile HTTP Target
Sensor
Networks
A Novel Approach for Failure Localization in All-Optical Mesh Networks Continuous Networks Neighbor Discovery in Asynchronous Sensor
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration Tofu:semi truthful online frequency allocation mechanism for
33
Conditional Shortest Path Routing in Delay Tolerant Networks Constrained Relay Node Placement in Networks Formulation and Approximations Wireless Sensor
Demand-Aware Content Distribution on the Internet On Wireless Scheduling Algorithms for Minimizing the QueueOverflow S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs Entrusting Private Computation and Data to Untrusted Networks Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
34
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Adaptive Network Coding for Broadband Wireless Access Networks Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Detection and Localization of Multiple Spoofing Attackers in
35
36
Multi-View Video Representation Based on Fast Monte Carlo Surface Reconstruction Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model Two-Dimensional Orthogonal DCT Expansion in Trapezoid and Triangular Blocks and Modified JPEG Image Compression Self-Supervised Online Metric Learning Constraint for Scene Categorization With Low Rank
06 07 08
37
38
39
The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? - Software Engineering An Intrusion Detection model fuzzy class assocation rule mining using genetic network programming - Systems and cybernetics A bounded and adaptive memory based approach to mine frequent patterns from very large database - Systems, man, and cybernetics Improving the performance of wireless adhoc network by using MAC Layer Design - Wireless communication Multicast Multipath Power Efficient Routing in Mobile Adhoc Computer Science And Network Security Edge Adaptive Image Steganography Based on LSB Matching Revisited - Information Forensics And Security Data Mining for Risk Management in Hospital Information Systems - Medical Engineering Slow Adaptive OFDMA Systems Through Chance Constrained Programming - Signal Processing
09
2011
10
2011
11 12 13 14 15
40
TITLES
A Rank Correlation Based Reflection DoS Attacks Detection against Distributed
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks ALERT: An Anonymous Protocol in MANETs Location-Based Efficient Routing
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks Analysis of Distance Based Location Management in Wireless Communication Networks Back Pressure based Packet-by-Packet Adaptive Routing in Communication Networks BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments Capacity of Hybrid Wireless Mesh Networks with Random APs Channel Allocation and Routing Multiradio Wireless Mesh Networks in Hybrid Multichannel
Coloring Based Inter WBAN Scheduling for Mobile Wireless Body Area Networks
41
42
Proteus: Multiflow Diversity Routing for Wireless Networks with Cooperative Transmissions Quality- Differentiated Video Multicast in Multirate Wireless Networks Strategies for Energy-Efficient Resource Management of Hybrid Programming Models Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
43
PROJECT TITLES
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications A Fast Clustering- Based Feature Subset Selection Algorithm for High- Dimensional Data A Generalized Flow based Method for Analysis of Implicit Relationships on Wikipedia A Proxy based Approach to Continuous Location based Spatial Queries in Mobile Environments AML Efficient Approximate Membership Localization within a Web- Based Join Framework Analysis of Distance based Location Management in Wireless Communication Networks Anonymization of Centralized and Distributed Social Networks by Sequential Clustering CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud Crowd sourced Trace Similarity with Smartphones Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Distributed Web Systems Performance Forecasting using Turning Bands Method Dynamic Personalized Recommendation on Sparse Data Evaluating Data Reliability An Evidential Answer with Application
44
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
45
TITLES
A Watermarking based medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes Adaptive Fingerprint Image Enhancement with Emphasis on Preprocessing of Data Airborne Vehicle Detection in Dense Urban Areas using HoG Features and Disparity Maps An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition Analysis Operator Learning and its Application to Image Reconstruction Atmospheric Turbulence Mitigation using Complex WaveletBased Fusion Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images Compressive Framework for Demosaicing of Natural Images Context-Based Hierarchical Unequal Merging for SAR Image Segmentation Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes General Constructions for Threshold Multiple-Secret Visual
46
Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views Robust Face Recognition Illumination Changes Robust Hashing for Image Moments and Local Features for Uncontrolled Pose and
Authentication
using
Zernike
47
48
Proxy Server - Design and Implementation E-Recruitment System Management System - Dynamic Online Professional Recruitment &
Secure Password-Based Protocol for Downloading a Private Key Homogeneous Networks & Control Implementation Secure Optimal Cyclic Cryptographic System Multithreaded Peer-to-Peer Communication using Distributed Frameworks
49
Grid information Retrieval System Network Packer Sniffer Implementation Online Issue Tracking - Project Management Solutions E-HealthCare System - Distributed HealthCare and A Strategic Management
50
51
52
53
Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments Patient Keeper: Medical Application on mobile Phone JSAFE - Rijndael Algorithm based Encryption & Decryption ESecure Transaction Design & Implementation Asynchronous Transfer Mode (ATM) Networks & intelligent Packet Filtering to Avoid Traffic & Congestion CAC Connection Admission Control using ATM Networks Implementation Dynamic Server Replication System
54
55
56
Development of Web enabled Online, Dynamic ATM Card Management System ATM Card & CMS application Back Office Management Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP) Media Streaming in Mobile using J2ME Toolkit Efficient Monitoring, Managing, Detection of Networks & its Components using SNMP Protocol Implementation of Security Kernel and Firewall using Java
57
Cargo Tracking System Design & implementation Job Portal Implementation with intelli power features Net Monitoring and Management using SNMP Network Component Development for XML Document Migration Neural Network based Character Pattern Identification System Schema based Enterprise Charting & Reporting for Desktops Data Hiding in Audio Files with PBE Encryption Components Framework for Developer Network using MVC Pattern Asynchronous Server Interaction using AJAX and XML On Demand Audio / Video Streaming & rendering Over IP using UDP Data Security in Ad hoc Networks Using Multipath Routing Distributed Token Circulation in Mobile Ad Hoc Networks Versioning Control System using JAVA Virtual Private Network using JAVA Voice based XML Phone Survey System WAP based information Retrieval System WAP based Route Tracing and Mailing Complete email system with an email server and an email client Image Compression and Decompression using Huffmans Image Manipulation for Face Recognition Implementation of Broadcast Messaging System using Multi Threading Implementation of Packet Filtering Firewall in Linux Systems
58
59
60
Distributed Component Router based Supply Chain Management System SCM Distributed Component Router for E-Campus Management System ERP Application advantages integrated Enterprise Solutions with Strategic
E-Banking System online Banking Services Web enabled Supply Chain Management A Logistics Approach Website Performance Monitor Secure Electronics Transactions E Secure Transactions
61
Warehouse Management System Implementation with Zero Inventory Level EAI Approach Implementation of EAI in Hotel Management System E-Commerce Shopping cart for B2B Implementation Online Auction & Bidding System With Multi Brand & Product Selection Online Body Shopping System with Auto Mailing feature Online Auction with featured shopping cart Online Banking Net Banking & Back Office Operation Online Content Management System Web Server Information System eCareer and Consultancy Services Distributed Information and Reporting System Materials Management System with Forecasting Implementation Integrated Human Resource Information System Online Credit Card Banking System Web enabled Customer Relationship Management Web enabled Sales Order Processing Web enabled Purchase Order Processing
62
Online Event Management with featured intelli system Online Health Care & Hospital Management Solutions Online Issue Tracking - Project Management Solutions Online Portfolio Manager Equity Trading & Mutual Funds management Online Task Management with fully featured intelli System Online Intranet Site Design & Implementation Web based Portal Design & Implementation Online VRS- Vehicle Reservation System Network Traffic Monitoring & Web Administration Workflow based Complaint Management System On Line Tracking Logistic - International Logistic Services for Shippers & Manufacturers Web Network Statistics Generator & Analyzer E-Commerce Front Store Implementation E-Shopping Mall E-Commerce Implementation with Cart for B2B E-Commerce Implementation with Cart for B2C Online University Portal, Educational Grid Information Child Care Information System Matrimonial & Marriage Information Services Implementation Web Conference System Implementation
63
64
65
66
VB.NET PROJECTS
Integrated Internet Information Monitoring & Messaging System Intelligent Network Information & Messaging System Integrated & Network Internet Mailing, Browsing & Messaging System & Solutions Networking Monitoring & Management System Digital Image Processing with Multi Domain Approach Bug Tracking System Management - Comprehensive Bug Tracking & Change
CRM Customer Relationship Management, Implementation Data mining implementation for Credit Cards Application Processing System Distributed Component Router based Supply Chain Management System SCM Distributed Component Router for E-Campus Management System Dynamic College information System & Data integrity Maintenance Dynamic University Linking & Data integrity Maintenance E-Health Care - A Strategic Approach & Management System E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management Datamining in Credit Card Fraud Detection
67
68
69
70
71
Java Editions
Standard Edition (SE), Micro Edition (ME), Enterprise Edition (EE), JavaFX, Java Cards Standard Edition (Java SE) targeting workstation environments. Enterprise Edition (Java EE) targeting large distributed enterprise or Internet environments. Micro Edition (Java ME) targeting environments with limited resources. JavaFX is a software platform for creating and delivering rich Internet applications (RIAs) that can run across a wide variety of connected devices Java Card for smartcards
Microsoft .NET
(pronounced dot net) is a software component that runs on the Windows operating system. .NET provides tools and libraries that enable developers to create Windows software much faster and easier. Microsoft .NET consists of four major components: Common Language Specification (CLS) Framework Class Library (FCL) Common Language Runtime (CLR) .NET Tools .NET includes new object-oriented programming languages such as C#, ASP.NET, Visual Basic .NET
PHP
(recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML PHP Paradigm(s) -imperative, object-oriented, procedural, reflective, PHP is mainly focused on server-side scripting, so you can do anything any other CGI program can do, such as collect form data, generate dynamic page content, or send and receive cookies
72
NS-2
ns (from network simulator) is a name for series of discrete event network simulators, specifically ns-2 and ns-3. Both simulators are used in the simulation of routing protocols, among others, and are heavily used in ad-hoc networking research, and support popular network protocols, offering simulation results for wired and wireless networks alike.
GloMoSim
Global Mobile Information System Simulator (GloMoSim) is a network protocol simulation software that simulates wireless and wired network systems. GloMoSim is designed using the parallel discrete event simulation capability provided by Parsec, a parallel programming language. GloMoSim currently supports protocols for a purely wireless network. It uses the Parsec compiler to compile the simulation protocols
MATLAB
MATLAB (matrix laboratory) is a numerical computing environment and fourthgeneration programming language. Developed by MathWorks, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C++, Java, and Fortran. Although MATLAB is intended primarily for numerical computing, an optional toolbox uses the MuPAD symbolic engine, allowing access to symbolic computing capabilities. An additional package, Simulink, adds graphical multi-domain simulation and Model-Based Design for dynamic and embedded systems
Android
Android is the world's most popular mobile platform. With Android you can use all the Google apps you know and love, plus there are more than 600,000 apps and games available. Android is a software bunch comprising not only operating system but also middleware and key application Android is a powerful Operating System supporting a large number of applications in Smart Phones. These applications make life more comfortable and advanced for the users. Hardwares that support Android are mainly based on ARM architecture platform
CloudSim
CloudSim is a simulator, so it doesn't run any actual software technology. Simulation can be defined as "running a model of a software in a model of hardware". As it's all about models, specific technology details are abstracted. The only previous knowledge you need to use CloudSim is basic Java programming (as CloudSim is written in Java) and some knowledge about Cloud computing
73
NCCT started at 1984, is a leading technology driven organization with over a decade standing, backed by a strong R&D to keep pace with the fast growing and latest technologies in the areas of Information Technology & Embedded Systems We, NCCT is a professionally organized Design & Development House specialized in providing innovative Software Solutions and Embedded Solutions. We are concentrating on Multi Domain Vertical Segment, diversified technologies and have gained versatile experience over the decades. We are focused on executing hi-end technology services & solutions to our clients as well as students As a part of the Projects & Development Training, we offer Projects keeping in view the latest emerging trends and technologies under Parallel Development Process We play a Dual Positive Role by satisfying the academic requirements and as well as giving the necessary training in Software & Embedded which enables students to meet the industrial requirements with a wider knowledge and a greater confidence
OBJECTIVES - Our Objectives are to make the available facilities for highend training in Information Technology and Electronics related fields
74
SOFTWARE TOOLS
Technologies - JAVA, DOT NET Languages - Java, J2EE, J2ME, JSP, ASP.NET, VB.NET, C#, PHP, XML Wireless Technologies - GSM, IEEE 802.11, RF, Zigbee, RFID Operating Systems - Windows XP, Windows Vista, Redhat Linux Networking - TCP/IP, NFS, ATM, Ethernet, Token Database - Oracle, MS-Access, SQL Server, MySQL
75
76
77
Our Students are working in TCS, IBM, HP, CTS, Wipro, Vetex, HCL, N trust PVT Ltd, Origin ITFA, Care IT Solutions, Precision Infomatic, Ample Tech, Arinos Info Solutions, Bharathi Airtel, Leaap International, Citi Bank, Taj Group, etc..
5000+ Students found their First Job through us since 2007, till date
LOOKING FOR JOBS / PLACEMENTS
Mail your Resume to ncctchennai@gmail.com or Talk to our Placement Head
Partial List of Regular Recruiters We have placed our students in the following Companies... Regular Recruiters... Pan India Job Opportunities
78