Professional Documents
Culture Documents
Software Project Titles 2013-14, IEEE
Software Project Titles 2013-14, IEEE
NCCT
Where the Technology & Solutions Meet
SOFTWARE PROJECTS
IEEE 2013-14
JAVA * J2EE * J2ME ASP.NET * VB.NET * C#.NET MATLAB * NS2 * PHP ANDROID * CLOUDSIM
109, 2nd Floor, Bombay Flats Nungambakkam High Road, Nungambakkam Chennai 600 034
Near Ganpat / Taj Hotel, Above IOB, Next to ICICI Bank
044-2823 5816, 98411 93224, 89393 63501 ncct.in, ncctchennai@gmail.com 044-28235816, 98411 93224, 89393 63501
www.ncct.in
ncctchennai@gmail.com
PROJECTS SUPPORTS
PROJECT DELIVERABLES @ NCCT
PROJECT ABSTRACT PROJECT IEEE BASE PAPER / REFERENCE PAPER PROJECT PRESENTATION IN PPT FORMAT PROJECT REVIEW ASSISTANCE FOR VIVA PROJECT DIAGRAMS PROJECT SOURCE CODE PROJECT REPORT PROJECT SCREEN SHOTS PROJECT DEMO PROJECT EXPLANATION PROJECT ACCEPTANCE LETTER PROJECT COMPLETION CERTIFICATE OTHER REQUIRED LETTERS
For More Titles / Abstracts & PDF Papers, Latest Details and Downloads, Visit www.ncct.in, www.ncctieeeprojects.blogspot.in For Latest Updates, Job Fairs, Workshop, Placement Drive Information, Visit www.facebook.com/NCCTIEEEprojects 044-28235816, 98411 93224, 89393 63501 www.ncct.in ncctchennai@gmail.com
109, 2nd Floor, Bombay Flats Nungambakkam High Road, Nungambakkam Chennai 600 034
Near Ganpat / Taj Hotel, Above IOB, Next to ICICI Bank
044-2823 5816, 98411 93224, 8939363501 63501 044-28235816, 98411 93224, 89393 ncct.in, ncctchennai@gmail.com www.ncct.in ncctchennai@gmail.com
NCCT
Application Projects * Networking * Grid Computing * ADHOC, MANETS, WSN, Web Services, Cloud Computing, Android Applications, Web Services & Portal Management, System Projects, Cluster Computing, Communication System, Biometrics, Access Control, Enterprise Computing, ERP, CRM, SCM, System to Mobile Communication, WAP Services, Image Processing, Security Systems, Cryptography and many more
www.ncct.in
ncctchennai@gmail.com
Experience the Projects with the latest new tools & technologies that will change the way we develop solutions, forever
For Latest Updates & To Download Full List of Titles / Abstracts / PPT / PDF, visit www.facebook.com\NCCTIEEEprojects www.ncctieeeprojects.blogspot.in
Mobile Computing * Networking * Network Security * Cloud Computing * Datamining * Image Processing * Knowledge & Data Engg * Dependable & Secure Computing * Parallel & Distributed Systems * Pattern Analysis
We can Implement your Own Papers / Project Ideas / Concepts in any Tools & Technologies Own Projects ! or New IEEE Paper Any Projects Mail your Requirements to us and Get is Done with us or Call us / Email us / SMS us or Visit us Directly We will do any Projects
03
2013
04
2013
05 06
2013 2013
07
2013
08
2013
09
Delay-Tolerant
2013
10
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Efficient Rekeying Framework for Secure Diverse-Subscription-Period Mobile Users Multicast with
2013
11
2013
12
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Bicriteria Optimization in Multihop Wireless Characterizing the Throughput-Energy Envelope Networks:
2013
13
2013
15
2013
16
2013
17
2013
18
2013
19
2013
20
2013
21
2012
22
2012
23
2011
24
2011
25
for
Multimedia
Transport
over
2011
26
Dynamic Switching based data forwarding for low duty cycle wireless sensor networks Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems Mobile Sampling Broadcast of Sensor Field Data using controlled
2011
27
2011
28
2011
30
2011
31
2011
32
2011
33
2011
34
2010
35 36
2010 2010
37
Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink Optimal Jamming Attack Strategies and Network Defense Secure Data Collection in Wireless Sensor networks using Randomized Desperive Routes
2010
38 39
2010 2010
For More Titles, Abstracts, PPT & PDF visit www.ncct.in, www.ncctieeeprojects.blogspot.in
Entrusting Private Computation and Data to Untrusted Networks ITA: Innocuous Topology Awareness for Unstructured P2P Networks Attribute-Based Decryption Encryption With Verifiable Outsourced
Delay-Based Network Utility Maximization Opportunistic MANETs: Transmission Power Mobility Can
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Design and Implementation of an Approximate Communication System for Wireless Media Applications On Distributed and Coordinated Resource Allocation for Interference Mitigation in Self-Organizing LTE Networks An Efficient and Robust Addressing Autoconfiguration in Ad Hoc Networks Protocol for Node
Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
17
Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information Time-Bounded Essential Networks Localization for Wireless Sensor
2013
18
2013
19
2013
20
2013
21
Balancing Reliability and Utilization in Dynamic Spectrum Access Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network Decomposition Approach Design of Detection Wireless Sensor Networks for Mobile Target
2012
22
2012
23
2012
24
2012
25
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks, IEEE 2012 Privacy and Integrity Preserving Range Queries in Sensor Networks A Secure Intrusion Detection system against DDOS attack Continuous Networks Neighbor Discovery in Asynchronous Sensor
2012
26
2012
27 28
2012 2011
29
Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks Design & Implementation of a Fast Dynamic Packet Filter Forward Correction and Fountain Codes in Delay-Tolerant Networks
2011
30 31
2011 2011
10
11
03
2013
04 05
2013 2013
06
2013
07
2013
08
2013
09 10
2013 2013
11
2013
12
Environments:
2013
13 14
Security and Privacy-Enhancing Multi-cloud Architectures Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data
2013 2013
12
16
2013
17
2013
18
2012
19
2012
20
2012
21
2012
22
2012
23
2011
24
2011
25
2011
26
2011
27
2011
28
2011
13
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia A System to Filter Unwanted Messages from OSN User Walls Comparable Entity Mining from Comparative Questions Facilitating Effective User Structure Improvement Navigation through Website
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Incentive Compatible Privacy-Preserving Data Analysis A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Efficient Processing of Uncertain Events in Rule-Based Systems
14
Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems A fuzzy self Constructing Feature Clustering Alg for text Classification A Generic Multilevel Architecture for Time Series Prediction A Machine learning approach for identifying disease treatment relations in short test Adaptive Cluster Distance Bounding for High-Dimensional Indexing Analysis on Credit Card Fraud Detection Methods Continous Monitoring of distance based range query Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units, IEEE 2011 Adaptive Join Operators for Result Rate optimization False Negative Problem of Counting Bloom Filter
15
02
Data
to
Untrusted
2013
03
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing NICE: Network Intrusion Detection Selection in Virtual Network Systems and Countermeasure
2013
04
2013
05
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing SORT: A Systems Self-Organizing Trust Model for Peer-to-Peer
2013
06
2013
07
2013
08
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data Secure Trust:-A dynamic trust compalation model for secured communication in multiagent system DoubleGuard: Applications Detecting Intrusions in Multitier Web
2013
09
2012
10
2012
11
Packet Hiding Method For Preventing Selective Jamming Attacks Modeling and Detection of Camouflaging Worm Nymble: Blocking Networks Misbehaving Users in Anonymizing
2012
12 13
2011 2011
16
17
03
2013
04
2013
05
2013
06
2013
07
2013
08 09
2013 2013
10
2013
11
2013
12 13
2013 2013
14
2013
18
16
2012
17
2012
18
2011
19
2010
20
2010
21 22
2010 2010
23 24 25
Detecting Malicious Packet Losses Dynamic Routing with Security Considerations Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks Virtual-Force-Based Geometric Routing Protocol in MANETs A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
26 27
2009 2009
19
04 05 06 07 08
Image Inpainting on the Basis of Spectral Structure From 2-D Nonharmonic Analysis Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization Coupled Variational Image Decomposition and Restoration Model for Blurred Cartoon-Plus-Texture Images With Missing Pixels General Framework to Histogram-Shifting-Based Reversible Data Hiding Learning Dynamic Hybrid Markov Random Field for Image Labeling Rotation Invariant Local Frequency Descriptors for Texture Classification Image Quality Assessment Using Multi-Method Fusion Scalable Coding Embedding of Depth Maps With R-D Optimized
09 10 11 12 13 14
Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation
20
Continuous Flow Wireless Data Broadcasting for High Speed Environments, IEEE 2009 Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks Single-Symbol ML Decodable Distributed STBCs for PartiallyCoherent Cooperative Networks SIR analysis and interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing offsets
21
02
2013
03
2013
04
2013
05
2013
02
A Globally-Variant Locally-Constant Model for Fusion of Labels from Multiple Diverse Experts without Using Reference Labels Efficient Classification for Additive Kernel SVMs Fast and Accurate Matrix Completion via Truncated Nuclear Norm Regularization Image Transformation Based on Learning Dictionaries across Image Spaces
2013
03 04
2013 2013
05
2013
22
03 04
2012 2012
05
2011
06
2011
07
2011
08
Cloud Computing for Agent-Based Urban Transportation Systems - Intelligent Transport System, IEEE 2011 Locating Equivalent servants over p2p networks - Network and Service Management, IEEE 2011 Ensuring Data Storage Security in Cloud Computing - Cloud Computing, IEEE 2010
2011
09
2011
10
2010
23
Experience the Projects with the latest new tools & technologies that will change the way we develop solutions, forever
For Latest Updates & To Download Full List of Titles / Abstracts / PPT / PDF, visit www.facebook.com\NCCTIEEEprojects www.ncctieeeprojects.blogspot.in Mobile Computing * Networking * Network Security * Cloud Computing * Datamining * Image Processing * Knowledge & Data Engg * Dependable & Secure Computing * Parallel & Distributed Systems * Pattern Analysis
We can Implement your Own Papers / Project Ideas / Concepts in any Tools & Technologies
www.ncct.in
ncctchennai@gmail.com
044-28235816, 98411 93224, 89393 63501 044-2823 5816, 98411 93224, 89393 63501 24 www.ncct.in ncctchennai@gmail.com
04 05
2013 2013
06
2013
07 08
Load Rebalancing for Distributed File Systems in Clouds Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Cloud computing for mobile users can offloading compution save energy Mining Contracts for Business Constraints in Service Engagements Events and Temporal
2013 2013
09
2013
10
2013
11
2013
25
14
2013
15
2013
16
2013
17
2013
18
2013
19 20
2013 2013
21
2012
22
2011
23
2011
24
2011
25
2011
26
2011
26
28
2011
29
2010
30 31 32
33
2010
27
28
17
Multiparty Access Control for Online Social Networks: Model and Mechanisms Privacy Preserving Delegated Access Control in Public Clouds Facilitating Effective Structure Improvement User Navigation through Website
2013
18 19
2013 2013
20
Approximate Algorithms for Computing Histograms with Accuracy Guarantees Data Mining for XML Query answering support
Spatial
Distance
2013
21 22
2012 2012
Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain Energy-Efficient Reverse Wireless Sensor Networks Skyline Query Processing over
23
2012
24
Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation Efficient Computation of Range Aggregates against Uncertain Location Based queries A Generic Multilevel Architecture for Time Series Prediction A Personalized Ontology Model for Web Information Gathering A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
2012
25
2012
26
2012
27 28 29
30
Energy time series forecasting based on pattern sequence 2011 similarity Publishing Search Logs A Comparative Study of Privacy 2011 Guarantees Anonymous Query processing in Road Networks 2010
31
32
29
Bridging Domains Using World Wide Knowledge for Transfer 2010 Learning
30
Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks Understanding the Scheduling Performance in Networks with Successive Interference Cancellation Wireless
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Networks: A Coalitional Game Approach Wireless Mobile
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Toward Accurate Mobile Sensor Network Localization in Noisy Environments A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Towards a Statistical Framework for Source Anonymity in Sensor Networks Distributed Cooperative Caching in Social Wireless Networks
31
32
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability Randomized Environments Information Dissemination in Dynamic
07 08 09 10 11 12 13 14
Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition Cross-domain optimization privacy-preserving cooperative firewall
Entrusting Private Computation and Data to Untrusted Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
33
Sensor
A Novel Approach for Failure Localization in All-Optical Mesh Networks Continuous Networks Neighbor Discovery in Asynchronous Sensor
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration Tofu:semi truthful online frequency allocation mechanism for wireless networks Service Overlay Maximization Network Capacity Adaptation for Profit
Conditional Shortest Path Routing in Delay Tolerant Networks Constrained Relay Node Placement in Networks Formulation and Approximations Wireless Sensor
Demand-Aware Content Distribution on the Internet On Wireless Scheduling Algorithms for Minimizing the QueueOverflow S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
34
02
2013
03
Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs Entrusting Private Computation and Data to Untrusted Networks Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks ELMO: Energy aware local monitoring in sensor networks Layered Approach Intrusion Detection Using Conditional Random Fields for
2013
04 05
2013 2013
06
2013
07
2013
08 09
2013 2011
10
2011
11 12
2011 2010
35
03
2013
04
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Adaptive Network Coding for Broadband Wireless Access Networks Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Network Traffic Classification Using Correlation Information Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Dynamic Coverage of Mobile Sensor Networks Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
2013
05
2013
06
2013
07
2013
08
2013
09 10
2013 2013
11
2013
12 13
2013 2012
14
2012
36
16
2011
17
2011
18
2011
19
2010
20
2010
21
2009
37
03
Feature
2013
04
Multi-View Video Representation Based on Fast Monte Carlo Surface Reconstruction Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model Two-Dimensional Orthogonal DCT Expansion in Trapezoid and Triangular Blocks and Modified JPEG Image Compression Self-Supervised Online Metric Learning Constraint for Scene Categorization With Low Rank
2013
05
2013
06
2013
07
2013
08
General Framework to Histogram-Shifting-Based Reversible Data Hiding Learning Dynamic Hybrid Markov Random Field for Image Labeling Rotation Invariant Local Frequency Descriptors for Texture Classification Scalable Coding of Depth Maps With R-D Optimized Embedding Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation ViBe: A Universal Background Subtraction Algorithm for Video Sequences, IEEE 2011 Efficient 2-D Grayscale Morphological Transformations With Arbitrary Flat Structuring Elements, IEEE 2008
2013
09
2013
10
2013
11 12
2013 2013
13 14
2011 2008
38
03
2011
04
2011
05
2011
06
2011
39
08
The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? - Software Engineering An Intrusion Detection model fuzzy class assocation rule mining using genetic network programming - Systems and cybernetics A bounded and adaptive memory based approach to mine frequent patterns from very large database - Systems, man, and cybernetics Improving the performance of wireless adhoc network by using MAC Layer Design - Wireless communication Multicast Multipath Power Efficient Routing in Mobile Adhoc Computer Science And Network Security Edge Adaptive Image Steganography Based on LSB Matching Revisited - Information Forensics And Security Data Mining for Risk Management in Hospital Information Systems - Medical Engineering Slow Adaptive OFDMA Systems Through Chance Constrained Programming - Signal Processing
2011
09
2011
10
2011
11
2011
12
2010
13 14 15
40
TITLES
A Rank Correlation Based Reflection DoS Attacks Detection against Distributed
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks ALERT: An Anonymous Protocol in MANETs Location-Based Efficient Routing
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks Analysis of Distance Based Location Management in Wireless Communication Networks Back Pressure based Packet-by-Packet Adaptive Routing in Communication Networks BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments Capacity of Hybrid Wireless Mesh Networks with Random APs Channel Allocation and Routing Multiradio Wireless Mesh Networks in Hybrid Multichannel
Coloring Based Inter WBAN Scheduling for Mobile Wireless Body Area Networks Cross Layer Design of Congestion Control and Power Control in Fast Fading Wireless Networks
41
NNS014
NNS015
NNS016
NNS017
NNS021
Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks Harvesting - Aware Energy Management for Time-Critical Wireless Sensor Networks with Joint Voltage and Modulation Scaling In Network Estimation with Delay Constraints in Wireless Sensor Networks Mobile Relay Configuration in Data Intensive Wireless Sensor Networks Model Based Analysis of Wireless System Architectures for RealTime Applications Network Traffic Classification using Correlation Information On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay Tolerant Networks
NNS022
NNS023
NNS024
NNS025
NNS026
NNS027 NNS028
42
Optimal Multicast Capacity and Delay Tradeoffs in MANETs Power Allocation for Statistical QoS Provisioning Opportunistic Multi Relay DF Cognitive Networks in
Proteus: Multiflow Diversity Routing for Wireless Networks with Cooperative Transmissions Quality- Differentiated Video Multicast in Multirate Wireless Networks Strategies for Energy-Efficient Resource Management of Hybrid Programming Models Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
43
PROJECT TITLES
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications A Fast Clustering- Based Feature Subset Selection Algorithm for High- Dimensional Data A Generalized Flow based Method for Analysis of Implicit Relationships on Wikipedia A Proxy based Approach to Continuous Location based Spatial Queries in Mobile Environments AML Efficient Approximate Membership Localization within a Web- Based Join Framework Analysis of Distance based Location Management in Wireless Communication Networks Anonymization of Centralized and Distributed Social Networks by Sequential Clustering CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud Crowd sourced Trace Similarity with Smartphones Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Distributed Web Systems Turning Bands Method Performance Forecasting using
NAN002
NAN003
NAN004
NAN005
NAN006
NAN007
NAN008
NAN009 NAN010
NAN011
NAN012 NAN013
Dynamic Personalized Recommendation on Sparse Data Evaluating Data Reliability An Evidential Answer with Application to a Web Enabled Data Warehouse
44
NAN015
NAN019
NAN020
NAN021
NAN022
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency SSD A Robust RF Location Fingerprint Addressing Mobile Devices Heterogeneity Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks T-Drive: Enhancing Intelligence Driving Directio ns with Taxi Drivers
NAN023
NAN024
NAN025
NAN026
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
45
TITLES
A Watermarking based medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes Adaptive Fingerprint Image Enhancement with Emphasis on Preprocessing of Data Airborne Vehicle Detection in Dense Urban Areas using HoG Features and Disparity Maps An Optimized Wavelength Pigmented Iris Recognition Band Selection for Heavily
Analysis Operator Learning and its Application to Image Reconstruction Atmospheric Turbulence Mitigation using Complex WaveletBased Fusion Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images Compressive Framework for Demosaicing of Natural Images Context-Based Hierarchical Unequal Merging for SAR Image Segmentation Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes
46
Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views Robust Face Recognition Illumination Changes Robust Hashing for Image Moments and Local Features for Uncontrolled Pose and
Authentication
using
Zernike
47
48
Proxy Server - Design and Implementation E-Recruitment System Management System - Dynamic Online Professional Recruitment &
Secure Password-Based Protocol for Downloading a Private Key Homogeneous Networks & Control Implementation Secure Optimal Cyclic Cryptographic System
49
Grid information Retrieval System Network Packer Sniffer Implementation Online Issue Tracking - Project Management Solutions E-HealthCare System - Distributed HealthCare and A Strategic Management
50
51
52
53
Optimizing the Execution of multiple data analysis queries on Parallel & Distributed Environments Patient Keeper: Medical Application on mobile Phone JSAFE - Rijndael Algorithm based Encryption & Decryption E Secure Transaction Design & Implementation
54
55
56
Development of Web enabled Online, Dynamic ATM Card Management System ATM Card & CMS application Back Office Management Intranet Transformation of Voice with Data using Voice Over Internet Protocol (VOIP)
57
Cargo Tracking System Design & implementation Job Portal Implementation with intelli power features Net Monitoring and Management using SNMP Network Component Development for XML Document Migration Neural Network based Character Pattern Identification System Schema based Enterprise Charting & Reporting for Desktops Data Hiding in Audio Files with PBE Encryption Components Framework for Developer Network using MVC Pattern Asynchronous Server Interaction using AJAX and XML On Demand Audio / Video Streaming & rendering Over IP using UDP Data Security in Ad hoc Networks Using Multipath Routing Distributed Token Circulation in Mobile Ad Hoc Networks Versioning Control System using JAVA Virtual Private Network using JAVA Voice based XML Phone Survey System WAP based information Retrieval System WAP based Route Tracing and Mailing Complete email system with an email server and an email client
58
59
60
Distributed Component Router based Supply Chain Management System SCM Distributed Component Router for E-Campus Management System ERP Application advantages integrated Enterprise Solutions with Strategic
E-Banking System online Banking Services Web enabled Supply Chain Management A Logistics Approach Website Performance Monitor Secure Electronics Transactions E Secure Transactions
61
Warehouse Management System Implementation with Zero Inventory Level EAI Approach Implementation of EAI in Hotel Management System E-Commerce Shopping cart for B2B Implementation Online Auction & Bidding System With Multi Brand & Product Selection Online Body Shopping System with Auto Mailing feature Online Auction with featured shopping cart Online Banking Net Banking & Back Office Operation Online Content Management System Web Server Information System eCareer and Consultancy Services Distributed Information and Reporting System Materials Management System with Forecasting Implementation Integrated Human Resource Information System Online Credit Card Banking System Web enabled Customer Relationship Management Web enabled Sales Order Processing Web enabled Purchase Order Processing
62
Online Event Management with featured intelli system Online Health Care & Hospital Management Solutions Online Issue Tracking - Project Management Solutions Online Portfolio Manager Equity Trading & Mutual Funds management Online Task Management with fully featured intelli System Online Intranet Site Design & Implementation Web based Portal Design & Implementation Online VRS- Vehicle Reservation System Network Traffic Monitoring & Web Administration Workflow based Complaint Management System On Line Tracking Logistic - International Logistic Services for Shippers & Manufacturers Web Network Statistics Generator & Analyzer E-Commerce Front Store Implementation E-Shopping Mall E-Commerce Implementation with Cart for B2B E-Commerce Implementation with Cart for B2C Online University Portal, Educational Grid Information Child Care Information System Matrimonial & Marriage Information Services Implementation Web Conference System Implementation
63
64
65
66
VB.NET PROJECTS
Integrated Internet Information Monitoring & Messaging System Intelligent Network Information & Messaging System Integrated & Network Internet Mailing, Browsing & Messaging System & Solutions Networking Monitoring & Management System Digital Image Processing with Multi Domain Approach Bug Tracking System Management - Comprehensive Bug Tracking & Change
CRM Customer Relationship Management, Implementation Data mining implementation for Credit Cards Application Processing System Distributed Component Router based Supply Chain Management System SCM Distributed Component Router for E-Campus Management System Dynamic College information System & Data integrity Maintenance Dynamic University Linking & Data integrity Maintenance E-Health Care - A Strategic Approach & Management System E-Logistics for Warehouse Management - Implementation of Authenticated and Dynamic Logistics Support System & Management Datamining in Credit Card Fraud Detection
67
68
69
70
71
NCCT , Smarter Way do your Projects ABOU T TOOLS & Tto EC HN OLO GIES
Java * J2ME * J2EE * JavaFx * DotNET * ASP.NET * VB.NET * C# * PHP * NS2 * GloMoSim * Matlab * Android * CloudSim
JAVA
is a Cross-platform (multi-platform) object-oriented programming language. Java Paradigm(s) are multi-paradigm: object-oriented, structured, imperative, generic, reflective
Java Editions
Standard Edition (SE), Micro Edition (ME), Enterprise Edition (EE), JavaFX, Java Cards Standard Edition (Java SE) targeting workstation environments. Enterprise Edition (Java EE) targeting large distributed enterprise or Internet environments. Micro Edition (Java ME) targeting environments with limited resources. JavaFX is a software platform for creating and delivering rich Internet applications (RIAs) that can run across a wide variety of connected devices Java Card for smartcards
PHP
(recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML PHP Paradigm(s) -imperative, object-oriented, procedural, reflective, PHP is mainly focused on server-side scripting, so you can do anything any other CGI program can do, such as collect form data, generate dynamic page content, or send and receive cookies
72
NS-2NCCT,
ns (from network simulator) is a name for series of discrete event network simulators, specifically ns-2 and ns-3. Both simulators are used in the simulation of routing protocols, among others, and are heavily used in ad-hoc networking research, and support popular network protocols, offering simulation results for wired and wireless networks alike.
GloMoSim
Global Mobile Information System Simulator (GloMoSim) is a network protocol simulation software that simulates wireless and wired network systems. GloMoSim is designed using the parallel discrete event simulation capability provided by Parsec, a parallel programming language. GloMoSim currently supports protocols for a purely wireless network. It uses the Parsec compiler to compile the simulation protocols
MATLAB
MATLAB (matrix laboratory) is a numerical computing environment and fourthgeneration programming language. Developed by MathWorks, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C++, Java, and Fortran. Although MATLAB is intended primarily for numerical computing, an optional toolbox uses the MuPAD symbolic engine, allowing access to symbolic computing capabilities. An additional package, Simulink, adds graphical multi-domain simulation and Model-Based Design for dynamic and embedded systems
Android
Android is the world's most popular mobile platform. With Android you can use all the Google apps you know and love, plus there are more than 600,000 apps and games available. Android is a software bunch comprising not only operating system but also middleware and key application Android is a powerful Operating System supporting a large number of applications in Smart Phones. These applications make life more comfortable and advanced for the users. Hardwares that support Android are mainly based on ARM architecture platform
CloudSim
CloudSim is a simulator, so it doesn't run any actual software technology. Simulation can be defined as "running a model of a software in a model of hardware". As it's all about models, specific technology details are abstracted. The only previous knowledge you need to use CloudSim is basic Java programming (as CloudSim is written in Java) and some knowledge about Cloud computing
73
NCCT started at 1984, is a leading technology driven organization with over a decade standing, backed by a strong R&D to keep pace with the fast growing and latest technologies in the areas of Information Technology & Embedded Systems We, NCCT is a professionally organized Design & Development House specialized in providing innovative Software Solutions and Embedded Solutions. We are concentrating on Multi Domain Vertical Segment, diversified technologies and have gained versatile experience over the decades. We are focused on executing hi-end technology services & solutions to our clients as well as students As a part of the Projects & Development Training, we offer Projects kee ping in view the latest emerging trends and technologies under Parallel Development Process We play a Dual Positive Role by satisfying the academic requirements and as well as giving the necessary training in Software & Embedded which enables students to meet the industrial requirements with a wider knowledge and a greater confidence
OBJECTIVES - Our Objectives are to make the available facilities for highend training in Information Technology and Electronics related fields
74
SOFTWARE TOOLS
Technologies - JAVA, DOT NET Languages - Java, J2EE, J2ME, JSP, ASP.NET, VB.NET, C#, PHP, XML Wireless Technologies - GSM, IEEE 802.11, RF, Zigbee, RFID Operating Systems - Windows XP, Windows Vista, Redhat Linux Networking - TCP/IP, NFS, ATM, Ethernet, Token Database - Oracle, MS-Access, SQL Server, MySQL
75
76
Successful Implementation
LEVEL 3 - DEVELOPMENT
Logics & Coding Adopting Coding Standards Code Reviews
77
India needs thousands of qualified and trained professionals to build and manage the huge IT infrastructure across the country. Large IT companies are recruiting trained professionals to build their server network, manage their security and cloud network for their businesses. More than 100,000 trained people are required to manage the IT infrastructure of banks, airports, railway networks and government projects We will also assist the students for their placements through our IT Talent Bank & Embedded Talent Bank. As for as Placement concerned our placement wing is always in action, bringing new on-campus or offcampus interviews for our students
Our Students are working in TCS, IBM, HP, CTS, Wipro, Vetex, HCL, N trust PVT Ltd, Origin ITFA, Care IT Solutions, Precision Infomatic, Ample Tech, Arinos Info Solutions, Bharathi Airtel, Leaap International, Citi Bank, Taj Group, etc..
5000+ Students found their First Job through us since 2007, till date
LOOKING FOR JOBS / PLACEMENTS
Mail your Resume to ncctchennai@gmail.com or Talk to our Placement Head
Partial List of Regular Recruiters We have placed our students in the following Companies... Regular Recruiters... Pan India Job Opportunities
78