SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
2
CONTENTS
ABOUT LANSA INFORMATICS PVT LTD …………………………………….……. PAGE 03
ABOUT STUDENTS CDC ……………………………………………………………………. PAGE 04
STUDENTS EVENTS ………………………………………………………………………….. PAGE 04
SALIENT FEATURES ….………………………………………………………………………. PAGE 05
PROJECT DOMAINS …………………………………………………………………………. PAGE 05
PROJECT TECHNOLOGIES ………………………………………………………………… PAGE 05
PROJECT DELIVERABLES / SUPPORT …………………………………………………. PAGE 06
IEEE 2014 – 2015 DOTNET TITLES .……………………………………………………. PAGE 07
IEEE 2014 – 2015 JAVA TITLES ………………………………………………………….. PAGE 10
IEEEE 2014 – 2015 ANDROID TITLES …………………………………………………. PAGE 13
IEEE 2014 – 2015 MAT LAB TITLES ……………………………………………………. PAGE 14
IEEE 2014 – 2015 NS2 TITLES ……………………………………………………………. PAGE 15
COURSE DEATAILS …………………………………………………………………………… PAGE 16
INTERNSHIP PROGRAM …………………………………………………………………… PAGE 17
CONTACT DEATAILS ………………………………………………………………………… PAGE 18
3
ABOUT LANSA INFORMATICS PVT LTD:
LansA Informatics Pvt Ltd is Company providing outstanding, cost-effective,
effective result authorized on solutions. Our objective is to create solutions that enhance
company process and increase come back in most possible time. We started truly to provide
solutions to the customers all over the world. We have been effectively in providing
solutions for different challenges across a wide range of market and customers propagate
across the globe.
We create unique solutions that make sure enhanced performance and competitive
advantage for your business and end customers. This is obtained by determining customer
need, constantly improving & searching for fixing the needs of customer, choosing
knowledgeable resources, ongoing training.
OUR VISSION & MISSION:
VISION:
 We have a perspective to become a most significant and a powerful company to play a
crucial part in Business development.
 We are dedicated to fulfill and go beyond our customer objectives by providing top
quality solutions always.
 To be the most passionately known organization in all our business sector while
attempting to offer our customers with the best possible support.
MISSION:
 To offer top quality support that merge creativeness with value costs, while developing
an effective relationship with our customers.
 To regularly endeavor to fulfill or surpass our client needs and objectives of price,
support, and selection.
 To this end, we will execute regular opinions of the market to improve the customer
business.
4
ABOUT STUDENTS CDC:
Students CDC (STUDENTS CAREER DEVELOPMENT CENTER) offer unique ideas for the
students. The ideas which we offer are relevant to latest trends and technologies. This is
because we derive ideas from the international technical publications and from our technical
resources. We are supportive to the new ideas and concepts developed by the students. We
help students to implement new idea.
We work with unique methodology to aspire students with success. Our past
students have found project work at our company as a trusted, powerful, affordable and a
successful learning experience. We provide details to the students about their project at
various stages through regular classes and also through detailed technical documentation.
STUDENTS EVENTS:
COLLEGE SYMPOSIUM:
These events are conducted to expose the young talents in an innovative manner. Ideas and
guidance are given for conducting their college events is an innovative manner.
INDUSTRIAL VISIT:
We can arrange for Industrial visits in order to make them useful for their career as well as
memorable event throughout their life.
WORKSHOP / CONFERENCE:
We conduct workshops / conference for college students in latest technologies in
association with various companies together. The main intention of conducting the
workshop for students is to create the awareness for the students to know the latest trends
and technologies in the IT Sector also help to choose their career.
5
SALIENT FEATURES:
1. We are happy to let you know that we offer only projects related to CSE / IT.
2. Projects developed by Experts with rich experience in technology
3. We have been recognized by leading news papers such as
 INDIAN EXPRESS
 DINAKARAN
 DHINAMALAR
4. Organized various workshops and conferences in leading colleges like
 COIMBATORE INSTITUTE OF TECHNOLOGY
 ARJUN COLLEGE OF TECHNOLOGY
5. Trained 5000+ students so far.
PROJECTS DOMAINS:
 Cloud computing
 Networking
 Wireless Communications
 Mobile Computing
 Network Security
 Secure & Dependable Computing
 Data Mining / Knowledge and Data Engineering
 Image processing
 Parallel & Distributed Systems
 Information Security
PROJECT TECHNOLOGIES:
 DOTNET
 JAVA/J2EE/J2ME
 ANDROID
 MATLAB
 NS2
6
PROJECT DELIVERABLES / SUPPORTS FOR STUDENTS:
 PROJECT ABSTRACT
 PROJECT IEEE BASE PAPER/ REFERENCE PAPER
 PROJECT PRESENTATION IN PPT FORMAT
 PROJECT REVIEW ASSISTANCE FOR VIVA
 PROJECT TECHNOLOGY EXPLANATION
 TECHNOLOGY TRAINING
 PROJECT SOURCE CODE
 PROJECT DEMO VIDEO
 PROJECT REPORT
 PROJECT ACCEPTANCE LETTER
 PROJECT COMPLETION CERTIFICATE
7
IEEE 2014 – 2015 DOTNET TITLES
PROJECT CODE TITLE DOMAIN
LAND1401 Oruta: Privacy-Preserving Public Auditing for
Shared Data in the Cloud
CLOUD COMPUTING
LAND1402 Thermal-Aware Scheduling of Batch Jobs in
Geographically Distributed Data Centers
CLOUD COMPUTING
LAND1403 Building Confidential and Efficient Query Services in the
Cloud with RASP Data Perturbation
CLOUD COMPUTING
LAND1404 QoS-Aware Data Replication for Data-Intensive
Applications in Cloud Computing Systems
CLOUD COMPUTING
LAND1405 Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
CLOUD COMPUTING
LAND1406 An Autonomic Approach to Risk-Aware Data Center
Overbooking
CLOUD COMPUTING
LAND1407 Balancing Performance, Accuracy, and Precision
for Secure Cloud Transactions
CLOUD COMPUTING
LAND1408 Privacy-Preserving Multi-Keyword Ranked
Search over Encrypted Cloud Data
CLOUD COMPUTING
LAND1409 Panda: Public Auditing for Shared Data with Efficient
User Revocation in the Cloud
CLOUD COMPUTING
LAND1410 Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
CLOUD COMPUTING
LAND1411 Distributed, Concurrent, and Independent Access
to Encrypted Cloud Databases
CLOUD COMPUTING
LAND1412 Enabling Data Integrity Protection in Regenerating-
Coding-Based Cloud Storage:
Theory and Implementation
CLOUD COMPUTING
LAND1413 Identity-Based Distributed Provable Data Possession in
Multi- Cloud Storage
CLOUD COMPUTING
LAND1414 Key-Aggregate Cryptosystem for Scalable Data Sharing
in Cloud Storage
CLOUD COMPUTING
LAND1415 Consistency as a Service: Auditing Cloud Consistency CLOUD COMPUTING
LAND1416 Shared Authority Based Privacy-preserving CLOUD COMPUTING
8
Authentication Protocol in Cloud Computing
LAND1417 PACK: Prediction-Based Cloud Bandwidth and
Cost Reduction System
NETWORKING
LAND1418 Secure Data Retrieval for Decentralized Disruption-
Tolerant Military Networks
NETWORKING
LAND1419 Reliable and Timely Event Notification for
Publish/Subscribe Services Over the Internet
NETWORKING
LAND1420 Content Caching and Scheduling in Wireless Networks
With Elastic and Inelastic Traffic
NETWORKING
LAND1421 Efficient Ranking on Entity Graphs with Personalized
Relationships
KNOWLEDGE & DATA
ENGINEERING
LAND1422 Secure Mining of Association Rules in Horizontally
Distributed Databases
KNOWLEDGE & DATA
ENGINEERING
LAND1423 TrustedDB: A Trusted Hardware-Based Database with
Privacy and Data Confidentiality
KNOWLEDGE & DATA
ENGINEERING
LAND1424 Data mining with big data KNOWLEDGE & DATA
ENGINEERING
LAND1425 Supporting Privacy Protection in Personalized Web
Search
KNOWLEDGE & DATA
ENGINEERING
LAND1426 LARS*: An Efficient and Scalable Location-Aware
Recommender System
KNOWLEDGE & DATA
ENGINEERING
LAND1427 Product Aspect Ranking and Its Applications KNOWLEDGE & DATA
ENGINEERING
LAND1428 A Cocktail Approach for Travel Package
Recommendation
KNOWLEDGE & DATA
ENGINEERING
LAND1429 Typicality-Based Collaborative Filtering
Recommendation
KNOWLEDGE & DATA
ENGINEERING
LAND1430 Designing Truthful Spectrum Double Auctions with
Local Markets
MOBILE COMPUTING
LAND1431 Enabling Spectrum Sharing in Secondary Market
Auctions
MOBILE COMPUTING
LAND1432 A QoS-Oriented Distributed Routing Protocol for Hybrid
Wireless Networks
MOBILE COMPUTING
LAND1433 Leveraging Social Networks for P2P Content-Based File
Sharing in Disconnected MANETs
MOBILE COMPUTING
LAND1434 Captcha as Graphical Passwords—A New Security
Primitive Based on Hard AI Problems
SECURE COMPUTING
9
LAND1435 Private Searching on Streaming Data Based
on Keyword Frequency
SECURE COMPUTING
LAND1436 Certificateless Remote Anonymous Authentication
Schemes for Wireless Body Area Networks
PARALLEL &
DISTRIBUTED SYSTEMS
LAND1437 Secure and Efficient Data Transmission for Cluster-
Based Wireless Sensor Networks
PARALLEL &
DISTRIBUTED SYSTEMS
LAND1438 SANE: Semantic-Aware Name space in Ultra-Large-Scale
File Systems
PARALLEL &
DISTRIBUTED SYSTEMS
LAND1439 Designing an Efficient Image Encryption-Then-
CompressionSystem via Prediction Error Clustering and
Random Permutation
IMAGE PROCESSING
10
IEEE 2014 – 2015 JAVA TITLES
PROJECT CODE TITLE DOMAIN
LANJ1401 Oruta: Privacy-Preserving Public Auditing for Shared
Data in the Cloud
CLOUD COMPUTING
LANJ1402
Expressive, Efficient, and Revocable Data Access Control for
Multi-Authority Cloud Storage
CLOUD COMPUTING
LANJ1403 Probabilistic Consolidation of Virtual Machines in Self-
Organizing Cloud Data Centers
CLOUD COMPUTING
LANJ1404 Hybrid Attribute- and Re-Encryption-Based Key
Management for Secure and Scalable Mobile
Applications in Clouds
CLOUD COMPUTING
LANJ1405 A Hybrid Cloud Approach for Secure Authorized
Deduplication
CLOUD COMPUTING
LANJ1406 Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
CLOUD COMPUTING
LANJ1407 Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
CLOUD COMPUTING
LANJ1408 Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data
CLOUD COMPUTING
LANJ1409 Key-Aggregate Cryptosystem for Scalable Data Sharing
in Cloud Storage
CLOUD COMPUTING
LANJ1410 A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud Computing Systems
CLOUD COMPUTING
LANJ1411
Scalable Distributed Service Integrity Attestation for
Software-as - a-Service Clouds
CLOUD COMPUTING
LANJ1412 PACK: Prediction-Based Cloud Bandwidth and Cost
Reduction System
CLOUD COMPUTING
LANJ1413 Improving Fairness, Efficiency, and Stability in HTTP-
Based Adaptive Video Streaming With Festive
NETWORKING
LANJ1414 A Study on the Performance of a Three-Stage Load-
Balancing Switch
NETWORKING
LANJ1415 Stochastic Bandwidth Estimation in Networks With
Random Service
NETWORKING
LANJ1416 Cost-Effective Resource Allocation of Overlay Routing
Relay Nodes
NETWORKING
11
LANJ1417 Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
NETWORKING
LANJ1418 Enabling Trustworthy Service Evaluation in Service-
Oriented Mobile Social Networks
NETWORKING
LANJ1419 Keyword Query Routing KNOWLEDGE & DATA
ENGINEERING
LANJ1420 Data mining with big data KNOWLEDGE & DATA
ENGINEERING
LANJ1421 A Cocktail Approach for Travel Package
Recommendation
KNOWLEDGE & DATA
ENGINEERING
LANJ1422 Accuracy-Constrained Privacy-Preserving Access Control
Mechanism for Relational Data
KNOWLEDGE & DATA
ENGINEERING
LANJ1423 BestPeer++: A Peer-to-Peer Based Large-Scale Data
Processing Platform
KNOWLEDGE & DATA
ENGINEERING
LANJ1424 Fast nearest Neighbor Search with Keywords KNOWLEDGE & DATA
ENGINEERING
LANJ1425 Privacy-Preserving and Content-Protecting Location
Based Queries
KNOWLEDGE & DATA
ENGINEERING
LANJ1426
Security Evaluation of Pattern Classifiers under Attack
KNOWLEDGE & DATA
ENGINEERING
LANJ1427 Supporting Privacy Protection in Personalized Web
Search
KNOWLEDGE & DATA
ENGINEERING
LANJ1428 Cooperative Caching for Efficient Data Access in Disruption
Tolerant Networks
MOBILE COMPUTING
LANJ1429 Efficient Authentication for Mobile and Pervasive Computing MOBILE COMPUTING
LANJ1430 Enabling Spectrum Sharing in Secondary Market
Auctions
MOBILE COMPUTING
LANJ1431 Friendbook: A Semantic-based Friend
Recommendation System for Social Networks
MOBILE COMPUTING
LANJ1432 Investigating the Privacy versus Forwarding Accuracy
Tradeoff in Opportunistic Interest-Casting
MOBILE COMPUTING
LANJ1433 Cooperative Caching for Efficient Data Access in
Disruption Tolerant Networks
MOBILE COMPUTING
LANJ1434 Efficient and Privacy-Aware Data Aggregation in Mobile
Sensing
SECURE COMPUTING
12
LANJ1435 Captcha as Graphical Passwords—A New Security
Primitive Based on Hard AI Problems
SECURE COMPUTING
LANJ1436 PROFILR: Toward Preserving Privacy and Functionality in
Geosocial Networks
SECURE COMPUTING
LANJ1437 Ensuring the Performance of Apache HTTP Server
Affected by Aging
SECURE COMPUTING
LANJ1438 Human Effects of Enhanced Privacy Management
Models
SECURE COMPUTING
LANJ1439 Private Searching on Streaming Data Based on Keyword
Frequency
SECURE COMPUTING
LANJ1440 A Scalable and Modular Architecture for High-
Performance Packet Classification
PARALLEL &
DISTRIBUTED SYSTEMS
LANJ1441 LocaWard: A Security and Privacy Aware Location-Based
Rewarding System
PARALLEL &
DISTRIBUTED SYSTEMS
LANJ1442 Signature Searching in a Networked Collection of Files PARALLEL &
DISTRIBUTED SYSTEMS
LANJ1443 TRACON: Interference-Aware Scheduling for Data-
Intensive Applications in Virtualized Environments
PARALLEL &
DISTRIBUTED SYSTEMS
LANJ1444
SOS: A Distributed Mobile Q&A System Based on Social
Networks
PARALLEL &
DISTRIBUTED SYSTEMS
LANJ1445 Trajectory Improves Data Delivery in Urban Vehicular
Networks
PARALLEL &
DISTRIBUTED SYSTEMS
13
IEEE 2014 – 2015 ANDROID TITLES
PROJECT CODE TITLE DOMAIN
LANA1401 Effective Risk Communication For Android Apps SECURE COMPUTING
LANA1402 Reversible Data Hiding In Encrypted Images By
Reserving Room Before Encryption
IMAGE PROCESSING
LANA1403 Catch Me If You Can- Evaluating Android Anti-
Malware Against Transformation Attacks
INFORMATION
FORENSICS AND
SECURITY
LANA1404 Faved! Biometrics: Tell Me Which Image You Like
And I’ll Tell You Who You Are
INFORMATION
FORENSICS AND
SECURITY
LANA1405
How Long To Wait Predicting Bus Arrival Time With
Mobile Phone Based Participatory Sensing
MOBILE COMPUTING
LANA1406
Smartdc: Mobility Prediction-Based Adaptive Duty
Cycling For Everyday Location Monitoring
MOBILE COMPUTING
LANA1407 Moses Supporting And Enforcing Security Profiles On
Smartphones
SECURE COMPUTING
LANA1408 Generating Risk Summary Risk Scores For Mobile
Applications
SECURE COMPUTING
LANA1409 Delta++ Reducing The Size Of Android Application
Updates
INTERNET COMPUTING
LANA1410 Hiding Mobile Crowd Location Privacy Through
Collaboration
SECURE COMPUTING
14
IEEE 2014 – 2015 MAT LAB TITLES
PROJECT CODE TITLE DOMAIN
LANM1401
Scene Text Recognition in Mobile Applications by
Character Descriptor and Structure Configuration IMAGE PROCESSING
LANM1402
Reversible Data Hiding In Encrypted Images By
Reserving Room Before Encryption
IMAGE PROCESSING
LANM1403
Phase-Based Binarization of Ancient Document Images:
Model and Applications
IMAGE PROCESSING
LANM1404
Fingerprint Compression Based on Sparse
Representation
IMAGE PROCESSING
LANM1405
Low-Rank Neighbor Embedding for Single Image
Super-Resolution
IMAGE PROCESSING
LANM1406
BRINT: Binary Rotation Invariant and Noise Tolerant
Texture Classification
IMAGE PROCESSING
LANM1407 An Efficient Parallel Approach for Sclera Vein
Recognition
IMAGE PROCESSING
LANM1408 BRINT: Binary Rotation Invariant and Noise Tolerant
Texture Classification
IMAGE PROCESSING
LANM1409 Digital Image Sharing by Diverse Image Media IMAGE PROCESSING
LANM1410 Mining Weakly Labeled Web Facial Images for Search-
Based Face Annotation
IMAGE PROCESSING
15
IEEE 2014 – 2015 NS2 TITLES
PROJECT CODE TITLE DOMAIN
LANN1401 RBTP: Low-Power Mobile Discovery Protocol through
Recursive Binary Time Partitioning
MOBILE COMPUTING
LANN1402
A Study on False Channel Condition Reporting Attacks
in Wireless Networks
MOBILE COMPUTING
LANN1403
Snapshot and Continuous Data Collection in
Probabilistic Wireless Sensor Networks
MOBILE COMPUTING
LANN1404 Autonomous Mobile Mesh Networks MOBILE COMPUTING
LANN1405
ALBA-R: Load-Balancing Geographic Routing Around
Connectivity Holes in Wireless Sensor Networks
PARALLEL &
DISTRIBUTED SYSTEMS
LANN1406
STARS: A Statistical Traffic Pattern Discovery System for
MANETs
SECURE COMPUTING
LANN1407 Neighbor Table Based Shortcut Tree Routing in ZigBee
Wireless Networks
PARALLEL &
DISTRIBUTED SYSTEMS
LANN1408 Secure and Efficient Data Transmission for Cluster-
Based Wireless Sensor Networks PARALLEL &
DISTRIBUTED SYSTEMS
LANN1409 An Energy-Balanced Routing Method Based on
Forward-Aware
INDUSTRIAL
INFORMATICS
LANN1410 Distributed Deployment Algorithms for Improved
Coverage in a Network of Wireless Mobile Sensors
INDUSTRIAL
INFORMATICS
16
COURSE DEATAILS:
We guide youngsters towards their ambitious Objectives in Technological innovation
through professional IT training and structured activities. We provide students with
right resources for the right system and help them obtain a advantage against their
competitors over others through career management process. Over the past years
our group has efficiently assisted great many students to achieve their professional
goals and set up IT professionalism, reliability within.
If you are looking for to develop your professional career with specialized technical
exposure and certification right from your higher education, we are her to help you.
Experts with expertise over Technical Training, IT empowerment, career Management
will train students in various factors for the professional growth. With various
specialized relationships we always endeavor to improve technical performance for
students and we play a big part the improvement of the technical career of every
student.
TECHNICAL TRAINING:
 C,C++
 DOT NET
 JAVA/ J2EE/ J2ME
 ANDROID
 PHP & MY SQL
 SEO / SMO
 MAT LAB
 NS2
17
INTERNSHIP PROGRAM:
 Internships offers a practical experience to those looking to obtain the
appropriate abilities and knowledge required to start a particular core field.
 Internships are relatively temporary with the main concentrate on getting job
training and getting what exactly student cannot get from the class room and
implementing it to the real time.
 Interns generally have a manager who designates specific projects and analyze
the interns overall performance.
 Many scholars do internships to obtain appropriate practical knowledge in a
particular field. Internships are an excellent way to begin building those all
important relationships that are important in creating and keeping a powerful
professional system for the future.
 An internship includes a return of services and experience between the college
student and a company.
 Students can also use an internship to enhance their career in all the aspects in
a particular technology. Some interns find long lasting, compensated profession
with the companies with which they interned.
 This can be an important benefit to the company as knowledgeable interns
often need little or no coaching when they begin frequent profession.
 Internships for expert professions are similar to apprenticeships for business and
professional tasks. Although interns are generally college or individuals, they can
also be kids or post-graduate grownups.
 On event, they are junior secondary school or even primary learners. Internships
may be compensated or overdue, and are usually recognized to be short-term
roles.
18
CONTACT DETATILS:
Contact Person: PAPITHA VELUMANI
Designation: Managing Director
ADDRESS:
No 165, 5th Street Cross cut Road,
Gandhipuram, Coimbatore – 641 012
Landline: 0422 – 4204373
Mobile: (0)9095395333
Web: www.lansainformatics.com
Blog: www.lansastudentscdc.blogspot.com
Email: lansa.projects@gmail.com

Contenu connexe

Tendances

4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionLeMeniz Infotech
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)IAESIJEECS
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Adz91 Digital Ads Pvt Ltd
 

Tendances (13)

4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Disseration M.Tech
Disseration M.TechDisseration M.Tech
Disseration M.Tech
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 

Similaire à 2014 ieee project list for free, ieee 2014 project abstracts,ieee projects list 2014

SpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, ChinaSpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, ChinaZaighum Malik 赞谋
 
Deliver Business Value Through Cloud Computing
Deliver Business Value Through Cloud ComputingDeliver Business Value Through Cloud Computing
Deliver Business Value Through Cloud Computingduncanhawkins
 
Internship-Report-sample-6.pdf
Internship-Report-sample-6.pdfInternship-Report-sample-6.pdf
Internship-Report-sample-6.pdfAbhiAry
 
Internship-Report-sample-6 (1).pdf
Internship-Report-sample-6 (1).pdfInternship-Report-sample-6 (1).pdf
Internship-Report-sample-6 (1).pdfShankarYadav75
 
Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.CCS Technologies (P) Ltd.
 
Getting Managers to Ride the Cloud
Getting Managers to Ride the CloudGetting Managers to Ride the Cloud
Getting Managers to Ride the CloudDavid Amaya
 
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...Sunil Rajput
 
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)NRB
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
 
SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5Zaighum Malik 赞谋
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Marc Lijour, OCT, BSc, MBA
 

Similaire à 2014 ieee project list for free, ieee 2014 project abstracts,ieee projects list 2014 (20)

SpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, ChinaSpeedyCloud Technologies - Beijing, China
SpeedyCloud Technologies - Beijing, China
 
Deliver Business Value Through Cloud Computing
Deliver Business Value Through Cloud ComputingDeliver Business Value Through Cloud Computing
Deliver Business Value Through Cloud Computing
 
rip 1.pdf
rip 1.pdfrip 1.pdf
rip 1.pdf
 
Internship-Report-sample-6.pdf
Internship-Report-sample-6.pdfInternship-Report-sample-6.pdf
Internship-Report-sample-6.pdf
 
Internship-Report-sample-6 (1).pdf
Internship-Report-sample-6 (1).pdfInternship-Report-sample-6 (1).pdf
Internship-Report-sample-6 (1).pdf
 
Cs internship report file 1.pdf
Cs internship report file 1.pdfCs internship report file 1.pdf
Cs internship report file 1.pdf
 
Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.Application Services - CCS Technologies (P) Ltd.
Application Services - CCS Technologies (P) Ltd.
 
Krunk systems
Krunk systemsKrunk systems
Krunk systems
 
Getting Managers to Ride the Cloud
Getting Managers to Ride the CloudGetting Managers to Ride the Cloud
Getting Managers to Ride the Cloud
 
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
Implementing Saas as Cloud controllers using Mobile Agent based technology wi...
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
 
Project proposal Module
Project proposal ModuleProject proposal Module
Project proposal Module
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5SpeedyCloud Services Introduction Vol-5
SpeedyCloud Services Introduction Vol-5
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
 
Education in 2015
Education in 2015Education in 2015
Education in 2015
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud transition - The Trivadis approach
Cloud transition - The Trivadis approachCloud transition - The Trivadis approach
Cloud transition - The Trivadis approach
 

Plus de Papitha Velumani

2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet Papitha Velumani
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Papitha Velumani
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Papitha Velumani
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchPapitha Velumani
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random servicePapitha Velumani
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksPapitha Velumani
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Papitha Velumani
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Papitha Velumani
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPapitha Velumani
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPapitha Velumani
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPapitha Velumani
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkagePapitha Velumani
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Papitha Velumani
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksPapitha Velumani
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksPapitha Velumani
 

Plus de Papitha Velumani (20)

2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random service
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkage
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networks
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 

Dernier

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

Dernier (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

2014 ieee project list for free, ieee 2014 project abstracts,ieee projects list 2014

  • 1.
  • 2. 2 CONTENTS ABOUT LANSA INFORMATICS PVT LTD …………………………………….……. PAGE 03 ABOUT STUDENTS CDC ……………………………………………………………………. PAGE 04 STUDENTS EVENTS ………………………………………………………………………….. PAGE 04 SALIENT FEATURES ….………………………………………………………………………. PAGE 05 PROJECT DOMAINS …………………………………………………………………………. PAGE 05 PROJECT TECHNOLOGIES ………………………………………………………………… PAGE 05 PROJECT DELIVERABLES / SUPPORT …………………………………………………. PAGE 06 IEEE 2014 – 2015 DOTNET TITLES .……………………………………………………. PAGE 07 IEEE 2014 – 2015 JAVA TITLES ………………………………………………………….. PAGE 10 IEEEE 2014 – 2015 ANDROID TITLES …………………………………………………. PAGE 13 IEEE 2014 – 2015 MAT LAB TITLES ……………………………………………………. PAGE 14 IEEE 2014 – 2015 NS2 TITLES ……………………………………………………………. PAGE 15 COURSE DEATAILS …………………………………………………………………………… PAGE 16 INTERNSHIP PROGRAM …………………………………………………………………… PAGE 17 CONTACT DEATAILS ………………………………………………………………………… PAGE 18
  • 3. 3 ABOUT LANSA INFORMATICS PVT LTD: LansA Informatics Pvt Ltd is Company providing outstanding, cost-effective, effective result authorized on solutions. Our objective is to create solutions that enhance company process and increase come back in most possible time. We started truly to provide solutions to the customers all over the world. We have been effectively in providing solutions for different challenges across a wide range of market and customers propagate across the globe. We create unique solutions that make sure enhanced performance and competitive advantage for your business and end customers. This is obtained by determining customer need, constantly improving & searching for fixing the needs of customer, choosing knowledgeable resources, ongoing training. OUR VISSION & MISSION: VISION:  We have a perspective to become a most significant and a powerful company to play a crucial part in Business development.  We are dedicated to fulfill and go beyond our customer objectives by providing top quality solutions always.  To be the most passionately known organization in all our business sector while attempting to offer our customers with the best possible support. MISSION:  To offer top quality support that merge creativeness with value costs, while developing an effective relationship with our customers.  To regularly endeavor to fulfill or surpass our client needs and objectives of price, support, and selection.  To this end, we will execute regular opinions of the market to improve the customer business.
  • 4. 4 ABOUT STUDENTS CDC: Students CDC (STUDENTS CAREER DEVELOPMENT CENTER) offer unique ideas for the students. The ideas which we offer are relevant to latest trends and technologies. This is because we derive ideas from the international technical publications and from our technical resources. We are supportive to the new ideas and concepts developed by the students. We help students to implement new idea. We work with unique methodology to aspire students with success. Our past students have found project work at our company as a trusted, powerful, affordable and a successful learning experience. We provide details to the students about their project at various stages through regular classes and also through detailed technical documentation. STUDENTS EVENTS: COLLEGE SYMPOSIUM: These events are conducted to expose the young talents in an innovative manner. Ideas and guidance are given for conducting their college events is an innovative manner. INDUSTRIAL VISIT: We can arrange for Industrial visits in order to make them useful for their career as well as memorable event throughout their life. WORKSHOP / CONFERENCE: We conduct workshops / conference for college students in latest technologies in association with various companies together. The main intention of conducting the workshop for students is to create the awareness for the students to know the latest trends and technologies in the IT Sector also help to choose their career.
  • 5. 5 SALIENT FEATURES: 1. We are happy to let you know that we offer only projects related to CSE / IT. 2. Projects developed by Experts with rich experience in technology 3. We have been recognized by leading news papers such as  INDIAN EXPRESS  DINAKARAN  DHINAMALAR 4. Organized various workshops and conferences in leading colleges like  COIMBATORE INSTITUTE OF TECHNOLOGY  ARJUN COLLEGE OF TECHNOLOGY 5. Trained 5000+ students so far. PROJECTS DOMAINS:  Cloud computing  Networking  Wireless Communications  Mobile Computing  Network Security  Secure & Dependable Computing  Data Mining / Knowledge and Data Engineering  Image processing  Parallel & Distributed Systems  Information Security PROJECT TECHNOLOGIES:  DOTNET  JAVA/J2EE/J2ME  ANDROID  MATLAB  NS2
  • 6. 6 PROJECT DELIVERABLES / SUPPORTS FOR STUDENTS:  PROJECT ABSTRACT  PROJECT IEEE BASE PAPER/ REFERENCE PAPER  PROJECT PRESENTATION IN PPT FORMAT  PROJECT REVIEW ASSISTANCE FOR VIVA  PROJECT TECHNOLOGY EXPLANATION  TECHNOLOGY TRAINING  PROJECT SOURCE CODE  PROJECT DEMO VIDEO  PROJECT REPORT  PROJECT ACCEPTANCE LETTER  PROJECT COMPLETION CERTIFICATE
  • 7. 7 IEEE 2014 – 2015 DOTNET TITLES PROJECT CODE TITLE DOMAIN LAND1401 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud CLOUD COMPUTING LAND1402 Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers CLOUD COMPUTING LAND1403 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation CLOUD COMPUTING LAND1404 QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems CLOUD COMPUTING LAND1405 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds CLOUD COMPUTING LAND1406 An Autonomic Approach to Risk-Aware Data Center Overbooking CLOUD COMPUTING LAND1407 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions CLOUD COMPUTING LAND1408 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data CLOUD COMPUTING LAND1409 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud CLOUD COMPUTING LAND1410 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds CLOUD COMPUTING LAND1411 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases CLOUD COMPUTING LAND1412 Enabling Data Integrity Protection in Regenerating- Coding-Based Cloud Storage: Theory and Implementation CLOUD COMPUTING LAND1413 Identity-Based Distributed Provable Data Possession in Multi- Cloud Storage CLOUD COMPUTING LAND1414 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage CLOUD COMPUTING LAND1415 Consistency as a Service: Auditing Cloud Consistency CLOUD COMPUTING LAND1416 Shared Authority Based Privacy-preserving CLOUD COMPUTING
  • 8. 8 Authentication Protocol in Cloud Computing LAND1417 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System NETWORKING LAND1418 Secure Data Retrieval for Decentralized Disruption- Tolerant Military Networks NETWORKING LAND1419 Reliable and Timely Event Notification for Publish/Subscribe Services Over the Internet NETWORKING LAND1420 Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic NETWORKING LAND1421 Efficient Ranking on Entity Graphs with Personalized Relationships KNOWLEDGE & DATA ENGINEERING LAND1422 Secure Mining of Association Rules in Horizontally Distributed Databases KNOWLEDGE & DATA ENGINEERING LAND1423 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality KNOWLEDGE & DATA ENGINEERING LAND1424 Data mining with big data KNOWLEDGE & DATA ENGINEERING LAND1425 Supporting Privacy Protection in Personalized Web Search KNOWLEDGE & DATA ENGINEERING LAND1426 LARS*: An Efficient and Scalable Location-Aware Recommender System KNOWLEDGE & DATA ENGINEERING LAND1427 Product Aspect Ranking and Its Applications KNOWLEDGE & DATA ENGINEERING LAND1428 A Cocktail Approach for Travel Package Recommendation KNOWLEDGE & DATA ENGINEERING LAND1429 Typicality-Based Collaborative Filtering Recommendation KNOWLEDGE & DATA ENGINEERING LAND1430 Designing Truthful Spectrum Double Auctions with Local Markets MOBILE COMPUTING LAND1431 Enabling Spectrum Sharing in Secondary Market Auctions MOBILE COMPUTING LAND1432 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE COMPUTING LAND1433 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs MOBILE COMPUTING LAND1434 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems SECURE COMPUTING
  • 9. 9 LAND1435 Private Searching on Streaming Data Based on Keyword Frequency SECURE COMPUTING LAND1436 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks PARALLEL & DISTRIBUTED SYSTEMS LAND1437 Secure and Efficient Data Transmission for Cluster- Based Wireless Sensor Networks PARALLEL & DISTRIBUTED SYSTEMS LAND1438 SANE: Semantic-Aware Name space in Ultra-Large-Scale File Systems PARALLEL & DISTRIBUTED SYSTEMS LAND1439 Designing an Efficient Image Encryption-Then- CompressionSystem via Prediction Error Clustering and Random Permutation IMAGE PROCESSING
  • 10. 10 IEEE 2014 – 2015 JAVA TITLES PROJECT CODE TITLE DOMAIN LANJ1401 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud CLOUD COMPUTING LANJ1402 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage CLOUD COMPUTING LANJ1403 Probabilistic Consolidation of Virtual Machines in Self- Organizing Cloud Data Centers CLOUD COMPUTING LANJ1404 Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds CLOUD COMPUTING LANJ1405 A Hybrid Cloud Approach for Secure Authorized Deduplication CLOUD COMPUTING LANJ1406 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds CLOUD COMPUTING LANJ1407 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases CLOUD COMPUTING LANJ1408 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data CLOUD COMPUTING LANJ1409 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage CLOUD COMPUTING LANJ1410 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CLOUD COMPUTING LANJ1411 Scalable Distributed Service Integrity Attestation for Software-as - a-Service Clouds CLOUD COMPUTING LANJ1412 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System CLOUD COMPUTING LANJ1413 Improving Fairness, Efficiency, and Stability in HTTP- Based Adaptive Video Streaming With Festive NETWORKING LANJ1414 A Study on the Performance of a Three-Stage Load- Balancing Switch NETWORKING LANJ1415 Stochastic Bandwidth Estimation in Networks With Random Service NETWORKING LANJ1416 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes NETWORKING
  • 11. 11 LANJ1417 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks NETWORKING LANJ1418 Enabling Trustworthy Service Evaluation in Service- Oriented Mobile Social Networks NETWORKING LANJ1419 Keyword Query Routing KNOWLEDGE & DATA ENGINEERING LANJ1420 Data mining with big data KNOWLEDGE & DATA ENGINEERING LANJ1421 A Cocktail Approach for Travel Package Recommendation KNOWLEDGE & DATA ENGINEERING LANJ1422 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data KNOWLEDGE & DATA ENGINEERING LANJ1423 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform KNOWLEDGE & DATA ENGINEERING LANJ1424 Fast nearest Neighbor Search with Keywords KNOWLEDGE & DATA ENGINEERING LANJ1425 Privacy-Preserving and Content-Protecting Location Based Queries KNOWLEDGE & DATA ENGINEERING LANJ1426 Security Evaluation of Pattern Classifiers under Attack KNOWLEDGE & DATA ENGINEERING LANJ1427 Supporting Privacy Protection in Personalized Web Search KNOWLEDGE & DATA ENGINEERING LANJ1428 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks MOBILE COMPUTING LANJ1429 Efficient Authentication for Mobile and Pervasive Computing MOBILE COMPUTING LANJ1430 Enabling Spectrum Sharing in Secondary Market Auctions MOBILE COMPUTING LANJ1431 Friendbook: A Semantic-based Friend Recommendation System for Social Networks MOBILE COMPUTING LANJ1432 Investigating the Privacy versus Forwarding Accuracy Tradeoff in Opportunistic Interest-Casting MOBILE COMPUTING LANJ1433 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks MOBILE COMPUTING LANJ1434 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing SECURE COMPUTING
  • 12. 12 LANJ1435 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems SECURE COMPUTING LANJ1436 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks SECURE COMPUTING LANJ1437 Ensuring the Performance of Apache HTTP Server Affected by Aging SECURE COMPUTING LANJ1438 Human Effects of Enhanced Privacy Management Models SECURE COMPUTING LANJ1439 Private Searching on Streaming Data Based on Keyword Frequency SECURE COMPUTING LANJ1440 A Scalable and Modular Architecture for High- Performance Packet Classification PARALLEL & DISTRIBUTED SYSTEMS LANJ1441 LocaWard: A Security and Privacy Aware Location-Based Rewarding System PARALLEL & DISTRIBUTED SYSTEMS LANJ1442 Signature Searching in a Networked Collection of Files PARALLEL & DISTRIBUTED SYSTEMS LANJ1443 TRACON: Interference-Aware Scheduling for Data- Intensive Applications in Virtualized Environments PARALLEL & DISTRIBUTED SYSTEMS LANJ1444 SOS: A Distributed Mobile Q&A System Based on Social Networks PARALLEL & DISTRIBUTED SYSTEMS LANJ1445 Trajectory Improves Data Delivery in Urban Vehicular Networks PARALLEL & DISTRIBUTED SYSTEMS
  • 13. 13 IEEE 2014 – 2015 ANDROID TITLES PROJECT CODE TITLE DOMAIN LANA1401 Effective Risk Communication For Android Apps SECURE COMPUTING LANA1402 Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption IMAGE PROCESSING LANA1403 Catch Me If You Can- Evaluating Android Anti- Malware Against Transformation Attacks INFORMATION FORENSICS AND SECURITY LANA1404 Faved! Biometrics: Tell Me Which Image You Like And I’ll Tell You Who You Are INFORMATION FORENSICS AND SECURITY LANA1405 How Long To Wait Predicting Bus Arrival Time With Mobile Phone Based Participatory Sensing MOBILE COMPUTING LANA1406 Smartdc: Mobility Prediction-Based Adaptive Duty Cycling For Everyday Location Monitoring MOBILE COMPUTING LANA1407 Moses Supporting And Enforcing Security Profiles On Smartphones SECURE COMPUTING LANA1408 Generating Risk Summary Risk Scores For Mobile Applications SECURE COMPUTING LANA1409 Delta++ Reducing The Size Of Android Application Updates INTERNET COMPUTING LANA1410 Hiding Mobile Crowd Location Privacy Through Collaboration SECURE COMPUTING
  • 14. 14 IEEE 2014 – 2015 MAT LAB TITLES PROJECT CODE TITLE DOMAIN LANM1401 Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration IMAGE PROCESSING LANM1402 Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption IMAGE PROCESSING LANM1403 Phase-Based Binarization of Ancient Document Images: Model and Applications IMAGE PROCESSING LANM1404 Fingerprint Compression Based on Sparse Representation IMAGE PROCESSING LANM1405 Low-Rank Neighbor Embedding for Single Image Super-Resolution IMAGE PROCESSING LANM1406 BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification IMAGE PROCESSING LANM1407 An Efficient Parallel Approach for Sclera Vein Recognition IMAGE PROCESSING LANM1408 BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification IMAGE PROCESSING LANM1409 Digital Image Sharing by Diverse Image Media IMAGE PROCESSING LANM1410 Mining Weakly Labeled Web Facial Images for Search- Based Face Annotation IMAGE PROCESSING
  • 15. 15 IEEE 2014 – 2015 NS2 TITLES PROJECT CODE TITLE DOMAIN LANN1401 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning MOBILE COMPUTING LANN1402 A Study on False Channel Condition Reporting Attacks in Wireless Networks MOBILE COMPUTING LANN1403 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks MOBILE COMPUTING LANN1404 Autonomous Mobile Mesh Networks MOBILE COMPUTING LANN1405 ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks PARALLEL & DISTRIBUTED SYSTEMS LANN1406 STARS: A Statistical Traffic Pattern Discovery System for MANETs SECURE COMPUTING LANN1407 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks PARALLEL & DISTRIBUTED SYSTEMS LANN1408 Secure and Efficient Data Transmission for Cluster- Based Wireless Sensor Networks PARALLEL & DISTRIBUTED SYSTEMS LANN1409 An Energy-Balanced Routing Method Based on Forward-Aware INDUSTRIAL INFORMATICS LANN1410 Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile Sensors INDUSTRIAL INFORMATICS
  • 16. 16 COURSE DEATAILS: We guide youngsters towards their ambitious Objectives in Technological innovation through professional IT training and structured activities. We provide students with right resources for the right system and help them obtain a advantage against their competitors over others through career management process. Over the past years our group has efficiently assisted great many students to achieve their professional goals and set up IT professionalism, reliability within. If you are looking for to develop your professional career with specialized technical exposure and certification right from your higher education, we are her to help you. Experts with expertise over Technical Training, IT empowerment, career Management will train students in various factors for the professional growth. With various specialized relationships we always endeavor to improve technical performance for students and we play a big part the improvement of the technical career of every student. TECHNICAL TRAINING:  C,C++  DOT NET  JAVA/ J2EE/ J2ME  ANDROID  PHP & MY SQL  SEO / SMO  MAT LAB  NS2
  • 17. 17 INTERNSHIP PROGRAM:  Internships offers a practical experience to those looking to obtain the appropriate abilities and knowledge required to start a particular core field.  Internships are relatively temporary with the main concentrate on getting job training and getting what exactly student cannot get from the class room and implementing it to the real time.  Interns generally have a manager who designates specific projects and analyze the interns overall performance.  Many scholars do internships to obtain appropriate practical knowledge in a particular field. Internships are an excellent way to begin building those all important relationships that are important in creating and keeping a powerful professional system for the future.  An internship includes a return of services and experience between the college student and a company.  Students can also use an internship to enhance their career in all the aspects in a particular technology. Some interns find long lasting, compensated profession with the companies with which they interned.  This can be an important benefit to the company as knowledgeable interns often need little or no coaching when they begin frequent profession.  Internships for expert professions are similar to apprenticeships for business and professional tasks. Although interns are generally college or individuals, they can also be kids or post-graduate grownups.  On event, they are junior secondary school or even primary learners. Internships may be compensated or overdue, and are usually recognized to be short-term roles.
  • 18. 18 CONTACT DETATILS: Contact Person: PAPITHA VELUMANI Designation: Managing Director ADDRESS: No 165, 5th Street Cross cut Road, Gandhipuram, Coimbatore – 641 012 Landline: 0422 – 4204373 Mobile: (0)9095395333 Web: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com Email: lansa.projects@gmail.com