Você está na página 1de 12

Project Training 2010-11

About Us

 Cegonsoft is a Bangalore based IT Training and Software Development center with an exclusive
expertise in the area of HR consultancy. Cegonsoft has mushroomed out into 3 branches in
Bangalore, 4 branches in North Karnataka, 3 branches in Chennai, and 2 branches in
Coimbatore.

 Cegonsoft takes great pleasure in mentioning that we have tie ups with companies such as IBM
and Tally.

 Cegonsoft provides Job oriented IT Training in the platforms such as PHP & Mysql, Rich Internet
Application – RIA, LAMP, Software Testing, Java/J2EE and .NET.

 After extensive we found a big gap in technology transfer between industries and educational
institutions. Our mission is to act as a catalyst and in one sentence; we are wanted to bridge the
gap between the industry and educational institutions. Cegonsoft gives Project Training for the
Final year Students to the Under Graduate and Postgraduate , Diploma and Engineering
Students from CS and IT background.

 As a part of the projects and development training, we offer Projects keeping in view the latest
emerging trends and training in Software Design and Development which enables the Students
to meet the industrial requirements with a wider knowledge and a greater confidence.

Milestones

 In the last academic year, 2009-10, we have trained more than 3000 project students.

 So far we have trained more than 15000 project students.

 We have been conducting seminars on the recent trends of technology in various colleges.

 Our research projects had participated in various National and International Conferences.

 Most of our projects were identified by the industries as suitable for their needs.

 Over ten projects were focused by media and awarded by various industrial & Government
bodies.

 We have offered Projects to students of various Engineering and Arts & Science Colleges in India
as well as abroad.

2
About IEEE

IEEE is the world’s largest professional association dedicated to advancing technological


innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community
through IEEE's highly cited publications, conferences, technology standards, and professional and
educational activities.

IEEE creates an environment where members collaborate on world‐changing technologies –


from computing and sustainable energy systems, to aerospace, communications, robotics, healthcare,
and more. The strategic plan of IEEE is driven by an envisioned future that realizes the full potential of
the role of IEEE in advancing technology for humanity. The IEEE Brand Identity Toolkit explains the basic
usage rules for all corporate identity elements and how to utilize them to create powerful and
consistent communications pieces.

IEEE Goals and Objectives

Chartered by IEEE Software Engineering Standards Committee to:

 Define direction for incorporating architectural thinking into IEEE standards


 Take a “wide scope” interpretation of architecture as applicable to software-intensive systems
 Establish a conceptual framework and vocabulary for talking about architectural issues of
systems
 Identify and promulgate sound architectural practices
 Allow for the evolution of those practices as relevant technologies mature

What is Application Project?

Desktop Application:

Desktop Applications that work offline and run off the web browser

Web Application:

Web Applications are end-products of in-depth analysis and understanding of client’s


requirements. Configured to suit client’s IT requirements, our web applications help enterprises steer
clear of corporate stigmata like processing-delays, information-thefts and problems in data access or
recovery. With exclusive business-enhancing features, our applications come with cross-platform
compatibility (i.e., Windows, Mac, Linux, etc.) and can be easily integrated into other web procedures.

Networking Application:

the act of working using computer network; the act of connecting computers into network; the act of
meeting new people in a business or social context

3
ABOUT DOMAIN AND TECHNOLOGIES

JAVA

IEEE- TRANSACTIONS ON NETWORKING

IEEE- TRANSACTIONS ON NETWORK SECURITY

IEEE-TRANSACTIONS ON DEPENDABLE AND SECURED COMPUTING

IEEE- TRANSACTIONS ON NETWORKING COMMUNICATION

IEEE- TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM

IEEE- TRANSACTIONS ON MOBILE COMPUTING

IEEE- TRANSACTIONS ON WIRELESS COMMUNICATION

IEEE- TRANSACTIONS ON CLOUD COMPUTING

IEEE-TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING

DOTNET

IEEE-TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING

IEEE- TRANSACTIONS ON NETWORKING

IEEE-TRANSACTIONS ON DEFENDABLE AND SECURED COMPUTING

IEEE- TRANSACTIONS ON CLOUD COMPUTING

IEEE- TRANSACTIONS ON NETWORK SECURITY

JAVA

NON IEEE- WINDOWS APPLICATION

NETWORKING APPLICATION

WEB BASED APPLICATION

DOTNET

NON IEEE- WINDOWS APPLICATION

NETWORKING APPLICATION

WEB BASED APPLICATION

PHP

NON IEEE- WEB BASED APPLICATION

4
Transaction Definition

Networking:

Computer networking is the engineering discipline concerned with the communication between
computer systems or devices. A computer network is any set of computers or devices connected to each
other with the ability to exchange data. ...

Network Security:

In the field of networking, the specialist area of network security consists of the provisions made
in an underlying computer network infrastructure, policies adopted by the network administrator to
protect the network and the network-accessible resources from unauthorized access, and consistent ...

Dependable and Secured Computing:

TDSC (Transaction on Dependable and Secured Computing) is a quarterly journal that publishes
archival research results focusing on foundations, methodologies, and mechanisms that support the
achievement—through design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising performance.

Networking Communication:

In a network communication system enabling copying and mutual reflection of definition


information among a plurality of systems interconnected over a backbone network, each of the plurality
of systems has a host control unit for transferring definition information for communication with other
system and manipulating received definition information, and a database for storing manipulated
definition information. The host control unit includes an element for acquiring predefined network
definition information for use in communication intended for copying, an element for copying definition
information from a distributor-side system for distributing definition information, an element for
referencing the copied definition information so as to specify a connection form of a communication
resource governed by said distributor-side system, and an element for using the acquired network
definition information to set communication path information concerning the distributor-side system in
the copied definition information according to the specified connection form of a communication
resource. Definition information manipulated by these elements is stored in the distributor-side system.
Communication with the distributor-side system is effected based on the definition information. This
configuration enables one system to share network definition information with other systems and
permits reduction of a load of system management resulting from modification of definition
information. The above network operation mode can apply to any network constructed to have a
network topology of a LAN, WAN, or the like.

Parallel and Distributed System:

A distributed system consists of a collection of autonomous computers linked by a computer


network and equipped with distributed system software. This software enables computers to coordinate
their activities and to share the resources of the system hardware, software, and data. Users of a
distributed system should perceive a single, integrated computing facility even though it may be

5
implemented by many computers in different locations. This is in contrast to a network, where the user
is aware that there are several machines whose locations, storage replications, load balancing, and
functionality are not transparent. Benefits of distributed systems include bridging geographic distances,
improving performance and availability, maintaining autonomy, reducing cost, and allowing for
interaction.

Mobile Computing:

Mobile computing is a generic term describing one's ability to use technology while moving, as
opposed to portable computers, which are only practical for use while deployed in a stationary
configuration.

Wireless Communication:

Wireless communication is the transfer of information over a distance without the use of
electrical conductors or "wires". The distances involved may be short (a few meters as in
television remote control) or long (thousands or millions of kilometers for radio communications).
...

Cloud Computing:

Cloud computing is Internet-based computing, whereby shared resources, software and


information are provided to computers and other devices on-demand, like electricity.

Knowledge and Data Engineering:

KE is an engineering discipline that involves integrating knowledge into computer systems in


order to solve complex problems normally requiring a high level of human expertise

Image Processing:

In electrical engineering and computer science, image processing is any form of signal
processing for which the input is an image, such as a photograph or video frame; the output of image
processing may be either an image or, a set of characteristics or parameters related to the image. Most
image-processing techniques involve treating the image as a two-dimensional signal and applying
standard signal-processing techniques to it.

Image processing usually refers to digital image processing, but optical and analog image processing also
are possible. is an engineering discipline that involves integrating knowledge into computer systems in
order to solve complex problems normally requiring a high level of human expertise

6
IEEE (2010-2011) PROJECT TITLES

DOMAIN: IEEE TRANSACTIONS ON NETWORKING


CODE PROJECT TITLES YEAR TECHNOLOGY
Distributed Explicit Rate Schemes in Multi -Input–Multi-Output
JNW01 2010 JAVA
Network Systems.
Building Dynamic Social Network From Sensory Data Feed-
JNW02 2010 JAVA
Networking
A Dynamic En-route Filtering Scheme for Data Reporting in Wireless
JNW03 2010 JAVA
sensor Networks-Networking
High-Bandwidth Network Memory System Through
JNW04 2009 JAVA
Virtual Pipelines
JNW05 Dual Link Failure Resiliency through Backup Path Mutual Exclusion 2008 JAVA
A Model-Based Approach to Evaluation of the Efficacy of FEC Coding
JNW06 2008 JAVA
in Combating Network Packet Losses
JNW07 Securing User-Controlled Routing Infrastructures 2008 JAVA
Rate & Delay Guarantees Provided
JNW08 2008 JAVA
by Close Packet Switches with Load Balancing
VOVO: VCR-Oriented Video-on-Demand in
JNW09 2009 JAVA
Large-Scale Peer-to-Peer Networks
DNW01 Conditional Shortest Path Routing in Delay Tolerant Networks. 2010 DOTNET
Slow Adaptive OFDMA Systems Through Chance Constrained
DNW02 2010 DOTNET
Programming.
Pricing under Constraints in Access Networks Revenue Maximization
DNW03 2010 DOTNET
and Congestion Management.
DNW04 Virus Spread in Networks 2009 DOTNET
DNW05 Cell Breathing Techniques for Load Balancing in Wireless LANs 2009 DOTNET
DOMAIN: IEEE TRANSACTION ON NETWORKING COMMUNICATION
on Modeling, Analysis, and Optimization of Packet Aggregation
JNC01 2010 JAVA
Systems

DOMAIN: IEEE TRANSACTION ON WIRELESS COMMUNICATION


Multicast Multi-path Power Efficient Routing in Mobile ADHOC
JWC01 2010 JAVA
networks

DOMAIN: IEEE TRANSACTION ON KNOWLEDGE AND DATA ENGINEERING


JKDE01 A Binary String Approach for Updates in Dynamic Ordered XML Data 2010 JAVA
Adaptive Join Operators for Result Rate Optimization on Streaming
DKDE01 2010 DOTNET
Inputs
SPOT Databases: Efficient Consistency Checking and Optimistic
JKDE02 2009 JAVA
Selection in Probabilistic Spatial Databases
Batch Mode Active Learning with Applications to Text Categorization
JKDE03 2009 JAVA
and Image Retrieval
DKDE02 valuating the Effectiveness of Personalized Web Search 2009 DOTNET

7
DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY
Impact of Feature Reduction on the Efficiency of Wireless Intrusion
JNS01 2010 JAVA
Detection Systems.
MPSteg-Color: Data Hiding Through Redundant
JSN02 2009 JAVA
Basis Decomposition
Evaluating the Vulnerability of Network Traffic Using Joint Security
JNS03 2009 JAVA
and Routing Analysis
JNS04 Cryptanalysis of a Generalized Ring Signature Scheme 2009 JAVA
The Design of a Generic Intrusion-Tolerant Architecture for Web
JNS05 2009 JAVA
Servers
JNS06 Online Detection and Prevention of Phishing Attacks 2009 J2EE
An Abuse Free Fair Contract Signing Protocol Based on the RSA
DNS01 2010 DOTNET
Signature
DNS02 Spread-Spectrum Watermarking Security 2009 DOTNET

DOMIAN:IEEE TRANSACTION ON DEPENDABLE AND SECURED COMPUTING


Layered Approach Using Conditional Random Fields for Intrusion
JDSC01 2010 JAVA
Detection
DDSC01 SigFree A Signature-free Buffer Overflow Attack Blocker 2010 DOTNET

DOMAIN:IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEM


A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer
JPDS01 2010 JAVA
Streaming
JPDS02 Correlation-Based Traffic Analysis Attacks on Anonymity Networks 2010 JAVA
Cooperative Caching in Wireless P2P Networks Design,
JPDS03 2010 JAVA
Implementation, and Evaluation
JPDS04 Full-Information Lookups for Peer-to-Peer Overlays 2009 JAVA
JPDS05 Multi-path Dissemination in Regular Mesh Topologies 2009 JAVA
JPDS06 Detecting Malicious Packet Losses 2009 JAVA
Hybrid Scheduling of Dynamic Task Graphs with Selective Duplication
JPDS07 for Multiprocessors under 2008 JAVA
Memory and Time Constraints
Optimal state allocation for multicast
JPDS08 2008 JAVA
communication with explicit forwarding
Efficient and Secured content processing using cooperative
JPDS09 2008 JAVA
intermediaries
The Server Reassignment Problem for Load
JPDS10 2008 JAVA
Balancing in Structured Peer to Peer Systems

8
DOMAIN:IEEE TRANSACTION ON MOBILE COMPUTING
JMC01 Bandwidth recycling in IEEE 802.16 Networks. 2010 JAVA
Optimal Jamming Attacks and Network Defense Policies in Wireless
JMC02 2010 JAVA
Sensor Networks
on Multichip Distances in Wireless Sensor Networks with Random
JMC03 2010 JAVA
Node Locations
Secure Data Collection in Wireless Sensor Networks Using
JMC04 2010 JAVA
Randomized Dispersive Routes-Mobile Computing
MABS: Multicast Authentication Based on Batch Signature-Mobile
JMC05 2010 JAVA
Computing
Continuous Monitoring of Spatial Queries in Wireless Broadcast
JMC06 2009 JAVA
Environments
MAC Protocol for Opportunistic Cognitive Radio Networks wIth Soft
JMC07 2009 JAVA
Guarantees
CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile
JMC08 2009 JAVA
Networks
JMC09 Bandwidth Estimation for IEEE 802.11-based Ad Hoc Networks 2008 JAVA
The Beacon Movement Detection Problem in Wireless Sensor
DMC01 2009 DOTNET
Networks for Localization Applications
A Novel Scheduled Power Saving
DMC02 2009 DOTNET
Mechanism for 802.11 Wireless LANs
Analysis of Enhanced Collision Avoidance
DMC03 Scheme Proposed for IEEE 802.11e-Enhanced 2009 DOTNET
Distributed Channel Access Protocol
MDPF: Minimum Distance Packet Forwarding for Search Applications
DMC04 2009 DOTNET
in Mobile Ad Hoc Networks
Message Authentication in Computationally Constrained
DMC05 2009 DOTNET
Environments

DOMAIN:IEEE TRANSACTION ON CLOUD COMPUTING


JCC01 Ensuring Data Storage Security in Cloud Computing 2010 JAVA
DCC01 Fuzzy Keyword Search over Encrypted Data in Cloud Computing 2010 DOTNET
Achieving Secure, Scalable, and Fine-grained Data Access Control in
DCC02 2010 DOTNET
Cloud Computing

9
APPLICATION PROJECTS (WINDOWS/WEB/NETWORKING APPLICATION)

CODE PROJECT TITLES TECHNOLOGY


1 Air Freight Pursue J2EE
2 Distributed Channel Management System J2EE
3 Online Share Trading System J2EE
4 File Tracking System J2EE
5 Project Monitoring System J2EE
6 Stream Line Data Routing J2EE
7 ISO Audit System J2EE
8 Advanced Secured System J2EE
9 Defect Tracking Template J2EE
10 Activity Management System J2EE
11 Business Processing System J2EE
12 Call Center Management J2EE
13 Contrivance Planning Management System J2EE
14 Corporate Recruitment System J2EE
15 Ebanking J2EE
16 On The Heel Property Search J2EE
17 ERP_Business Organization J2EE
18 eTime Office J2EE
19 Inventory in ERP J2EE
20 Medical Information System J2EE
21 Location based Cellular Network J2EE
22 Contrivance Planning Management JAVA
23 Firewall JAVA
24 JPEG2000 JAVA
25 Poker JAVA
26 Library Management JAVA
27 Distributed Global Roaming Mobile N/w JAVA N/W
28 Geometric Approach to improving Active Packet Loss measurement JAVA N/W
29 Controlling IP Spoofing through Inter domain Packet Filters JAVA N/W
30 Rectified Probabilistic Packet Marking Algorithm JAVA N/W
31 Optimal scheduling scheme for differentiated services network JAVA N/W
32 Virtual Private Network JAVA N/W
33 Remote Network Administration JAVA N/W
34 Virtual Desktop E-Learning JAVA N/W
35 Client Control JAVA N/W
36 Activity Resource Planning VB.NET
37 Advertisement Prominence Media VB.NET
38 Automated Component Maintenance Engine VB.NET
39 ERP for an Inclusive Federation VB.NET
40 Escort Management System VB.NET
41 Knitting Executive Scheme VB.NET
42 Project Monitoring System VB.NET
43 Concurrent Version Scheme VB.NET

10
44 Pecuniary Accounting Scheme VB.NET
45 Recruiter Mechanism VB.NET
46 Therapeutic Scrutinizing Scheme VB.NET
47 Trainee Management System VB.NET
48 Transport Management System VB.NET
49 Voyage Bureau Automation VB.NET
50 Relevance Development Venture VB.NET
51 ISO Audit System VB.NET
52 LAN Search Engine VB.NET N/W
53 Mobile Phone File Transferring Using IROBEX VB.NET N/W
54 Competitor Mining with WEB VB.NET
55 Watermarking Relational Database Using Optimization-Based Techniques VB.NET
56 Advanced Secured System ASP.NET
57 Advertisement Prominence Media ASP.NET
58 Air Freight Pursue ASP.NET
59 Art Gallery Informatics System ASP.NET
60 Assay Cope Executive Loom ASP.NET
61 Business Processing System ASP.NET
62 Customer Relationship Management ASP.NET
63 Central Excise Mechanized Statutory ASP.NET
64 Business to Customer Communication ASP.NET
65 I-FAKTOR Testimony Bureau ASP.NET
66 Concurrent Version Scheme ASP.NET
67 Defect Tracking System ASP.NET
68 E-Redilink ASP.NET
69 ESMART ASP.NET
70 Fashion Tech Explore Modularity ASP.NET
71 File Tracking System ASP.NET
72 Human Resource Management ASP.NET
73 Mobile Computing Project ASP.NET
74 Nautical Telematic System ASP.NET
75 Retailer Network Systemize ASP.NET
76 Online Share Trading System ASP.NET
77 On The Heel Property Search ASP.NET
78 Online Voting System ASP.NET
79 ORBI Lending Cycle ASP.NET
80 Outlandish exchange Tidings ASP.NET
81 Project Monitoring System ASP.NET
82 S2S Gateway ASP.NET
83 Search Engine Optimization ASP.NET
84 Streamline Data Router ASP.NET
85 Warehouse Execution Scheme ASP.NET
86 Enhanced Delegation-Based Authentication ProtocolFor PCSS ASP.NET
A communication Perspective on automatic
87 VB.NET+C#
Text categorization
88 Database Consistency ASP.NET+VB
89 A Divide-and-Conquer Approach for Minimum Spanning Tree-Based Clustering C#.NET
90 Dynamic web Service composition Web Service C#.NET
91 Ontology with dynamic linking ASP.NET+C#
92 Business Processing System PHP/MYSQL
93 Business to Customer Communication PHP/MYSQL

11
94 ESMART PHP/MYSQL
95 Human Resource Procurement PHP/MYSQL
96 I-FAKTOR Testimony Bureau PHP/MYSQL
97 Nautical Telematic System PHP/MYSQL
98 S2S Gateway PHP/MYSQL
99 Theraputic Scrutinizing Scheme PHP/MYSQL
100 Retailer Network Systemize PHP/MYSQL
101 Defect Tracking Template PHP/MYSQL
102 Streamline Data Router PHP/MYSQL
103 Outlandish Exchange Tidings PHP/MYSQL
104 On The Heel Property Search PHP/MYSQL
105 Distributed Channel Management System PHP/MYSQL
106 ISO Audit System PHP/MYSQL
107 Online Share Trading System PHP/MYSQL
108 Voyage Bureau Automation PHP/MYSQL
109 Air Freight Pursue PHP/MYSQL
110 Online Banking PHP/MYSQL
111 Online Cool Shopping PHP/MYSQL
112 Online Library PHP/MYSQL
113 Project Monitoring System PHP/MYSQL

12

Você também pode gostar