www.inplanttraining.org Uniq Technologies Chennai : Inplant Training

+ Ask Question / Post resume
Results 1 to 6 of 6
  1. Post Count Number #1
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    www.inplanttraining.org Uniq Technologies Chennai : Inplant Training

    We are UNIQ TECHNOLOGIES (ISO 9001:2008 Certified) - a specialized SOFTWARE DEVELOPMENT company founded by professionals from leading MNCs like TCS,WIPRO,IBM,CTS,Accenture - having its operation based in Chennai since 2007.

    We are offering In Plant Training (IPT) Program for engineering students.
    Please refer below the technical areas which we cover in our In Plant Training program.
    1. Software Development
    i) Requirement Analysis - Rational rose
    ii) High Level Design (HLD) - Visio
    iii) Low Level Design (LLD) - Borland
    iv) Development (Code Construction)
    1. Database Structure - Oracle/MySQL
    2. Server Side Scripting - J2EE (Eclipse/Netbeans)
    v) Testing
    Performance Testing - Load Runner
    Regression Testing - QTP
    vi) Deployment
    2. Website Development
    (i) Domain Registration
    (ii) IP address mapping
    (iii) Web page development
    1.Photoshop
    2.Flash
    3.Dreamweaver
    (iv) Hosting

    Join today and make an investment for your future

    Note : Interested students are informed to register their details at the earliest.

    inplant training, inplant training in chennai, In Plant Training Program
    - IPT program
    - InPlant Training for Engineering Students,inplant training meaning
    - Free In Plant Training -inplant training, Industrial Visit in Chennai
    - Internship in Chennai InPlant Training for Computer Science Students inplant training for information technology students Java Course
    - Dot Net Course
    - Multimedia Course
    - Android training in chennai

    The training program is absolutely practical.
    Professional Certificates will be awarded at the end of the inplant training program.
    Join today and make an investment for your future
    Note : Interested students are informed to register their details at the earliest.
    For further details please visit http://www.inplanttraining.org/

    Contact us :
    Uniq Technologies
    #1 Shifa Arcade, 3rd Floor,
    Bharathi Nagar 1st Street,
    North Usman Road,
    T - Nagar,
    Chennai - 600 017.

  2. Post Count Number #2
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    final year project for cse

    UNIQ is a ISO 9001:2008 certified organization
    Opportunity to work in Real Time Live Project - Being a technology services organization,
    we have a sizeable clientele and a large number of Live & Real Time Projects.
    You could have an opportunity to work in one of them.
    Learning the associated technology in depth - You will not only learn about the project,
    but will also learn the associated technology in depth.
    Placement Training - which includes Aptitude Training, Mock Interviews and Soft Skills Training
    Timely completion of Project
    Project Experience Certificate - All our project trainees would receive Industry Accepted certificate
    Our trainees have received the Best Project Award from their respective Colleges year
    after year. Our role doesn't begin and end with the project.

    our projects are:

    ANDROID Projects



    I. ANDROID based CLOUD COMPUTING

    1. A Self-configurable New invention Children tracking structure based on Android Mobile workstation (IEEE 2012).
    2. Android Based Cloud Computing Implementation of Saas (IEEE 2012).
    3. Autonomous Management of Everyday Places for a Personalized Location Provider (IEEE 2012).
    II. ANDROID based SURVEILLANCE

    1. Implementation of Smart Video Surveillance System and Image Capturing Using Android Smart Phones with SMS Alert (IEEE 2012).
    2. On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services (IEEE 2012).

    III. ANDROID based WEB MINING

    1. A Framework for Personal Mobile Commerce Pattern Mining and Prediction (IEEE 2012).

    IV. ANDROID based DIGITAL IMAGE PROCESSING

    1. Android Screen Capturing and Storing. (IEEE 2012).



    DOT NET Projects


    I. IEEE based on CLOUD COMPUTING

    1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    (IEEE 2012).
    2. Toward Secure and Dependable Storage Services in Cloud Computing (IEEE 2012).
    3. Optimization of Resource Provisioning Cost in Cloud Computing (IEEE 2012).
    4. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
    (IEEE 2012).


    II. IEEE based on GRID COMPUTING

    1. Eliminating Duplicate Forwarding in Wireless Opportunistic Routing (IEEE 2012).
    2. Network Based Distributed Mobility Control in localized Mobile LISP Networks
    (IEEE 2012).


    III. IEEE based on KNOWLEDGE AND DATA ENGINEERING

    1. Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks (IEEE 2012).
    2. Robust watermarking using fractional wavelet packet transform (IEEE 2012).
    3. Using Rule Ontology Repeated Rule Acquisition for Similar Websites. (IEEE 2012).
    4. Efficient Computation of Range Aggregates against Uncertain Location-Based Queries (IEEE 2012).
    5. Interactive Learning in Continuous Multimodal Space: A Bayesian Approach to Action-Based Soft Partitioning and Learning (IEEE 2012).


    IV. IEEE based on INFORMATION SECURITY

    1. Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images (IEEE 2012).
    2. RIHT: A Novel Hybrid IP Traceback Scheme (IEEE 2012).
    3. Index Codes for Multibiometric Pattern Retrieval (IEEE 2012).





    V. IEEE based on DISTRIBUTED NETWORKING

    1. Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks (IEEE 2012).
    2. Traffic monitoring in transmission control protocol/active queue management networks through a time-delay observer (IEEE 2012).
    3. Customer-Driven Content Recommendation over a Network of Customers
    (IEEE 2012).


    VI. IEEE based on SECURE TRANSMISSION

    1. Queuing Delay Analysis for Multicast with Random Linear Coding (IEEE 2012).
    2. Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks (IEEE 2012).
    3. Data Provenance Verification for secure hosts (IEEE 2012).

    VII. IEEE based on NEURAL NETWORKS

    1. A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks (IEEE 2012).
    2. Trust Evaluation Model based on behavior space classification for Ad-hoc Networks
    (IEEE 2012).
    3. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
    (IEEE 2012).

    VIII. IEEE based on IMAGE PROCESSING

    1. A Generalized DAMRF image modeling for super resolution of Licence Plate
    (IEEE 2012).
    2. Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching (IEEE 2012).
    3. An Auto adaptive Edge-Detection Algorithm for Flame and Fire Image Processing (IEEE 2012).
    4. Sparse Color Interest Points for Image Retrieval and Object Categorization
    (IEEE 2012).
    5. Scalable Coding of Encrypted Images (IEEE 2012).


    IX. IEEE based on INTELLIGENT TRANSPORTATION SYSTEM

    1. Route Preview in Energy Management of Plug-in Hybrid Vehicles (IEEE 2012).


    X. IEEE based on NETWORKS

    1. Self Protection in a clustered distributed system (IEEE 2012).
    2. On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
    (IEEE 2012).
    3. HYMN: A Novel Hybrid Multi-Hop Routing Algorithm to Improve the Longevity of WSNs (IEEE 2012).


    XI. IEEE based on VIDEO PROCESSING

    1. Dynamic Bayesian Networks for Vehicle Classification in Video (IEEE 2012).
    2. Tracking-Learning Detection (IEEE 2012) [Device Based].
    3. Fourier Eigen functions for Steerable Filtering (IEEE 2012) [Device Based].


    XII. IEEE based on WEB MINING

    1. A Collaborative Decentralized Approach to Web Search (IEEE 2012).




    XIII. IEEE based on MOBILE COMPUTING

    1. A Framework for Routing Performance Analysis in Delay Tolerant Networks with Application to Non cooperative Networks (IEEE 2012).
    2. Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks (IEEE 2012).
    3. Energy-efficient signal acquisition in wireless sensor networks: a compressive sensing framework (IEEE 2012).
    4. A Balanced Resource Scheduling Scheme With Adaptive Priority Thresholds for OFDMA Downlink Systems (IEEE 2012).
    5. Characterizing the Security Implications of Third Party Emergency Alert Systems Over Cellular Text Messaging Services (IEEE 2012) [Device Based].

    XIV. IEEE based on NETWORK SECURITY

    1. Controllable Secure Watermarking Technique for Tradeoff between Robustness and Security (IEEE 2012).
    2. High-Speed Quantum Key Distribution System for Real-Time Key Generation
    (IEEE 2012).
    3. Slicing: A New Approach for Privacy Preserving Data Publishing (IEEE 2012).
    4. Resilient Identity Crime detection-used to find the Illegal usages of Credit Card
    Transaction (IEEE 2012).


    XV. IEEE based on DATA MINING

    1. Publishing Search Logs—A Comparative Study of Privacy Guarantees (IEEE 2012).


    XVI. IEEE based on DEPENDABLE AND SECURE COMPUTING

    1. Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities (IEEE 2012).
    2. Connectivity Weakness Impacts on Coordination in Wireless Sensor and Actor Networks (IEEE 2012).

    XVII. IEEE based on SIGNAL PROCESSING

    1. Improving Various Reversible Data Hiding Schemes via Optimal Codes for Binary Covers (IEEE 2012).
    2. Robust Watermarking of Compressed and Encrypted JPEG2000 Images (IEEE 2012).



    JAVA Projects



    I. IEEE based on CLOUD COMPUTING


    1. Optimization of Resource Provisioning Cost in Cloud Computing (IEEE 2012).
    2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems (IEEE 2012).
    3. An Analytical Performance Modeling Approach for Supply Chain Networks (IEEE 2012)
    4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing (IEEE 2012).
    5. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    (IEEE 2012).


    II. IEEE based on GRID COMPUTING

    1. Maintaining Data Consistency in Structured P2P Systems (IEEE 2012).
    2. Traffic Scheduling Technique for Smart Grid Advanced Metering Applications
    (IEEE 2012).


    III. IEEE based on MOBILE COMPUTING

    1. Multi-Level Diskless Checkpointing (IEEE 2012).
    2. On the Security of a Ticket-Based Anonymity System with Traceability property in Wireless Mesh Networks (IEEE 2012).
    3. A Dynamic Offloading Algorithm for Mobile Computing (IEEE 2012).
    4. Design of Wireless Sensor Networks for Mobile Target Detection (IEEE 2012).
    5. Stateless Multicast Protocol for Ad Hoc Networks (IEEE 2012).
    6. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
    (IEEE 2012).



    IV. IEEE based on DATA MINING


    1. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases (IEEE 2012).
    2. Efficient Computation of Range Aggregates against Uncertain Location-Based Queries (IEEE 2012).
    3. Clustering with Multiviewpoint-Based Similarity Measure (IEEE 2012).
    4. Incremental Information Extraction Using Relational Databases (IEEE 2012).
    5. Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
    (IEEE 2012).
    6. Scalable Scheduling of Updates in Streaming Data Warehouses (IEEE 2012).


    V. IEEE based on NETWORK SECURITY

    1. Aiming at Higher Network Security through Extensive Penetration Application
    (IEEE 2012).
    2. Enhancing the Trust of Internet Routing With Lightweight Route Attestation (IEEE 2012).
    3. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks (IEEE 2012).



    VI. IEEE based on WEB MINING


    1. An Investigation of the Impact of Consumer Feedback, Recommendation and Price Bundling On Sales (IEEE 2012).
    2. Performance Evaluation of Full Search Equivalent Pattern Matching Algorithms
    (IEEE 2012).
    3. An Ontology-Based Text-Mining Method to Cluster Proposals for Research Project Selection (IEEE 2012).

    VII. IEEE based on REAL TIME SURVEILLANCE SECURITY


    1. Accurate Motion Detection Using a Self-Adaptive Background Matching Framework
    (IEEE 2012) [Device Based].
    2. Iris Code Decompression Based on the Dependence between Its Bit Pairs (IEEE 2012).
    3. Curved-Region-Based Ridge Frequency Estimation and Curved Gabor Filters for Fingerprint Image Enhancement (IEEE 2012) [Device Based].


    VIII. IEEE based on NETWORKS

    1. Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management (IEEE 2012).

    2. Sliding Modes for Anomaly Observation in TCP Networks: From Theory to Practice
    (IEEE 2012).

    3. Complexity Analysis and Algorithm Design for Advance Bandwidth Scheduling in Dedicated Networks (IEEE 2012).
    4. Dual-Layer Adaptive Error Control for Network-on-Chip Links (IEEE 2012).

    5. A Theory for the Connectivity Discovered by Routing Protocols (IEEE 2012).

    6. Auditory Feedback and Sensory Substitution During Teleported Navigation (IEEE 2012).
    7. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks (IEEE 2012).



    IX. IEEE based on IMAGE PROCESSING

    1. Three-Dimensional Imaging Using Colocated MIMO Radar and ISAR Technique
    (IEEE 2012).
    2. Web and Personal Image Annotation by Mining Label Correlation With Relaxed Visual
    Graph Embedding (IEEE 2012).
    3. Digital Pathology: Data-Intensive Frontier in Medical Imaging (IEEE 2012).

    X. IEEE based on SERVER PERFORMANCE

    1. Interactivity-Constrained Server Provisioning in Large-Scale Distributed Virtual Environments (IEEE 2012).
    2. Concurrent round-robin-based dispatching schemes for Clos-network switches
    (IEEE2012).
    3. Performance of PCN-Based Admission Control under Challenging Conditions (IEEE2012).



    XI. IEEE based on NEURAL NETWORKS


    1. Face Feature Weighted Fusion Based on Fuzzy Membership Degree for Video Face Recognition (IEEE 2012) [Device Based].

    2. A Novel Word Spotting Method Based on Recurrent Neural Networks (IEEE 2012).



    XII. IEEE based on DISTRIBUTED NETWORKS

    1. A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer
    Interactive VoD Streaming (IEEE 2012).
    2. A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks
    (IEEE 2012).
    3. Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks
    (IEEE 2012).
    4. Optimal Quarantining of Wireless Malware Through Reception Gain Control (IEEE 2012).
    5. Predictive Encoder and Buffer Control for Statistical Multiplexing of Multimedia Contents
    (IEEE 2012).

    XIII. IEEE based on VISUAL CRYPTOGRAPHY


    1. Efficient Construction for Region Incrementing Visual Cryptography (IEEE 2012).

    2. A Shift-Tolerant Dissimilarity Measure for Surface Defect Detection (IEEE 2012).
    3. Related-Key Boomerang and Rectangle Attacks: Theory and Experiment analysis
    (IEEE 2012).



    XIV. IEEE based on INFORMATION SECURITY


    1. Fast Matrix Embedding by Matrix Extending (IEEE 2012).
    2. Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering (IEEE 2012).
    3. Windowed Decoding of Protograph-Based LDPC Convolutional Codes over Erasure Channels (IEEE 2012).



    XV. IEEE based on WIRELESS SENSOR NETWORK


    1. Robust Topology Engineering in Multiradio Multichannel Wireless Networks (IEEE 2012).
    2. Catching Packet Droppers and Modifiers in Wireless Sensor networks (IEEE 2012).
    3. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks (IEEE 2012).
    4. Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding (IEEE 2012).
    5. A Diversity Compression and Combining Technique Based on Channel Shortening for Cooperative Networks (IEEE 2012).
    6. Coverage Properties of the Target Area in Wireless Sensor Networks (IEEE 2012).



    XVI. IEEE Based on ARTIFICIAL INTELLIGENCE

    1. Effective Pattern Discovery for Text Mining (IEEE 2012).

    2. Multibiometric Cryptosystems Based on Feature-Level Fusion (IEEE 2012) [Device Based].



    XVII. IEEE Based on INTRUSION DETECTION SYSTEMS

    1. Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks (IEEE 2012).
    2. Data Dependencies for the Recovery of Concurrent Processes in a Service-Oriented Environment (IEEE 2012).
    3. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks (IEEE 2012).




    XVIII. IEEE based on COMPUTATION & DATA SECURITY

    1. Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks (IEEE 2012).
    2. Network-Wide Local Unambiguous Failure Localization (NWL-UFL) via Monitoring Trails
    (IEEE 2012).
    3. Fuzzy-Model-Based Robust Fault Detection with Stochastic Mixed Time Delays and
    Successive Packet Dropouts (IEEE 2012).

  3. Post Count Number #3
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    what is the timing and duration for this training?

  4. Post Count Number #4
    Unregistered
    Guest

    For website development what is the registration fees.

  5. Post Count Number #5
    Unregistered
    Guest

    To whom should I contact to submit my resume in your esteemed company ?
    Gowshika.

  6. Post Count Number #6
    Unregistered
    Guest

    LAPTOP MUST OR NOT

    LAPTOP MUST OR NOT? BECAUSE I HAVE ONLY PC AND I HAVE NO LAPTOP. I WILL SHARE LAPTOP WITH MY FRIENDS.