MCA STUDENTS PROJECT LIST Batch :

Size: px
Start display at page:

Download "MCA STUDENTS PROJECT LIST Batch :"

Transcription

1 MCA STUDENTS PROJECT LIST Batch : S.NO REG.NO. STUDENT B ABDUL JABBAR A G B ARAVINDHAN J B ARCHANA J V B ARUN KUMAR P B ARUNLAL T K B ASHA MAI C B ATHILAKSHMI S COMPANY EVES SRI RAMAKRISHNA MATH GRAINTEK TECH PVT SILICON HARVEST TITLE OF THE PROJECT BIOMETRIC AUTHENTICATION FOR PUBLIC DISTRIBUTION ONLINE BOOK SALES WITH MOBILE SMS ELECTRICAL CONTROL APPLICATION USING EMBEDDED & GSM ANTI-MONEY LAUNDERING FRIENDLY CODING STANRDADS AND REVIEWERS GLOBAL OBJECT LOCATOR AND CONTROLLER ENHANCED MAINTENANCE ARCHITECTURE IN E-COMMERCE SERVER GUIDE B AYYANAN G INFOTEK SOCIAL NETWORKING WEB SERVICE B BABU A B BALAJI B L B BALAKUMAR R B BHARATH P COSMOSOFT TURNSOFT RAIM TECNLOGIES SCHEDULING CONCURRENT BAG-OF- TASKS APPLICATIONS OF HETEROGENEOUS PLATFORMS BLUETOOTH ENABLED MOBILE PHONE REMOTE CONTROL FOR PC MOBILE CULMINATING APPLICATIONS SUPER DIFFUSIVE BEHAVIOR OF MOBILE NODES AND ITS IMPACT ON ROUTING PROTOCOL PERFORMANCE Mr.A.Kannan Mr.A.Kannan B DEEPIKA S 1 SOFT PILLS PRESCRIBER Mr.A.Kannan B DHIVYA V MOBILE VNC Mr.A.Kannan B DINESH BABU A V HASTECH B DIVYARANI S S 1 SOFT CONSTRUCTION PLUS B ESWARAN M S SELECTION OF WEB SERVICE WHICH IMPREMENTATION Qos CONSTRAINTS Mr.A.Kannan WAMP SERVER ADMINISTRATION B GNANESWARAN T R STREAM COMMUNITY DIGITAL MODEL B GOPAL K B GOVINDHARAJAN N G B INDIRA GANDHI A B JEGATHEESWARAN B S S.NO REG.NO. STUDENT B JEYA MURUGAN B B KALIDASS C B KANAGESWARI M S B KARTHICK DINESH M K B KARTHICK T V TERNSOFT S DOCSER PVT COMPANY SHARE INFOTECH SRS INFOS ONLINE POLLING USING FINGERPRINT DEVELOPING GIS SOFTWARE WITH COMPONENT TECHNIQUE BUG TRACKING MAGIC NET:HUMAN IMMUNE AND NETWORK SECURITY TITLE OF THE PROJECT ONLINE REAL ESTATE AND PROPERTY MANAGEMENT ASYNCHRONOUS MESSAGING BETWEEN WEB USING SSDL FRIENDLY CODING STANDARDS REVIEWER GUIDE EVES CONCEPTUAL REGIME MASTER MICRO TRACK INDUSTRIAL MOBILE WEB IN HEALTH CARE

2 B KARTHICK P R PVT INDUSTRIAL SAFETY INSPECTION B KARTHIK KUMAR N E B KARTHIK KUMAR S M B KARTHIK B R B KARTHIK P J B KARTHIK G R INSTA BANX S & NETWORK PVT ZEAL SOFT CANDELASOFT SMART SNIFFER MAIL IN PROJECT MANAGEMENT DISTRIBUTED DENIAL OF GRIMACY AYSER IDEA COINBOX ENCLOSING SOFTWARE A PREDICTABLE HIGH PERFORMANCE COMPUTING USING FEEDBACK ANDADMISSON CONTROL B KARTHIKA R PORAS WEB SEARCH ENGINE B KARTHIKEYAN R B KAVITHA S R B KAYALVIZHI M B KISHORE BABU A V B KRISHNAKUMAR T S B KRISHNAPRIYA C R B LALITHA LAKSHMI S B MATHAVARAMAN T R B MANI SANKAR C B MANIKUMAR M B MANOJ KUMAR R R B MATHANAGOPAL N H B MATHIVANAN N SCRUMSYS DIGISOURCE S MULTI PIXEL PVT. ENVISION MOBILITY S AAUM RESEARCH & AYTICS-IITM RESEARCH PARK PVT. MICRO TRACK INDUSTRIES HASTECH & NETWORK TECHNLOGIES CEGONSOFT PVT BANGALORE SRS SOFTWARE B MEENA KUMARI R S AJ SQUARE INC LYRICS B MICHLIN SEOUL A B MUNEESWARAN N NATIO INFORMATION CENTRE, VIJAYALAKSHMI HITECH ONLINE MICRO INVENTION MANAGEMENT AN ISP FRIENDLY FILE DISTRIBUTION PROTOCOL AYSIS, DESIGN AND IMPLEMENTATION E-BUSINESS INFORMATION SHARING USING EXTRANET BANDWIDH ESTIMATION USING PRIORITY SCHEDULING ALGORITHM SALES AND INVOICE TRACKING E-REQUEST COURSES CO- ORDINATION ENABLING ROBUST DATA COLLECTION DOCUMENT MANAGER SECURITY AYSIS OF TWO PASSWORD AUTHENTICATION SCHEMA ACCURATE IMAGE SEARCH USING CONTEXTUAL DISSIMILARITY MEASURE INFORMATION BASED QUERIES IN MOBILE ENVIRONMENT CONTRIVANCE PLANNING MANAGEMENT COMPARTMENTED SECURITY FOR BROWSER THWART PHISHER RURAL SOFT ONLINE CREDIT CARD B MURALI N C APPLIED MATERIALS EXCITE 3X TEST AUTOMATION B MUTHU MANI V DATA ALCOTT POWER CONTROL B MUTHU RASU N PVT ONLINE COUPON MANAGEMENT B MUTHUKUMAR M SANSPAREIL NETWORK MONITORING

3 B MUTHURAJA P B NANDHINI T R B NELSON MANDELA V B NIVETHA V B OMPRAKASH A K B PANDI DEVI A AKAANTA SOFTWARE PVT DIABETIC FOOT CARE INDIA CMTD AKVANTA PVT JS SOFTWARE TECHNLOIES ORGANIZATIO PERFORMANCE MONITORING BOT CONTROL AND MONITORY USING CAPTCHA HEALTH CARE HOUSING & CAR LEASE MANAGEMENT TOOL EQUIPMENT PERFORMANCE TRACKER E-POST OFFICE B POORNISHA G 1 SOFT EASY AUTO INSURER B PRABAHARAN J B PRIYA N R B PYARELAL T R MICROSUN SOFT NOKIA SIEMENS NETWORK CANDELASOFT INTELLIGENCE KNOWLEDGE BASED RETORTER PROTING OUT SUBSCRIBER S FROM NETWORK ONLINE WEB BASED ADMINISTRATION WITH SMS B RAGHURAMAN R SAYAS ROUTING SIMULATOR B RAGUNATH T H UNIQUE SOFT CREDIT CARD FRAUD DETECTION B RAMARAJ P B ROOBINI S R B SABHARISH P S B SANTHOSH KUMAR S B SARADHA K B B SARATH BABU K B SASIKUMAR R B SATHEESH BABU T G B SATHISH KUMAR R B SATHISH KUMAR S SHARE INFOTECH RAAGA SOFTWARE CONSULTANCY INSTABANX TESPA INDIA PVT DIGI SOURCE PVT TIMES TARGET SOFTWARE XLNC INFO PVT INSTABAX SOFTWARE LICENSE MONITORING SERVICE FLOW AUTOMATION THE LOST ARTICLE RECONCIITION HUMAN RESOURCES AND PAYROLL MANAGEMENT S FOR ERP REAL TIME GROUP EDITOR CRYPTOKIT PROJECT AND COST MANAGEMENTAPPLICATION FOR MANUFACTURING ARICRAFT COMPOSITE COMPUNDING CORPORATE ID TRACKING WEB BASED CONTENT TRACKING WEB BASED REMOTE DATABASE ADMINISTRATION B SATHYAVATHI K ROAMEX PROJECT B SELVA KUMAR N MICRO SUNSOFT PERSO BUSINESS INTELLIGENCE ORGANIZER B SENTHIL K N PORALSOFT REMOTE MONITORING B SENTHIL NAYAKI N B SENTHIL RAO A R B SHARAFATH NISHA K B SHENOZ DHEEN S B SHOBANA KALAI PRIYA M DIGISOURCE TIMES DISK PROCESSING USING MOBILE SIGS MOBILE TO PC COMMUNICATION & VICE VERSA CREATION OF A OS WRAPPER FOR THE FLEX UI HIGH YIELD INVESTMENT PLAN (HYIP) CLOUD SUPPORT

4 B SHYAMALA DEVI A S B SIVA GANESHAN R B SIVA SANKARI V M B SIVATHARSINI M 4S SOFTWARE GREAT INNOVUS S ADROIT S MEENUM SOFTWARE S BIO-AUTHENTICATION BASED HUMAN HEALTH CARE LANGUAGE TRANSLATION FOR GOLLGLE ANDROID PLATFORM CRYPTOGRAPHY IN GSM MOBILE COMMUNICATION E-HEALTHCARE B SNEKAN S T MICROSUN SOFT FILE TRACKING B SRIKANTH M S B SUDHARSAN S S B SUNITHA J S B SURESH BABU M P B SURESH M B SURESH M B SURESH KUMAR T B THANGA MANI J PVT MICROHOUSE INTEGRITY INDIA SOFTWARE MANI INDIA GRAINE TECHOLOGY PRAKASH ENGINERRING WORKS SANSPAREIL B THANGAMEENAKSHI R TIMES B THAVAMANI M B UDHAYAKUMAR M B VAISHNAVI L G B VAISHNAVI P S B VAISHNAVI T S B VASANTH BABU E R B VENGATESH T R B VENKATALAKSHMI G B VENKATESH KUMARAN A J B VENKATESH P M B VENKATESH R B VENKATESH V R B VIGNESHWARAN S SARAN ADVERTISHING AGENCY INVICTUS GRIAN PVT RAAGA SOFTWARE CONSULTANCY TECHNLOGIES PVT 1SOFT BSNL MADURAI TERNSOFT XLNC INFO TECH S PVT AND NETWORK PVT AKRANTA TECHNLOGIES PVT INFORMATION SECURITY FOR ONLINE GAMS MOBILE BANKING ERP BUILDING FOR FLOWER ENTERPRISE MAP APPLICATION IN ANORIOD DEVELOPMENT AUTOMATION OF GOVERNMENT ADMINISTRATION DESIGNING AND IMPLEMENTING AN ERP WEB-BASED COST ESTIMATION OF AIRCRAFT COMPOSITE COMPONENTS CONTENT MANAGEMENT AUTOMATED ISSUE AYZER BY AJAX REMOTE BASED SCHEMA TRANSFER WEB APPLICATION FOR AD GLOBOLIZATION PRIVACY PRESENTATION AN INFORMATION THEORITIC APPROACH OLAP EEG DETECTION USING ARTIFICIAL NEURAL NETWORK FINANCIAL LENDING EXPERT VISUAL TUTOR DEVELOPMENT KIT LUXURY RAFFLE BROADBAND NETWORK FAULT MONITORING DETECTION OF SPYWARE BY MINING EXECUTABLE FILES CIPHER MAIL SERVER FOR INTERNET WATERMARK BASED AUTHENTICATION DESIGN OF MOBILE ELECTRONIC COMMERCE EMPLOYEE OJT MONITORING

5 B VIJAYAKUMAR R R B VIJAYAKUMAR N B VIKASH SAGAR A G APPLIED MATERIALS WIRELESS CONTEXT MANAGEMENT (WICOM) FOR MOBILE DEVICE KEY AGREEMENT FROM RANDOM BINARY SEQUENCES USING WEAK INTERACTIONS INSTALLSHIELD TROUBLESHOOTING AND DEVELOPEMENT B VINAYAGA MUTHU D SENJOS TECHNLOGY CLIENT CONTROL B VINOTHINI P B B WAHITHA A B YADEESH KUMAR K M 4S SOFTWARE POROS LIBRARY MANAGEMENT WITH FACE RECOGNITION INTEGRATED BIOMETERIC VOTING FRIENDLY CODING STANDARDS REVIEWER

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

PROJECT DETAILS - MCA 2009-2012 BATCH. Reg.No Name Guide Name Title Company Name & Address

PROJECT DETAILS - MCA 2009-2012 BATCH. Reg.No Name Guide Name Title Company Name & Address PROJECT DETAILS - MCA 2009-2012 BATCH S.N o Reg.No Name Guide Name Title Company Name & Address 1 0938M0144 ANANTHI.G B.Jayanthi Vehicle Management 2 0938M0145 ARULMURUGAN.G S.Vanitha Maintaining Data

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST EMBEDDED MAJOR PROJECTS LIST WEBSERVER ETHERNET - CAN BASED APPLICATION 1 WEB-BASED STUDENT ATTENDANCE SYSTEM USING RFID TECHNOLOGY 2 THE COMMON DATA ACQUISITION SYSTEM BASED ON ARM7 3 CAN BASED ACCIDENT

More information

NATIONAL WORKSHOP ON ENERGY AUDITING & CONSERVATION TECHNIQUES 18 19 April 2014 Date: 11.04.2014

NATIONAL WORKSHOP ON ENERGY AUDITING & CONSERVATION TECHNIQUES 18 19 April 2014 Date: 11.04.2014 PSG COLLEGE OF TECHNOLOGY, COIMBATORE - 4 Department of Electrical & Electronics Engineering NATIONAL WORKSHOP ON ENERGY AUDITING & CONSERVATION TECHNIQUES 18 19 April 2014 Date: 11.04.2014 LIST OF SELECTED

More information

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments

More information

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura chamitha@sjp.ac.lk

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura chamitha@sjp.ac.lk Mobile Cloud Computing Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura chamitha@sjp.ac.lk Mobile Computing Rapid progress of mobile computing have become a powerful trend in the

More information

VB.NET PROJECTS.NET Projects VB.NET, C#, ASP.NET, using Database SQL Server, Oracle, Access

VB.NET PROJECTS.NET Projects VB.NET, C#, ASP.NET, using Database SQL Server, Oracle, Access Integrated Internet Information Monitoring & Messaging System Intelligent Network Information & Messaging System Integrated & Network Internet Mailing, Browsing & Messaging System & Solutions Networking

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Augmented Search for Software Testing

Augmented Search for Software Testing Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,

More information

A Foolproof Biometric Attendance Management System

A Foolproof Biometric Attendance Management System International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 433-438 International Research Publications House http://www. irphouse.com /ijict.htm A Foolproof

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

1. Mobile VoIP solutions and Services:

1. Mobile VoIP solutions and Services: About Us We at Mir Technologies do 3 things. 1. Mobile VoIP solutions and Services: mtel is an International Brand. mtel created partnerships with esteemed global VoIP operators through a focused and stable

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

BHARATHIDASAN INSTITUTE OF TECHNOLOGY (BIT) CAMPUS TIRUCHIRAPPALLI ANNA UNIVERSITY DEPARTMENT OF CSE & IT

BHARATHIDASAN INSTITUTE OF TECHNOLOGY (BIT) CAMPUS TIRUCHIRAPPALLI ANNA UNIVERSITY DEPARTMENT OF CSE & IT BHARATHIDASAN INSTITUTE OF TECHNOLOGY (BIT) CAMPUS TIRUCHIRAPPALLI ANNA UNIVERSITY DEPARTMENT OF CSE & IT Placement Details of B.Tech (I.T) students 2007-2011 Batch B.Tech (I.T) S.NO NAME DESIGNATION COMPANY

More information

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao Dept. of CSE, KLCE Vaddeswaram,

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to

More information

BlackBerry Enterprise Solution

BlackBerry Enterprise Solution BlackBerry Enterprise Solution The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business. BlackBerry Enterprise Solution Mobilize Your Email,

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Assessing Learners Behavior by Monitoring Online Tests through Data Visualization

Assessing Learners Behavior by Monitoring Online Tests through Data Visualization International Journal of Electronics and Computer Science Engineering 2068 Available Online at www.ijecse.org ISSN : 2277-1956 Assessing Learners Behavior by Monitoring Online Tests through Data Visualization

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Jort Kollerie SonicWALL

Jort Kollerie SonicWALL Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential

More information

User Authentication Platform using Provisioning in Cloud Computing Environment

User Authentication Platform using Provisioning in Cloud Computing Environment User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,

More information

A Data Collection Revolution?

A Data Collection Revolution? An Open SCADA Standard For Collecting Archiving and Monitoring Remote Data A Data Collection Revolution? John Rinaldi, Real Time Automation GENERAL TRENDS 15 Billion Internet Devices from 2.5B today Vastly

More information

LOCATIONS AROUND ME (ANDROID)

LOCATIONS AROUND ME (ANDROID) IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 193-198 Impact Journals LOCATIONS AROUND ME (ANDROID)

More information

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford

More information

Other Required Courses (14-18 hours)

Other Required Courses (14-18 hours) 1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Eleventh Hour Security+

Eleventh Hour Security+ Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Best Practices: Extending Enterprise Applications to Mobile Devices

Best Practices: Extending Enterprise Applications to Mobile Devices Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI

ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI International Journal of Computer Science and Engineering (IJCSE) ISSN(P): 2278-9960; ISSN(E): 2278-9979 Vol. 4, Issue 2, Mar 2015, 29-38 IASET ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING

More information

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX Enabling Manufacturing Transformation in a Connected World John Shewchuk Technical Fellow DX Internet of Things What is the Internet of Things? The network of physical objects that contain embedded technology

More information

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile

More information

CRM MICROSOFT BUSINESS SOLUTIONS AXAPTA. A more efficient organisation overall

CRM MICROSOFT BUSINESS SOLUTIONS AXAPTA. A more efficient organisation overall CRM MICROSOFT BUSINESS SOLUTIONS AXAPTA Microsoft Business Solutions Axapta CRM empowers you to maximise benefits from all of your business relationships and generate profit. Key Benefits: Achieve greater

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,

More information

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 315 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

How To Understand And Understand The Science Of Engineering In India

How To Understand And Understand The Science Of Engineering In India RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS ************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India 411005 Prachi.deokar19@gmail.

Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India 411005 Prachi.deokar19@gmail. Cloud Server Based Home Automation System Using Android Phone Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India 411005 Prachi.deokar19@gmail.com

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Android based Secured Vehicle Key Finder System

Android based Secured Vehicle Key Finder System International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri

More information

ISACA Kampala Chapter Feb 2011. Bernard Wanyama Syntech Associates Limited

ISACA Kampala Chapter Feb 2011. Bernard Wanyama Syntech Associates Limited ISACA Kampala Chapter Feb 2011 Bernard Wanyama Syntech Associates Limited Agenda 1. ERP: What is it? 2. ERP: Examples 3. Security: Definitions, Triads & Frameworks 4. Security: Control Framework 5. Traditional

More information

COROUTER SOLUTIONS PVT. LTD.

COROUTER SOLUTIONS PVT. LTD. COROUTER SOLUTIONS PVT. LTD. A Cloud Based Web & Software Enterprise Company Profile cum Portfolio CONTENTS About Company... 3 Services... 4 Portfolio Software Development... 7 Portfolio Mobile Development...

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

BUSINESS PROCESS Automation For Customer Loyalty PMS CRM CCD CEBP

BUSINESS PROCESS Automation For Customer Loyalty PMS CRM CCD CEBP BUSINESS PROCESS Automation For Customer Loyalty BI UC PMS CRM CCD CEBP Customer Relationship (CRM) The CRM system can be used to coordinate the work of sales, marketing and service staff and to increase

More information

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical

More information

IERC IoT Research and Innovation. 29-30 September 2014, Brussels, Belgium

IERC IoT Research and Innovation. 29-30 September 2014, Brussels, Belgium www.internet-of-things-research.eu IERC IERC IoT Research and Innovation Stakeholders Consultation Workshop Network Technologies Work Programme 2016-2017 29-30 September 2014, Brussels, Belgium Dr. Ovidiu

More information

A Framework for Secure and Verifiable Logging in Public Communication Networks

A Framework for Secure and Verifiable Logging in Public Communication Networks A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr emagos@ionio.gr

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

Market Entry Toolkit. Mobile Health Technology and Architecture: A Practical Framework for Technology Assessment for Mobile Health

Market Entry Toolkit. Mobile Health Technology and Architecture: A Practical Framework for Technology Assessment for Mobile Health Market Entry Toolkit Mobile Health Technology and Architecture: Kai-Lik Foh, Mobile Health Programme Manager, GSMA kfoh@gsm.org September 2011 Contents Introduction...2 ehealth vs mhealth Architecture...2

More information

Trust Based Infererence Violation Detection Scheme Using Acut Model

Trust Based Infererence Violation Detection Scheme Using Acut Model www.ijcsi.org 668 Trust Based Infererence Violation Detection Scheme Using Acut Model Mr. K. Karthikeyan 1, Dr. T. Ravichandran 2 1 Research Scholar, Department of Computer Science, Karpagam University,

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components

More information

Operations Research and Knowledge Modeling in Data Mining

Operations Research and Knowledge Modeling in Data Mining Operations Research and Knowledge Modeling in Data Mining Masato KODA Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba Science City, Japan 305-8573 koda@sk.tsukuba.ac.jp

More information

We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques

We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques We Transform IDEA into Business with Right Blend of Talent, Technology & Techniques About Us Fibsologic Pvt. Ltd. is an Offshore IT & Software company offers End-to-End Web Application & Mobile Apps Solutions

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

ETHICAL HACKING CYBER SECURITY

ETHICAL HACKING CYBER SECURITY ETHICAL HACKING & CYBER SECURITY (Winter Training Program 2013-14) PRESENTED BY In association with Magniva Technology Pvt. Ltd. Office: 217, Murli Bhawan, 10A Ashok Marg, Hazratganj, Lucknow, (U.P.) Email:

More information

Comparative study of security parameters by Cloud Providers

Comparative study of security parameters by Cloud Providers Comparative study of security parameters by Cloud Providers Manish Kumar Aery 1 Faculty of Computer Applications, Global Infotech Institute of IT & Management (LPUDE) aery.manish1@gmail.com, Sumit Gupta

More information

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,

More information

Towards an On board Personal Data Mining Framework For P4 Medicine

Towards an On board Personal Data Mining Framework For P4 Medicine Towards an On board Personal Data Mining Framework For P4 Medicine Dr. Mohamed Boukhebouze Deputy Department Manager, CETIC European Data Forum 2015, November 16 17 Luxembourg Centre d Excellence en Technologiesde

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Implementation of Smart Homes and Industrial Automation System with Secure Communication over GSM

Implementation of Smart Homes and Industrial Automation System with Secure Communication over GSM Universal Journal of Electrical and Electronic Engineering 3(4): 125-131, 2015 DOI: 10.13189/ujeee.2015.030403 http://www.hrpub.org Implementation of Smart Homes and Industrial Automation System with Secure

More information

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved.

Article. Electronic Notary Practices. Copyright Topaz Systems Inc. All rights reserved. Article Electronic Notary Practices Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Key Features and

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Adobe Marketing Cloud Bloodhound for Mac 3.0

Adobe Marketing Cloud Bloodhound for Mac 3.0 Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare

More information

Nokia Mobile Software Strategy

Nokia Mobile Software Strategy Nokia Mobile Software Strategy Pertti Korhonen Senior Vice President Nokia Mobile Software Agenda Open Mobile Architecture initiative Nokia Mobile Software strategy & Offering Developer community Summary

More information

B.Sc. in Computer Information Systems Study Plan

B.Sc. in Computer Information Systems Study Plan 195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210

More information

ITS Workshop April 2015

ITS Workshop April 2015 General Public Demand Response Transit (DRT) ITS Workshop April 2015 A. Jeff Becker jeff.becker@rtd-denver.com Regional Transportation District Denver, CO 1 RTD Mission: Provide cost-effective service

More information

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering

More information

6.2 Reporting BIPublisher Improvements

6.2 Reporting BIPublisher Improvements 6.2 Reporting BIPublisher Improvements Paul Hamill Senior Director, OTM Development 2011 OTM SIG Philadelphia, PA August 16-18, 2011 Safe Harbor Statements The following is intended

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

B2B Exchanges. Overview. Context The nature of B2B sites Building B2B capability XML and SOAP Exchanges

B2B Exchanges. Overview. Context The nature of B2B sites Building B2B capability XML and SOAP Exchanges B2B Exchanges Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Context The nature of B2B

More information