Friday, 26 June 2015

Pseudocode in programming languages

PSEUDOCODE is nothing but the false code.It is used to represent the logic of the solution.It is a detailed explanation of the an algorithm.

Pseudocode looks like a programming, but it is not a real programming.
It can be written just like an algorithm.For example, consider a situation where you need to welcome the new user.For this you have to get the name from the user and to append the name with the word "WELCOME"
The required Pseudocode is here:

Begin
  Display 'Enter your name'
  Accept name
  Initial=welcome
  name=strconcat(initial,name)
 Display name
end

Instead we can implement this with the help of scratch,which may be used for creating a simple gaming application using some animation or anything.Here you can make a sprite(cat,dog,etc..) to walk,run,dance and more....


After downloading Scratch you can open it and start writing you Pseudocode or creating your simple gaming application.


JAVA IEEE Projects

 JAVA based CLOUD COMPUTING:

1. Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud (IEEE 2014).
2. Cloud-Based Mobile Multimedia Recommendation System with User Behavior
Information (IEEE 2014).
3. Efficiency Evaluation for Supply Chains Using Maximin Decision Support (IEEE 2014).
4. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
(IEEE 2014).
5. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud (IEEE 2014).
6. Towards Scalable Traffic Management in Cloud Data Centers. (IEEE 2014).
7. Consistency as a Service: Auditing Cloud Consistency. (IEEE 2014).
8. On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in
Multicloud Storage. (IEEE 2014).
9. Software defined environments based on TOSCA in IBM cloud implementations. (IEEE
2014).
10. Secure Deduplication with Efficient and Reliable Convergent Key Management. (IEEE
2014).

 JAVA based GRID COMPUTING:

1. Adaptive Replica Synchronization for Distributed File Systems. (IEEE 2014).
2. A mobility aware scheduler for low cost charging of electric vehicles in smart grid.
(IEEE 2014).

 JAVA based MOBILE COMPUTING:

1. Scheduling in Single-Hop Multiple Access Wireless Networks with Successive
Interference Cancellation. (IEEE 2014).
2. Optimal Cellular Offloading via Device-to-Device Communication Networks with
Fairness Constraints. (IEEE 2014).

JAVA based DATA MINING:

1. Infrequent Weighted Item set Mining Using Frequent Pattern Growth. (IEEE 2014).
2. Secure Spatial Top-<i>k</i> Query Processing via Un trusted Location-based Service
Provider. (IEEE 2014).
3. Similarity Preserving Snippet-Based Visualization of Web Search Results. (IEEE 2014).
4. Risk Aware Query Replacement Approach for Secure Databases Performance
Management. (IEEE 2014)
5. Modeling Temporal Activity Patterns in Dynamic Social Networks. (IEEE 2014).

 JAVA based NETWORK SECURITY:

1. DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy (IEEE
2014).
2. Pair wise key distribution scheme for two-tier sensor networks (IEEE 2014).
3. Intelligent rule-based phishing websites classification (IEEE 2014).
4. Integrated Security Analysis on Cascading Failure in Complex Networks (IEEE 2014).
5. Tradeoff between Reliability and Security in Multiple Access Relay Networks Under
Falsified Data Injection Attack (IEEE 2014).
6. Security Analysis of Handover Key Management in 4G LTE/SAE Networks (IEEE

2014).

JAVA based WEB MINING:

1. A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-
Business E-Services. (IEEE 2014)
2. Deep Web data extraction using query string formation. (IEEE 2014)
3. An Empirical Study of Ontology-Based Multi-Document Summarization in Disaster
Management. (IEEE 2014)
4. LIMTopic: A Framework of Incorporating Link based Importance into Topic Modeling.
(IEEE 2014)
5. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance.
(IEEE 2014)
6. Web Image Re-Ranking Using Query-Specific Semantic Signatures. (IEEE 2014)

JAVA based REAL TIME SURVEILLANCE SECURITY:

1. Segmentation and Enhancement of Latent Fingerprints: A Coarse to Fine Ridge Structure
Dictionary. (IEEE 2014)
2. Background elimination method in the event based vision sensor for dynamic
environment. (IEEE 2014)
3. A Novel Approach to Circular Edge Detection for Iris Image Segmentation. (IEEE 2014)

JAVA based NETWORKS:

1. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks Though
Replication for Efficient File Sharing. (IEEE 2014)
2. Receiver-Based Flow Control for Networks in Overload. (IEEE 2014)
3. On the Excess Bandwidth Allocation in ISP Traffic Control for Shared Access Networks.
(IEEE 2014)
4. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A
Survey. (IEEE 2014)
5. PSR: A Lightweight Proactive Source Routing Protocol for Mobile Ad Hoc Networks.
(IEEE 2014)
6. Automatic Test Packet Generation. (IEEE 2014)
7. Fairness Analysis of Routing in Opportunistic Mobile Networks. (IEEE 2014)
8. Spectral - and energy-efficient two-stage cooperative multicast for LTE-advanced and
beyond. (IEEE 2014)
9. Constructing Limited Scale-Free Topologies over Peer-to-Peer Networks. (IEEE 2014).

JAVA based IMAGE PROCESSING:

1. Detection and Reconstruction of an Implicit Boundary Surface by Adaptively Expanding
A Small Surface Patch in A 3D Image (IEEE 2014).
2. Neutron source reconstruction from pinhole imaging at National Ignition Facility. (IEEE
2014)
3. Image segmentation by dirichlet process mixture model with generalised mean (IEEE
2014).
4. High-Resolution SAR Image Generation by Subaperture Processing of FMCW Radar
Signal (IEEE 2014).
5. Optimum Signal Processing for Multichannel SAR: With Application to High-Resolution
Wide-Swath Imaging (IEEE 2014).

JAVA based SERVER PERFORMANCE:

1. Tracking of Acoustic Sources Using Random Set Theory. (IEEE 2014)
2. Design and performance evaluation of in-home high throughput streaming service with
ethernet and IEEE1394. (IEEE 2014)

JAVA based NEURAL NETWORKS:

1. A Markov Random Field Groupwise Registration Framework for Face
Recognition.(IEEE 2014)
2. Offline Text-Independent Writer Identification Based on Scale Invariant Feature
Transform. (IEEE 2014)

JAVA based DISTRIBUTED NETWORKS:
1. Improving Scalability of VoD Systems by Optimal Exploitation of Storage and Multicast.
(IEEE 2014)
2. Temporal Workload-Aware Replicated Partitioning for Social Networks. (IEEE 2014)
3. Effects of Cooperation Policy and Network Topology on Performance of In-Network
Caching. (IEEE 2014)
4. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices.
(IEEE 2014)
5. A Reactive and Scalable Unicast Solution for Video Streaming over VANETs. (IEEE
2014

JAVA based VISUAL CRYPTOGRAPHY:

1. A Lossless Tagged Visual Cryptography Scheme. (IEEE 2014)
2. Random-Grid-Based Visual Cryptography Schemes. (IEEE 2014)

JAVA based INFORMATION SECURITY:
1. Separable data hiding in encrypted image based on compressive sensing. (IEEE 2014)
2. An Overview of Information Hiding in H.264/AVC Compressed Video. (IEEE 2014)
3. A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security
Issues of Teleradiology. (IEEE 2014).

 JAVA based WIRELESS SENSOR NETWORK:
1. Harnessing the High Bandwidth of Multiradio Multichannel 802.11n Mesh Networks.
(IEEE 2014).
2. Bounds on the Benefit of Network Coding for Wireless Multicast and Unicast. (IEEE
2014)
3. Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks.
(IEEE 2014)
4. Channel Time Allocation PSO for Gigabit Multimedia Wireless Networks. (IEEE 2014)
5. A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless
Networks. (IEEE 2014)

JAVA based ARTIFICIAL INTELLIGENCE:

1. Classifying text documents using unconventional representation. (IEEE 2014)

JAVA based INTRUSION DETECTION SYSTEMS:
1. A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering
Infrastructures. (IEEE 2014)
2. RRE: A Game-Theoretic Intrusion Response and Recovery Engine. (IEEE 2014)
3. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and
Discontiguous System Call Patterns. (IEEE 2014)

JAVA based COMPUTATION & DATA SECURITY:
1. Efficient and Retargetable Dynamic Binary Translation on Multicores. (IEEE 2014)
2. Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks. (IEEE
2014)
3. Split and Aggregated-Transmission Control Protocol (SA-TCP) for Smart Power Grid.
(IEEE 2014)

.NET IEEE Projects

 DOTNET based CLOUD COMPUTING :

1. Cloud-Assisted Mobile-Access of Health Data with Privacy and Auditability
(IEEE 2014).
2. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
(IEEE 2014).
3. Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers.
(IEEE 2014).
4. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud (IEEE 2014).

DOTNET based KNOWLEDGE AND DATA ENGINEERING

1. Converged architecture for broadcast and multicast services in heterogeneous network
(IEEE 2014).
2. Ideal Forward Error Correction Codes High-Speed Streaming data. (IEEE 2014).
3. A novel model for mining association rules from semantic web data (IEEE 2014).
4. Two-sided expanding ring search (IEEE 2014).
5. Shortest Path Computing in Relational DBMSs (IEEE 2014).

 DOTNET based INFORMATION SECURITY

1. Analysis of Data Hiding Using Digital Image Signal Processing (IEEE 2014).
2. Robust Priority Assignments for Extending Existing Controller Area Network Applications
(IEEE 2014).
3. Paste Rheology Correlating With Dispensed Finger Geometry (IEEE 2014).
4. Compact tunable hyper spectral imaging system (IEEE 2014).

 DOTNET based DISTRIBUTED NETWORKING

1. Energy Efficient Collaborative Beam forming in Wireless Sensor Networks.
(IEEE 2014).
2. Joint Design of Channel and Network Coding for Star Networks Connected by Binary
Symmetric Channels (IEEE 2014).
3. Subspace Pursuit for Sparse Unmixing of Hyperspectral Data (IEEE 2014)..

DOTNET based SECURE TRANSMISSION

1. Trustful Location Based Energy Deterioration on Demand Multipath Routing in Secure
Network (IEEE 2014).
2. The Client Assignment Problem for Continuous Distributed Interactive Applications:
Analysis,Algorithms and Evaluation (IEEE 2014).
3. Power Control and Coding Formulation for State Estimation with Wireless Sensors(IEEE
2014).

DOTNET based IMAGE PROCESSING

1. Localization of license Plate Number using Dynamic Image Processing Technique and
Genetic Algorithm (IEEE 2014).
2. Face recognition and facial expression identification using PCA (IEEE 2014).
3. Edge-based IVD segmentation systems (IEEE 2014).
4. Image Contrast Enhancement Using Color and Depth Histograms (IEEE 2014).
5. Efficient homomorphism encryption on integer vectors and its applications (IEEE 2014).
6. On Scanning Linear Barcodes from Out-of-Focus Blurred Images: A Spatial Dynamic
Template Matching Approach (IEEE 2014)..

DOTNET based NEURAL NETWORKS

1. Multi touch Gesture-Based Authentication (IEEE 2014).
2. A Novel Face Detection Algorithm Based on PCA and Adaboost (IEEE 2014).

 DOTNET based Networks:

1. Adopting hybrid CDN-P2P in IP-over-WDM networks: An energy-efficiency perspective
(IEEE 2014).
2. Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected
MANETs (IEEE 2014).
3. Cognitive Dynamics: From Attractors to Active Inference (IEEE 2014).

 DOTNET based VIDEO PROCESSING:
1. Learning vehicle motion patterns based on environment model and vehicle trajectories
(IEEE 2014)..
2. A MultiScale Particle Filter Framework for Contour Detection (IEEE 2014). [Device
Based]
3. Robust Causality Check for Sampled Scattering Parameters via a Filtered Fourier
Transform.(IEEE 2014). [Device Based]

 DOTNET based WEB MINING:

1. Content based hidden web ranking algorithm (IEEE 2014).
2. Shortest Path Algorithm Based on Delaunay Triangulation (IEEE 2014).
3. A Gesture Learning Interface for Simulated Robot Path Shaping With a Human
Teacher (IEEE 2014).
4. Securing Digital Reputation in Online Social Media (IEEE 2014).

DOTNET based MOBILE COMPUTING

1. Distributed Flow Scheduling in Energy-Aware Data Center Networks on Open Flow-based
platform (IEEE 2014).
2. A survey on energy efficient routing protocols in wireless sensor network (IEEE 2014).
3. GSM infrastructure used for data transmission (IEEE 2014). [Device Based].
4. Probabilistic Average Energy Flooding to Maximize Lifetime of wire-less Networks
(IEEE 2014).
5. Probabilistic Lifetime Maximization of Sensor Networks (IEEE 2014).

Thursday, 25 June 2015

Enumeration concepts in C

  
Definition:
  •          Enumeration is Userdefined Datatype in C.
  •          Keyword: enum
Syntax:

  enum userdefined_name{value1,value2,...};

Sample program:

#include<stdio.h>
#include<conio.h>
void main()
{
enum days{sun,mon,tues,wed,thu,fri,sat};
enum days weekend;                                          //weekend is the instance of days.
weekend=sat;
printf("weekend is %d",weekend);
getch();
}

output:
weekend is 6 //assume sun as 0 ,mon as 1 like that

Logo development of Microsoft


Data Structures interview questions

DATA STRUCTURES INTERVIEW QUESTIONS 

1. What is data structure?
A data structure is a way of organizing data that considers not only the items stored, but also their relationship to each other. Advance knowledge about the relationship between data items allows designing of efficient algorithms for the manipulation of data.

 2. List out the areas in which data structures are applied extensively?
1. Compiler Design,
2. Operating System,
 3. Database Management System,
 4. Statistical analysis package, 5. Numerical Analysis,
 6. Graphics,
7. Artificial Intelligence,
8. Simulation

3. What are the major data structures used in the following areas : 
RDBMS, Network data model and Hierarchical data model. 1. RDBMS = Array (i.e. Array of structures) 2. Network data model = Graph 3. Hierarchical data model = Trees

4. If you are using C language to implement the heterogeneous linked list, what pointer type will you use? The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.

 5. Minimum number of queues needed to implement the priority queue?
 Two. One queue is used for actual storing of data and another for storing priorities.

6. What is the data structures used to perform recursion? 

Stack. Because of its LIFO (Last In First Out) property it remembers its 'caller' so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls. Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.

7. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms?
Polish and Reverse Polish notations.

8. Convert the expression ((A + B) * C - (D - E) ^ (F + G)) to equivalent Prefix and Postfix notations. 
1. Prefix Notation: - * +ABC ^ - DE + FG
2. Postfix Notation: AB + C * DE - FG + ^ -

9. Sorting is not possible by using which of the following methods? (Insertion, Selection, Exchange, Deletion)
Sorting is not possible in Deletion. Using insertion we can perform insertion sort, using selection we can perform selection sort, using exchange we can perform the bubble sort (and other similar sorting methods). But no sorting method can be done just using deletion.

10. What are the methods available in storing sequential files ?  
1. Straight merging, 2. Natural merging, 3. Polyphase sort, 4. Distribution of Initial runs.

11. List out few of the Application of tree data-structure? 
1. The manipulation of Arithmetic expression, 2. Symbol Table construction, 3. Syntax analysis.

12. List out few of the applications that make use of Multilinked Structures?
1. Sparse matrix, 2. Index generation.

13. In tree construction which is the suitable efficient data structure? 
(Array, Linked list, Stack, Queue) Linked list is the suitable efficient data structure.

14. What is the type of the algorithm used in solving the 8 Queens problem? 
Backtracking.

15. In an AVL tree, at what condition the balancing is to be done?
 If the 'pivotal value' (or the 'Height factor') is greater than 1 or less than -1.

16. What is the bucket size, when the overlapping and collision occur at same time?
One. If there is only one entry possible in the bucket, when the collision occurs, there is no way to accommodate the colliding value. This results in the overlapping of values.

 17. Classify the Hashing Functions based on the various methods by which the key value is found.
1. Direct method, 2. Subtraction method, 3. Modulo-Division method, 4. Digit-Extraction method, 5. Mid-Square method, 6. Folding method, 7. Pseudo-random method.

18. What are the types of Collision Resolution Techniques and the methods used in each of the type?
Open addressing (closed hashing): The methods used include: Overflow block.
 Closed addressing (open hashing): The methods used include: Linked list, Binary tree 

19. In RDBMS, what is the efficient data structure used in the internal storage representation?
B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes.

20. What is a spanning Tree?
A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized.

Android projects


Android Projects:

1.ANDROID based CLOUD COMPUTING:

  •  Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices (IEEE 2014).
  • Cloud based java compiler-CBJC (IEEE 2014).
  •  StreamMe: Me‐centric multimedia streaming system with clouds using smartphone (IEEE 2014).


2. ANDROID based Data Mining:


  • A Location-Privacy Threat Stemming from the Use of Shared Public IP Addresses (IEEE 2014).
  •  QR-code Based Information Access System in shopping mall (IEEE 2014).
3. ANDROID based SURVEILLANCE :

  • GPS based human motion monitoring system using android smartphone (IEEE 2014).
  • Android interface based GCM home security system (IEEE 2014).
  • Anti-theft application for android constructs devices
4. ANDROID based WEB MINING :

  • A Personal Mobile Commerce Pattern Mining and Prediction using Android smartphone(IEEE 2014).
  •  Join with you-Social Networking on android smartphone (IEEE 2014).
5. ANDROID based REAL TIME APPLICATION SYSTEMS :

  • Quick-witted CAR PARKING guidance and destruction alert (IEEE 2014).
  • The Application of considerate screen using android smartphone (IEEE 2014).
6. ANDROID based WEB SERVICES

  • Toward Preserving Privacy and Functionality in Geosocial Networks (IEEE 2014).
  •  Using Android smartphone find the companion location (IEEE 2014).