KOMPETENZEN TECHNOLOGIES a leading information technology training and consulting company in Kerala INDIA. We providing opportunity for students to do their final year academic projects in latest technologies according to industry standards. We Provide Final Year academic Projects for all branches of Engineering, Diploma and M-Tech Students All the projects are developed according to IEEE Standards. We offer academic projects at various levels ranging from graduates to masters (Diploma, BE, M. Tech, MCA, M. Sc, BCA (CS/IT)).. As a part of our vision to provide hands-on experience to the students we invite them from the stream of Electronics, Computer Science, and Information Technology final year engineering students to carry out their academic project works at our institute.

Enquire Now

Responsive image

  THINK | DESIGN | R&D

  • We think, design and do research
  • Development on latest Technologies
  • Prepare base works.
Responsive image

  DEVELOP | IMPLEMENT | EXECUTE

  • We develop the projects according to university standards.
  • Execute the concepts.
Responsive image

  TRAIN | DELIVER | DOCUMENT

  • We train the students on different technologies
  • Deliver the project on time
  • Will provide report and PPT materials.

PROJECT ABSTRACTS


Topic : Veterinary Website Management System Java Project

Online applications are playing an important role in our day to day life from online shopping to doctor booking which is saving time and helping ineffective management of resources. As of now, there are no applications for online doctor appointments for veterinary systems. In this project java based web application is designed, which as features for booking an appointment by checking the availability of a doctor and then select specific doctor specialization and a form is shown to the user who will fill the form based on....

Topic : Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring viaCompressive Sensing

As e-health technology continues to advance, health related multimedia data is being exponentially generated from healthcare monitoring devices and sensors. Coming with it are the challenges on how to efficiently acquire, index, and process such a huge amount of data for effective healthcare and related decision making, while respecting user’s data privacy. In this paper, we propose a secure cloud- based framework for privacyaware healthcare monitoring systems, which allows fast data acquisition and indexing with strong privacy assurance. For efficient data acquisition, we adopt compressive sensing for easy data sampling, compression, and recovery. We then focus on how to secure and fast index the resulting large amount of continuously generated compressed samples, with the goal to achieve secure selected retrieval over compressed ....

Topic : Tag Based Image Search by Social Re-ranking

Social media sharing websites like Flickr allow users to annotate images with free tags, which significantly contribute to the development of the web image retrieval and organization. Tag-based image search is an important method to find images contributed by social users in such social websites. However, how to make the top ranked result relevant and with diversity is challenging. In this paper, we propose a social re-ranking system for tag-based image retrieval with the consideration of image’s relevance and diversity. We aim at re-ranking images according to their visual information, semantic information and social clues. The initial results include images contributed ....

Topic : Introduction to SinJAR (a New Tool forReverse Engineering Java Applications)and Tracing its Malicious Actions using Hidden Markov Models

In this paper, we are proposing a new tool for reversing Java applica- tions called SinJAR. SinJAR is a lightweight software written in Java aiming at inspecting bytecode at compile time and producing the structure tree of a targeted application. Besides, it is able to detect vulnerabilities and security weaknesses in- side the Java code. SinJAR can be used for two purposes. The first one is sane and consists in using it to verify whether or ....

Topic : Data Leakage in Java applets with Exception Mechanism

It is becoming more and more important to study methods for protecting sensitive data in computerand communication systems from unauthorized access, use, modification, destruction or deletion.Sensitive data include intellectual properties, payment information, personal files, personal creditcard and other information depending on the business and the industry. Therefore, data leakage isconsidered an emerging security threat to organizations and companies. In this paper we present astatic analysis method for information flow ....