SlideShare a Scribd company logo
1 of 8
S3 TECHNOLOGIES, MADURAI
2013 - 2014 IEEEProjects @ s3 technologies
S.
N
O

Project

IEEE 2013 Project Titles

Domain

Lang/Ye
ar

Code

JAVA
1
S31301

A Stochastic Model to Investigate Data Center Performance and

CLOUD COMPUTING

JAVA/2013

QoS in IaaS Cloud Computing Systems
2

S31302

CloudMoV: Cloud-based Mobile Social TV

CLOUD COMPUTING
JAVA/2013

3

S31303

Dynamic Resource Allocation Using Virtual Machines for Cloud

CLOUD COMPUTING
JAVA/2013

Computing Environment
4

S31304

Error-Tolerant Resource Allocation and Payment Minimization

CLOUD COMPUTING
JAVA/2013

for Cloud System
5

S31305

Harnessing the Cloud for Securely Outsourcing Large-Scale

CLOUD COMPUTING
JAVA/2013

Systems of Linear Equations
6

S31306

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in

CLOUD COMPUTING
JAVA/2013

the Cloud
7

S31307

PACK: Prediction-Based Cloud Bandwidth and Cost Reduction

CLOUD COMPUTING
JAVA/2013

System
8

JAVA/2013
S31308

Privacy-Preserving Public Auditing for Secure Cloud Storage

CLOUD COMPUTING

S31309

Scalable and Secure Sharing of Personal Health Records in Cloud

CLOUD COMPUTING
JAVA/2013

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI
9

Computing Using Attribute-Based Encryption

10

JAVA/2013
S31310

Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems

CLOUD COMPUTING

S31311

A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data

DATA MINING

S31312

A New Algorithm for Inferring User Search Goals with Feedback

DATA MINING

11

JAVA/2013

JAVA/2013

12
Sessions
13

JAVA/2013
S31313

Annotating Search Results from Web Databases

DATA MINING

S31314

Anomaly Detection via Online Over-Sampling Principal

DATA MINING

14

JAVA/2013
Component Analysis

S31315

Distributed Processing of Probabilistic Top-k Queries in Wireless

DATA MINING

15

JAVA/2013
Sensor Networks
JAVA/2013
S31316

m-Privacy for Collaborative Data Publishing

DATA MINING

S31317

Protecting Sensitive Labels in Social Network Data

DATA MINING

16

17

JAVA/2013
Anonymization

S31318

Tweet Analysis for Real-Time Event Detection and Earthquake

DATA MINING

18

JAVA/2013
Reporting System Development

19

JAVA/2013
S31319

EAACK—A Secure Intrusion-Detection System for MANETs

SECURE COMPUTING

S31320

Identity-Based Secure Distributed Data Storage Schemes

SECURE COMPUTING

20

JAVA/2013

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI
S31321

Modeling the Pairwise Key Predistribution Scheme in the

SECURE COMPUTING

21

JAVA/2013
Presence of Unreliable Links

S31322

NICE: Network Intrusion Detection and Countermeasure

SECURE COMPUTING

22

JAVA/2013
Selection in Virtual Network Systems

23

JAVA/2013
S31323

Privacy Preserving Data Sharing With Anonymous ID Assignment

SECURE COMPUTING

S31324

Securing Class Initialization in Java-like Languages

SECURE COMPUTING

S31325

Security Analysis of a Single Sign-On Mechanism for Distributed

SECURE COMPUTING

24

JAVA/2013

25

JAVA/2013
Computer Networks

26

JAVA/2013
S31326

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

SECURE COMPUTING

S31327

WARNINGBIRD: A Near Real-time Detection System for

SECURE COMPUTING

27

JAVA/2013
Suspicious URLs in Twitter Stream

S31328

A Highly Scalable Key Pre-Distribution Scheme for Wireless

NETWORKING

28

JAVA/2013
Sensor Networks

29

JAVA/2013
S31329

Delay-Based Network Utility Maximization

NETWORKING

S31330

Dynamic Control of Coding for Progressive Packet Arrivals in

NETWORKING

JAVA/2013
30

DTNs
S31331

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks

PARALLEL &

Creation

DISTRIBUTED SYSTEMS

Security Analysis of a Privacy-Preserving Decentralized Key-Policy

PARALLEL &

31

JAVA/2013

32

JAVA/2013
S31332

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI
Attribute-Based Encryption Scheme
IP-Geolocation Mapping for Moderately Connected Internet

PARALLEL &

Regions

DISTRIBUTED SYSTEMS

Optimal Client-Server Assignment for Internet Distributed

PARALLEL &

Systems

S31333

DISTRIBUTED SYSTEMS

DISTRIBUTED SYSTEMS

Content Sharing over Smartphone-Based Delay-Tolerant

MOBILE COMPUTING

33

JAVA/2013

S31334
34

JAVA/2013

S31335
35

JAVA/2013
Networks

S31336

DCIM: Distributed Cache Invalidation Method for Maintaining

MOBILE COMPUTING

36

JAVA/2013
Cache Consistency in Wireless Mobile Networks

S31337

Discovery and Verification of Neighbor Positions in Mobile Ad

MOBILE COMPUTING

37

JAVA/2013
Hoc Networks

S31338

Efficient Rekeying Framework for Secure Multicast with Diverse-

MOBILE COMPUTING

38

JAVA/2013
Subscription-Period Mobile Users

39

JAVA/2013
S31339

A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data

S31340

PATTERN ANALYSIS &
MACHINE

SERVICE COMPUTING
A Decentralized Service Discovery Approach on Peer-to-Peer

JAVA/2013
(WEB SERVICE)

40
Networks
S31341

Personalized QoS-Aware Web Service Recommendation and

SERVICE COMPUTING

Visualization

(WEB SERVICE)

Privacy-Enhanced Web Service Composition

SERVICE COMPUTING
(WEB SERVICE)

JAVA/2013
41
42

JAVA/2013
S31342

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI
43

JAVA/2013
S31343

Whole Test Suite Generation

SOFTWARE
ENGINEERING

S31344

A Load Balancing Model Based on Cloud Partitioning for the

CLOUD COMPUTING

JAVA/2013
44

Public Cloud
JAVA/2013
S31345

45

Document Clustering for Forensic Analysis: An Approach for

DATA MINING

Improving Computer Inspection
JAVA/2013
S31346

46

A Method for Mining Infrequent Causal Associations and Its

DATA MINING

Application in Finding Adverse Drug Reaction Signal Pairs
JAVA/2013
S31347

47

Clustering Sentence-Level Text Using a Novel Fuzzy Relational

DATA MINING

Clustering Algorithm
JAVA/2013
S31348

Two tales of privacy in online social networks

SECURE COMPUTING

S31349

Minimum Cost Blocking Problem in Multi-path Wireless Routing

NETWORKING

48
JAVA/2013
49

Protocols
JAVA/2013
S31350

On the Node Clone Detection in Wireless Sensor Networks

NETWORKING

S31351

Opportunistic MANETs: Mobility Can Make Up for Low

NETWORKING

50
JAVA/2013
51

Transmission Power
JAVA/2013
S31352

52

53

Back-Pressure-Based Packet-by-Packet Adaptive Routing in

NETWORKING

Communication Networks
JAVA/2013
S31353

Fast Transmission to Remote Cooperative Groups: A New Key
Management Paradigm

NETWORKING

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI

JAVA/2013
S31354

Load Rebalancing for Distributed File Systems in Clouds

CLOUD COMPUTING

S31355

Toward a Statistical Framework for Source Anonymity in Sensor

MOBILE COMPUTING

54
JAVA/2013

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI

55

56

57

58

59

60

61

62

63

64
65

Networks

S31356

S31357

S31358

S31359

S31360

S31361

S31362

Mobile Relay
Configuration in
Data-Intensive
Wireless Sensor
Networks
Vampire Attacks:
Draining Life from
Wireless Ad Hoc
Sensor
Networks
Crowdsourcing
Predictors of
Behavioral
Outcomes
Optimizing Cloud
Resources for
Delivering IPTV
Services Through
Virtualization
Participatory
Privacy: Enabling
Privacy in
Participatory
Sensing
Secure Encounterbased Mobile
Social Networks:
Requirements,
Designs, and
Tradeoffs
Facilitating
Document
Annotation using
Content and
Querying
Value

JAVA/2013
MOBILE
COMPUTING
JAVA/2013
MOBILE
COMPUTING
JAVA/2013
DATA MINING
JAVA/2013
CLOUD
COMPUTING
JAVA/2013

NETWORKING
JAVA/2013
SECURE
COMPUTING

JAVA/2013

DATA MINING

S31363

Privacy Preserving
Delegated Access
Control in Public
Clouds

CLOUD
COMPUTING

S31364

Twitsper:
Tweeting
Privately

SECURE
COMPUTING

S31365

A Generalized
Flow-Based
Method for
Analysis of

JAVA/2013

DATA MINING

JAVA/2013

JAVA/2013

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com
S3 TECHNOLOGIES, MADURAI
Relationships on
Wikipedia

66

S31366

67
S31367

68

69

70

71

S31368

S31369

S31370

S31371

A System to Filter
Unwanted
Messages from
OSN User Walls
Anonymization of
Centralized and
Distributed Social
Networks by
Sequential
Clustering
Toward Privacy
Preserving and
Collusion
Resistance in a
Location
Proof Updating
System
Understanding
the External Links
of Video Sharing
Sites:
Measurement and
Analysis
Intrusion
Detection
Technique by
using K-means,
Fuzzy Neural
Network and SVM
classifiers.
Combining
Cryptographic
Primitives to
Prevent Jamming
Attacks
in Wireless
Networks

JAVA/2013
DATA MINING
JAVA/2013
DATA MINING

JAVA/2013
MOBILE
COMPUTING

JAVA/2013
MULTIMEDIA

JAVA/2013

DATA MINING
(CONFERENCE)
JAVA/2013
SECURE
COMPUTING
(CONFERENCE)

43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai9.contact: 0452-4373398,
Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com,
http://s3studentproject.blogspot.com

More Related Content

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Featured

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

2013 2014-ieee-java-project-titles in madurai

  • 1. S3 TECHNOLOGIES, MADURAI 2013 - 2014 IEEEProjects @ s3 technologies S. N O Project IEEE 2013 Project Titles Domain Lang/Ye ar Code JAVA 1 S31301 A Stochastic Model to Investigate Data Center Performance and CLOUD COMPUTING JAVA/2013 QoS in IaaS Cloud Computing Systems 2 S31302 CloudMoV: Cloud-based Mobile Social TV CLOUD COMPUTING JAVA/2013 3 S31303 Dynamic Resource Allocation Using Virtual Machines for Cloud CLOUD COMPUTING JAVA/2013 Computing Environment 4 S31304 Error-Tolerant Resource Allocation and Payment Minimization CLOUD COMPUTING JAVA/2013 for Cloud System 5 S31305 Harnessing the Cloud for Securely Outsourcing Large-Scale CLOUD COMPUTING JAVA/2013 Systems of Linear Equations 6 S31306 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in CLOUD COMPUTING JAVA/2013 the Cloud 7 S31307 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction CLOUD COMPUTING JAVA/2013 System 8 JAVA/2013 S31308 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING S31309 Scalable and Secure Sharing of Personal Health Records in Cloud CLOUD COMPUTING JAVA/2013 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 2. S3 TECHNOLOGIES, MADURAI 9 Computing Using Attribute-Based Encryption 10 JAVA/2013 S31310 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems CLOUD COMPUTING S31311 A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data DATA MINING S31312 A New Algorithm for Inferring User Search Goals with Feedback DATA MINING 11 JAVA/2013 JAVA/2013 12 Sessions 13 JAVA/2013 S31313 Annotating Search Results from Web Databases DATA MINING S31314 Anomaly Detection via Online Over-Sampling Principal DATA MINING 14 JAVA/2013 Component Analysis S31315 Distributed Processing of Probabilistic Top-k Queries in Wireless DATA MINING 15 JAVA/2013 Sensor Networks JAVA/2013 S31316 m-Privacy for Collaborative Data Publishing DATA MINING S31317 Protecting Sensitive Labels in Social Network Data DATA MINING 16 17 JAVA/2013 Anonymization S31318 Tweet Analysis for Real-Time Event Detection and Earthquake DATA MINING 18 JAVA/2013 Reporting System Development 19 JAVA/2013 S31319 EAACK—A Secure Intrusion-Detection System for MANETs SECURE COMPUTING S31320 Identity-Based Secure Distributed Data Storage Schemes SECURE COMPUTING 20 JAVA/2013 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 3. S3 TECHNOLOGIES, MADURAI S31321 Modeling the Pairwise Key Predistribution Scheme in the SECURE COMPUTING 21 JAVA/2013 Presence of Unreliable Links S31322 NICE: Network Intrusion Detection and Countermeasure SECURE COMPUTING 22 JAVA/2013 Selection in Virtual Network Systems 23 JAVA/2013 S31323 Privacy Preserving Data Sharing With Anonymous ID Assignment SECURE COMPUTING S31324 Securing Class Initialization in Java-like Languages SECURE COMPUTING S31325 Security Analysis of a Single Sign-On Mechanism for Distributed SECURE COMPUTING 24 JAVA/2013 25 JAVA/2013 Computer Networks 26 JAVA/2013 S31326 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems SECURE COMPUTING S31327 WARNINGBIRD: A Near Real-time Detection System for SECURE COMPUTING 27 JAVA/2013 Suspicious URLs in Twitter Stream S31328 A Highly Scalable Key Pre-Distribution Scheme for Wireless NETWORKING 28 JAVA/2013 Sensor Networks 29 JAVA/2013 S31329 Delay-Based Network Utility Maximization NETWORKING S31330 Dynamic Control of Coding for Progressive Packet Arrivals in NETWORKING JAVA/2013 30 DTNs S31331 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks PARALLEL & Creation DISTRIBUTED SYSTEMS Security Analysis of a Privacy-Preserving Decentralized Key-Policy PARALLEL & 31 JAVA/2013 32 JAVA/2013 S31332 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 4. S3 TECHNOLOGIES, MADURAI Attribute-Based Encryption Scheme IP-Geolocation Mapping for Moderately Connected Internet PARALLEL & Regions DISTRIBUTED SYSTEMS Optimal Client-Server Assignment for Internet Distributed PARALLEL & Systems S31333 DISTRIBUTED SYSTEMS DISTRIBUTED SYSTEMS Content Sharing over Smartphone-Based Delay-Tolerant MOBILE COMPUTING 33 JAVA/2013 S31334 34 JAVA/2013 S31335 35 JAVA/2013 Networks S31336 DCIM: Distributed Cache Invalidation Method for Maintaining MOBILE COMPUTING 36 JAVA/2013 Cache Consistency in Wireless Mobile Networks S31337 Discovery and Verification of Neighbor Positions in Mobile Ad MOBILE COMPUTING 37 JAVA/2013 Hoc Networks S31338 Efficient Rekeying Framework for Secure Multicast with Diverse- MOBILE COMPUTING 38 JAVA/2013 Subscription-Period Mobile Users 39 JAVA/2013 S31339 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data S31340 PATTERN ANALYSIS & MACHINE SERVICE COMPUTING A Decentralized Service Discovery Approach on Peer-to-Peer JAVA/2013 (WEB SERVICE) 40 Networks S31341 Personalized QoS-Aware Web Service Recommendation and SERVICE COMPUTING Visualization (WEB SERVICE) Privacy-Enhanced Web Service Composition SERVICE COMPUTING (WEB SERVICE) JAVA/2013 41 42 JAVA/2013 S31342 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 5. S3 TECHNOLOGIES, MADURAI 43 JAVA/2013 S31343 Whole Test Suite Generation SOFTWARE ENGINEERING S31344 A Load Balancing Model Based on Cloud Partitioning for the CLOUD COMPUTING JAVA/2013 44 Public Cloud JAVA/2013 S31345 45 Document Clustering for Forensic Analysis: An Approach for DATA MINING Improving Computer Inspection JAVA/2013 S31346 46 A Method for Mining Infrequent Causal Associations and Its DATA MINING Application in Finding Adverse Drug Reaction Signal Pairs JAVA/2013 S31347 47 Clustering Sentence-Level Text Using a Novel Fuzzy Relational DATA MINING Clustering Algorithm JAVA/2013 S31348 Two tales of privacy in online social networks SECURE COMPUTING S31349 Minimum Cost Blocking Problem in Multi-path Wireless Routing NETWORKING 48 JAVA/2013 49 Protocols JAVA/2013 S31350 On the Node Clone Detection in Wireless Sensor Networks NETWORKING S31351 Opportunistic MANETs: Mobility Can Make Up for Low NETWORKING 50 JAVA/2013 51 Transmission Power JAVA/2013 S31352 52 53 Back-Pressure-Based Packet-by-Packet Adaptive Routing in NETWORKING Communication Networks JAVA/2013 S31353 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm NETWORKING 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 6. S3 TECHNOLOGIES, MADURAI JAVA/2013 S31354 Load Rebalancing for Distributed File Systems in Clouds CLOUD COMPUTING S31355 Toward a Statistical Framework for Source Anonymity in Sensor MOBILE COMPUTING 54 JAVA/2013 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai- 9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 7. S3 TECHNOLOGIES, MADURAI 55 56 57 58 59 60 61 62 63 64 65 Networks S31356 S31357 S31358 S31359 S31360 S31361 S31362 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Crowdsourcing Predictors of Behavioral Outcomes Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization Participatory Privacy: Enabling Privacy in Participatory Sensing Secure Encounterbased Mobile Social Networks: Requirements, Designs, and Tradeoffs Facilitating Document Annotation using Content and Querying Value JAVA/2013 MOBILE COMPUTING JAVA/2013 MOBILE COMPUTING JAVA/2013 DATA MINING JAVA/2013 CLOUD COMPUTING JAVA/2013 NETWORKING JAVA/2013 SECURE COMPUTING JAVA/2013 DATA MINING S31363 Privacy Preserving Delegated Access Control in Public Clouds CLOUD COMPUTING S31364 Twitsper: Tweeting Privately SECURE COMPUTING S31365 A Generalized Flow-Based Method for Analysis of JAVA/2013 DATA MINING JAVA/2013 JAVA/2013 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com
  • 8. S3 TECHNOLOGIES, MADURAI Relationships on Wikipedia 66 S31366 67 S31367 68 69 70 71 S31368 S31369 S31370 S31371 A System to Filter Unwanted Messages from OSN User Walls Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System Understanding the External Links of Video Sharing Sites: Measurement and Analysis Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks JAVA/2013 DATA MINING JAVA/2013 DATA MINING JAVA/2013 MOBILE COMPUTING JAVA/2013 MULTIMEDIA JAVA/2013 DATA MINING (CONFERENCE) JAVA/2013 SECURE COMPUTING (CONFERENCE) 43, North Masi street, Opposite of Krishnan kovil, Simmakkal, Madurai9.contact: 0452-4373398, Cell : 9789939435 , mail : s3techmadurai@gmail.com, visit:s3techindia.com, http://s3studentproject.blogspot.com