SlideShare a Scribd company logo
1 of 11
Download to read offline
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
CLOUD COMPUTING
S.No TITLES ID YEAR
1 Cloud Federations in the Sky: Formation Game and
Mechanism
SS01 March
2015
2 Stealthy Denial of Service Strategy in Cloud Computing SS02 March
2015
3 A Scalable and Reliable Matching Service for Content-
Based Publish/Subscribe Systems
SS03 March
2015
4 Energy-Efficient Fault-Tolerant Data Storage and Processing
in Mobile Cloud
SS04 March
2015
5 A Secure Data Self-Destructing Scheme in Cloud
Computing
SS05 Dec
2015
6 Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation
SS06 2015
7 SelCSP: A Framework to Facilitate Selection of Cloud
Service Providers
SS07 March
2015
8 TEES: An Efficient Search Scheme over Encrypted Data on
Mobile Cloud
SS08 2015
9 Application-Level Optimization of Big Data Transfers
Through Pipelining, Parallelism and Concurrency
SS09 2015
10 Self-Adjusting Slot Configurations for Homogeneous and
Heterogeneous Hadoop Clusters
SS10 2015
11 Attribute-based Access Control with Constant-size
Ciphertext in Cloud Computing
SS11 2015
12 Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
SS12 2015
13 Cloud-Based Multimedia Content Protection System SS13 March
2015
14 DROPS: Division and Replication of Data in Cloud for
Optimal Performance and Security
SS14 Dec
2014
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
15 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
SS15 2015
16 Enabling Efficient Multi-Keyword Ranked Search Over
Encrypted Mobile Cloud Data Through Blind Storage
SS16 March
2015
17 Identity-Based Encryption with Outsourced Revocation in
Cloud Computing
SS17 Feb
2015
18 Performing Initiative Data Prefetching in Distributed File
Systems for Cloud Computing
SS18 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
DATA MINING
S.No TITLES ID YEAR
1 k-Nearest Neighbor Classification over Semantically
Secure Encrypted Relational Data
SS19 May
2015
2 A Unifying Framework of Mining Trajectory Patterns of
Various Temporal Tightness
SS20 June
2015
3 TASC:Topic-Adaptive Sentiment Classification on
Dynamic Tweets
SS21 June
2015
4 Discovery of Path Nearby Clusters in Spatial Networks SS22 June
2015
5 Best Keyword Cover Search SS23 Jan
2015
6 Discovery of Ranking Fraud for Mobile Apps SS24 Jan
2015
7 Efficient Top-k Retrieval on Massive Data SS25 2015
8 EMR: A Scalable Graph-based Ranking Model for
Content-based Image Retrieval
SS26 Jan
2015
9 GDCluster: A General Decentralized Clustering Algorithm SS27 July
2015
10 Tweet Segmentation and Its Application to Named Entity
Recognition
SS28 Feb
2015
11 Improving Web Navigation Usability by Comparing Actual
and Anticipated Usage
SS29 Feb
2015
12 Rank-Based Similarity Search: Reducing the Dimensional
Dependence
SS30 Jan
2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
MOBILE COMPUTING
S.No TITLES ID YEAR
1 BRACER: A Distributed Broadcast Protocol in Multi-Hop
Cognitive Radio Ad Hoc Networks with Collision
Avoidance
SS31 March
2015
2 Friendbook: A Semantic-Based Friend Recommendation
System for Social Networks
SS32 March
2015
3 Collision Tolerant and Collision Free Packet Scheduling for
Underwater Acoustic Localization
SS33 May
2015
4 Defeating Jamming With the Power of Silence: A Game-
Theoretic Analysis
SS34 May
2015
5 Distortion-Aware Concurrent Multipath Transfer for
Mobile Video Streaming in Heterogeneous Wireless
Networks
SS35 April
2015
6 Maximizing P2P File Access Availability in Mobile Ad
Hoc Networks though Replication for Efficient File Sharing
SS36 April
2015
7 Statistical Dissemination Control in Large Machine-to-
Machine Communication Networks
SS37 April
2015
8 Defending Against Collaborative Attacks by Malicious
Nodes in MANETs: A Cooperative Bait Detection
Approach
SS38 March
2015
9 Mobile-Projected Trajectory Algorithm With Velocity-
Change Detection for Predicting Residual Link Lifetime in
MANET
SS39 March
2015
10 On-Demand Discovery of Software Service Dependencies
in MANETs
SS40 June
2015
11 Nearest Neighbor Search for Location-Dependent Sensor
Data in MANETs
SS41 June
2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
NETWORK/ NETWORK SECURITY
S.No TITLES ID YEAR
1 A Nearly Optimal Packet Scheduling Algorithm for Input
Queued Switches with Deadline Guarantees
SS42 JUNE
2015
2 Continuous and Transparent User Identity Verification for
Secure Internet Services
SS43 June
2015
3 A Distortion-Resistant Routing Framework for Video Traffic
in Wireless Multihop Networks
SS44 April
2015
4 A Hierarchical Account-Aided Reputation Management
System for MANETs
SS45 Feb
2015
5 Efficient and Truthful Bandwidth Allocation in Wireless
Mesh Community Networks
SS46 Feb
2015
6 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
SS47 2015
7 Data Collection in Multi-Application Sharing Wireless
Sensor Networks
SS48 Feb
2015
8 Cost-Minimizing Dynamic Migration of Content Distribution
Services into Hybrid Clouds
SS49 2015
9 Authenticated Key Exchange Protocols for Parallel Network
File Systems
SS50 2015
10 On Traffic-Aware Partition and Aggregation in MapReduce
for Big Data Applications
SS51 2015
11 Secure and Distributed Data Discovery and Dissemination in
Wireless Sensor Networks
SS52 April
2015
12 Shared Authority Based Privacy-Preserving Authentication
Protocol in Cloud Computing
SS53 Jan
2015
13 A Hybrid Cloud Approach for Secure Authorized
Deduplication
SS54 May
2015
14 A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
SS55 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
INFORMATION FORENSICS
S.No TITLES ID YEAR
1 A Hybrid Scheme of Public-Key Encryption and Somewhat
Homomorphic Encryption
SS57 May
2015
2 Attribute-Based Encryption With Efficient Verifiable
Outsourced Decryption
SS58 July
2015
3 An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor Networks
Integration
SS59 Jan
2015
4 An Energy-Ratio-Based Approach for Detecting Pilot
Spoofing Attack in Multiple-Antenna Systems
SS60 May
2015
5 Adaptively Secure Identity-Based Broadcast Encryption With
a Constant-Sized Ciphertext
SS61 Mar
2015
6 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous
Attribute-Based Encryption
SS62 Jan
2015
7 Correlated Differential Privacy: Hiding Information in Non-
IID Data Set
SS63 Feb
2015
8 A Privacy-Preserving Framework for Large-Scale Content-
Based Information Retrieval
SS64 Jan
2015
9 Implementation of a New Lightweight Encryption Design for
Embedded Security
SS65 Jan
2015
10 Improving Privacy and Security in Decentralized Ciphertext-
Policy Attribute-Based Encryption
SS66 Mar
2015
11 Enabling Cloud Storage Auditing With Key-Exposure
Resistance
SS67 June
2015
15 Improving the Network Lifetime of MANETs through
Cooperative MAC Protocol Design
SS56 April
2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
12 Effective Key Management in Dynamic Wireless Sensor
Networks
SS68 Feb
2015
13 Masked Beamforming in the Presence of Energy-Harvesting
Eavesdroppers
SS69 Jan
2015
14 Efficient Public Key Encryption With Equality Test
Supporting Flexible Authorization
SS70 Mar
2015
15 LIVE: Lightweight Integrity Verification and Content Access
Control for Named Data Networking
SS71 Feb
2015
16 Passive IP Traceback: Disclosing the Locations of IP
Spoofers From Path Backscatter
SS72 Mar
2015
17 Provable Multicopy Dynamic Data Possession in Cloud
Computing Systems
SS73 Mar
2015
18 White-Box Traceable Ciphertext-Policy Attribute-Based
Encryption Supporting Flexible Attributes
SS74 June
2015
19 Toward Energy-Efficient Trust System Through Watchdog
Optimization for WSNs
SS75 Mar
2015
20 Secrecy Transmission With a Helper: To Relay or to Jam SS76 Feb
2015
21 Revocable and Scalable Certificateless Remote
Authentication Protocol With Anonymity for Wireless Body
Area Networks
SS77 July
2015
22 Continuous and Transparent User Identity Verification for
Secure Internet Services
SS78 June
2015
23 Privacy-Preserving Detection of Sensitive Data Exposure SS79 May
2015
24 Security Optimization of Dynamic Networks with
Probabilistic Graph Modeling and Linear Programming
SS80 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
IMAGE PROCESSING
S.No TITLES ID YEAR
1 A Methodology for Extracting Standing HumanBodies
From Single Images
SS81 JUNE
2015
2 Detection and Rectificationof Distorted Fingerprints SS82 March
2015
3 Eye Gaze Tracking With a Web Camera in a Desktop
Environment
SS83 Aug
2015
4 An Attribute-Assisted Reranking Model for Web Image
Search
SS84 JAN
2015
5 Fiducial Facial Point Extraction Using a Novel Projective
Invariant
SS85 March
2015
6 Face Recognition Across Non-Uniform Motion Blur,
Illumination, and Pose
SS86 July
2015
7 Automatic Face Naming by Learning Discriminative
Affinity Matrices From Weakly Labeled Images
SS87 2015
8 Steganography Using Reversible Texture Synthesis SS88 2015
9 An Image Recapture Detection Algorithm Based on
Learning Dictionaries of Edge Profiles
SS89 May
2015
10 Face Spoof Detection With Image Distortion Analysis SS90 April
2015
11 Median Filtered Image Quality Enhancement and Anti-
Forensics via Variational Deconvolution
SS91 May
2015
12 Content-Based Image Retrieval Using Error Diffusion
Block Truncation Coding Features
SS92 Mar
2015
13 Data-Stream-Based Intrusion Detection System for
Advanced Metering Infrastructure in Smart Grid: A
Feasibility Study
SS93 Mar
2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
APPLICATION PROJECTS
S.No Titles Code
1 Drug Management System SAD01
2 Community Forum SAD02
3 Evaluation of Employee Performance SAD03
4 Global Loan System. SAD04
5 Healthcare Security System SAD05
6 Hierarchical Organization Information SAD06
7 IT Documentation SAD07
8 Referendum Crusader Scrutiny System SAD08
9 Sales & Inventory Management System SAD09
10 Software Project Management SAD10
11 Travel Management System SAD11
12 Communication-Intensive Workloads SAD12
13 Micro-Blogging in Classroom Students Relevant and Irrelevant
Questions
SAD13
14 Blocking IP Address of Misbehaving User In Anonymous Network SAD14
15 Online E-Payments For Government Taxes SAD15
16 Cloud Computing SAD16
17 Virtual Class Room SAD17
18 Cyber Eye SAD18
19 Online Training And Exam SAD19
20 GSM Medical Report SAD20
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
21 Online Tourism SAD21
22 Rail Way Route SAD22
23 RFID Smart Card Verification SAD23
24 Mobile Sync SAD24
25 Analyzing and Opinion In For Mobile Products SAD25
26 Antiphishing Banking System SAD26
27 Construction Plus SAD27
28 Sending Resume Through SMS Gateway SAD28
29 RTO Management System SAD29
30 Graphical Password Authentication System Using Sound Signature SAD30
31 Attance Verification SAD31
32 Bio-Matrix And RFID Remote Voting System SAD32
33 Resume Send Using Mobile Application SAD33
34 Communication-Aware Load Balancing on clusters SAD34
35 Relevant and Irrelevant Questions in a Micro Blogging Supported
Classroom
SAD35
36 Authenticated Nearest Neighbor Search SAD36
37 Spatial Ranking SAD37
38 Slicing the Privacy Data Publishing SAD38
39 Revisiting Password Guessing Attacks in the Network SAD39
40 Flexible Robust Group Agreement SAD40
41 Passport Verification Based On RFID SAD41
42 Finger Print based Attendance Verification SAD42
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672
E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446
43 Finger Print Based Authentication For ATM Using Mobile Service SAD43
44 Steganography SAD44
45 Defect Tracking System SAD45
46 Copyright Protection Using Multimedia Documents Authentication SAD46
47 Automatic Composition of Semantic Web Services SAD47
48 Mage Fusion & Steganography SAD48
49 Path Selection Under Budget Constraints SAD49
50 AMES-Cloud An Adaptive Mobile Video Streaming SAD50

More Related Content

More from krish madhi

best project center for m.phil Trichy
best project center for m.phil Trichybest project center for m.phil Trichy
best project center for m.phil Trichykrish madhi
 
best project training for m.phil Trichy
best project training for m.phil Trichybest project training for m.phil Trichy
best project training for m.phil Trichykrish madhi
 
project center in Trichy
project center in Trichyproject center in Trichy
project center in Trichykrish madhi
 
best project center in Trichy
best project center in Trichybest project center in Trichy
best project center in Trichykrish madhi
 
project training center Trichy
project training center Trichyproject training center Trichy
project training center Trichykrish madhi
 
best project training center Trichy
best project training center Trichybest project training center Trichy
best project training center Trichykrish madhi
 
project training center in Trichy
project training center in Trichyproject training center in Trichy
project training center in Trichykrish madhi
 
best project training center in Trichy
best project training center in Trichybest project training center in Trichy
best project training center in Trichykrish madhi
 
best mphil project center trichy
best mphil project center trichybest mphil project center trichy
best mphil project center trichykrish madhi
 
mphil project center trichy
mphil project center trichymphil project center trichy
mphil project center trichykrish madhi
 
Cloud Computing Papers Namakkal
Cloud Computing Papers NamakkalCloud Computing Papers Namakkal
Cloud Computing Papers Namakkalkrish madhi
 
Image Processing Ieee Papers Namakkal
Image Processing  Ieee Papers NamakkalImage Processing  Ieee Papers Namakkal
Image Processing Ieee Papers Namakkalkrish madhi
 
Information Forensics Ieee Papers Namakkal
Information Forensics Ieee Papers NamakkalInformation Forensics Ieee Papers Namakkal
Information Forensics Ieee Papers Namakkalkrish madhi
 
Network Security Ieee Papers Namakkal
Network Security Ieee Papers NamakkalNetwork Security Ieee Papers Namakkal
Network Security Ieee Papers Namakkalkrish madhi
 
Network Ieee Papers Namakkal
Network Ieee Papers NamakkalNetwork Ieee Papers Namakkal
Network Ieee Papers Namakkalkrish madhi
 
Ieee 2016 Image Processing Papers Namakkal
Ieee 2016 Image Processing  Papers NamakkalIeee 2016 Image Processing  Papers Namakkal
Ieee 2016 Image Processing Papers Namakkalkrish madhi
 
Ieee 2016 Information Forensics Papers Namakkal
Ieee 2016 Information Forensics Papers NamakkalIeee 2016 Information Forensics Papers Namakkal
Ieee 2016 Information Forensics Papers Namakkalkrish madhi
 
Ieee 2016 Network Security Papers Namakkal
Ieee 2016 Network Security Papers NamakkalIeee 2016 Network Security Papers Namakkal
Ieee 2016 Network Security Papers Namakkalkrish madhi
 
Ieee 2016 Network Papers Namakkal
Ieee 2016 Network Papers NamakkalIeee 2016 Network Papers Namakkal
Ieee 2016 Network Papers Namakkalkrish madhi
 
Ieee 2016 Mobile Computing Papers Namakkal
Ieee 2016 Mobile Computing Papers NamakkalIeee 2016 Mobile Computing Papers Namakkal
Ieee 2016 Mobile Computing Papers Namakkalkrish madhi
 

More from krish madhi (20)

best project center for m.phil Trichy
best project center for m.phil Trichybest project center for m.phil Trichy
best project center for m.phil Trichy
 
best project training for m.phil Trichy
best project training for m.phil Trichybest project training for m.phil Trichy
best project training for m.phil Trichy
 
project center in Trichy
project center in Trichyproject center in Trichy
project center in Trichy
 
best project center in Trichy
best project center in Trichybest project center in Trichy
best project center in Trichy
 
project training center Trichy
project training center Trichyproject training center Trichy
project training center Trichy
 
best project training center Trichy
best project training center Trichybest project training center Trichy
best project training center Trichy
 
project training center in Trichy
project training center in Trichyproject training center in Trichy
project training center in Trichy
 
best project training center in Trichy
best project training center in Trichybest project training center in Trichy
best project training center in Trichy
 
best mphil project center trichy
best mphil project center trichybest mphil project center trichy
best mphil project center trichy
 
mphil project center trichy
mphil project center trichymphil project center trichy
mphil project center trichy
 
Cloud Computing Papers Namakkal
Cloud Computing Papers NamakkalCloud Computing Papers Namakkal
Cloud Computing Papers Namakkal
 
Image Processing Ieee Papers Namakkal
Image Processing  Ieee Papers NamakkalImage Processing  Ieee Papers Namakkal
Image Processing Ieee Papers Namakkal
 
Information Forensics Ieee Papers Namakkal
Information Forensics Ieee Papers NamakkalInformation Forensics Ieee Papers Namakkal
Information Forensics Ieee Papers Namakkal
 
Network Security Ieee Papers Namakkal
Network Security Ieee Papers NamakkalNetwork Security Ieee Papers Namakkal
Network Security Ieee Papers Namakkal
 
Network Ieee Papers Namakkal
Network Ieee Papers NamakkalNetwork Ieee Papers Namakkal
Network Ieee Papers Namakkal
 
Ieee 2016 Image Processing Papers Namakkal
Ieee 2016 Image Processing  Papers NamakkalIeee 2016 Image Processing  Papers Namakkal
Ieee 2016 Image Processing Papers Namakkal
 
Ieee 2016 Information Forensics Papers Namakkal
Ieee 2016 Information Forensics Papers NamakkalIeee 2016 Information Forensics Papers Namakkal
Ieee 2016 Information Forensics Papers Namakkal
 
Ieee 2016 Network Security Papers Namakkal
Ieee 2016 Network Security Papers NamakkalIeee 2016 Network Security Papers Namakkal
Ieee 2016 Network Security Papers Namakkal
 
Ieee 2016 Network Papers Namakkal
Ieee 2016 Network Papers NamakkalIeee 2016 Network Papers Namakkal
Ieee 2016 Network Papers Namakkal
 
Ieee 2016 Mobile Computing Papers Namakkal
Ieee 2016 Mobile Computing Papers NamakkalIeee 2016 Mobile Computing Papers Namakkal
Ieee 2016 Mobile Computing Papers Namakkal
 

Recently uploaded

The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Recently uploaded (20)

Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Latest Ieee 2016 Java Projects Trichy

  • 1. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 CLOUD COMPUTING S.No TITLES ID YEAR 1 Cloud Federations in the Sky: Formation Game and Mechanism SS01 March 2015 2 Stealthy Denial of Service Strategy in Cloud Computing SS02 March 2015 3 A Scalable and Reliable Matching Service for Content- Based Publish/Subscribe Systems SS03 March 2015 4 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud SS04 March 2015 5 A Secure Data Self-Destructing Scheme in Cloud Computing SS05 Dec 2015 6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation SS06 2015 7 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers SS07 March 2015 8 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud SS08 2015 9 Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency SS09 2015 10 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters SS10 2015 11 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing SS11 2015 12 Audit-Free Cloud Storage via Deniable Attribute-based Encryption SS12 2015 13 Cloud-Based Multimedia Content Protection System SS13 March 2015 14 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security SS14 Dec 2014
  • 2. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 15 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing SS15 2015 16 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage SS16 March 2015 17 Identity-Based Encryption with Outsourced Revocation in Cloud Computing SS17 Feb 2015 18 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing SS18 2015
  • 3. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 DATA MINING S.No TITLES ID YEAR 1 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data SS19 May 2015 2 A Unifying Framework of Mining Trajectory Patterns of Various Temporal Tightness SS20 June 2015 3 TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets SS21 June 2015 4 Discovery of Path Nearby Clusters in Spatial Networks SS22 June 2015 5 Best Keyword Cover Search SS23 Jan 2015 6 Discovery of Ranking Fraud for Mobile Apps SS24 Jan 2015 7 Efficient Top-k Retrieval on Massive Data SS25 2015 8 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval SS26 Jan 2015 9 GDCluster: A General Decentralized Clustering Algorithm SS27 July 2015 10 Tweet Segmentation and Its Application to Named Entity Recognition SS28 Feb 2015 11 Improving Web Navigation Usability by Comparing Actual and Anticipated Usage SS29 Feb 2015 12 Rank-Based Similarity Search: Reducing the Dimensional Dependence SS30 Jan 2015
  • 4. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 MOBILE COMPUTING S.No TITLES ID YEAR 1 BRACER: A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with Collision Avoidance SS31 March 2015 2 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks SS32 March 2015 3 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization SS33 May 2015 4 Defeating Jamming With the Power of Silence: A Game- Theoretic Analysis SS34 May 2015 5 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks SS35 April 2015 6 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing SS36 April 2015 7 Statistical Dissemination Control in Large Machine-to- Machine Communication Networks SS37 April 2015 8 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach SS38 March 2015 9 Mobile-Projected Trajectory Algorithm With Velocity- Change Detection for Predicting Residual Link Lifetime in MANET SS39 March 2015 10 On-Demand Discovery of Software Service Dependencies in MANETs SS40 June 2015 11 Nearest Neighbor Search for Location-Dependent Sensor Data in MANETs SS41 June 2015
  • 5. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 NETWORK/ NETWORK SECURITY S.No TITLES ID YEAR 1 A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees SS42 JUNE 2015 2 Continuous and Transparent User Identity Verification for Secure Internet Services SS43 June 2015 3 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks SS44 April 2015 4 A Hierarchical Account-Aided Reputation Management System for MANETs SS45 Feb 2015 5 Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks SS46 Feb 2015 6 Privacy-Preserving Public Auditing for Regenerating-Code- Based Cloud Storage SS47 2015 7 Data Collection in Multi-Application Sharing Wireless Sensor Networks SS48 Feb 2015 8 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds SS49 2015 9 Authenticated Key Exchange Protocols for Parallel Network File Systems SS50 2015 10 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications SS51 2015 11 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks SS52 April 2015 12 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing SS53 Jan 2015 13 A Hybrid Cloud Approach for Secure Authorized Deduplication SS54 May 2015 14 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data SS55 2015
  • 6. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 INFORMATION FORENSICS S.No TITLES ID YEAR 1 A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption SS57 May 2015 2 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption SS58 July 2015 3 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration SS59 Jan 2015 4 An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems SS60 May 2015 5 Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext SS61 Mar 2015 6 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption SS62 Jan 2015 7 Correlated Differential Privacy: Hiding Information in Non- IID Data Set SS63 Feb 2015 8 A Privacy-Preserving Framework for Large-Scale Content- Based Information Retrieval SS64 Jan 2015 9 Implementation of a New Lightweight Encryption Design for Embedded Security SS65 Jan 2015 10 Improving Privacy and Security in Decentralized Ciphertext- Policy Attribute-Based Encryption SS66 Mar 2015 11 Enabling Cloud Storage Auditing With Key-Exposure Resistance SS67 June 2015 15 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design SS56 April 2015
  • 7. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 12 Effective Key Management in Dynamic Wireless Sensor Networks SS68 Feb 2015 13 Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers SS69 Jan 2015 14 Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization SS70 Mar 2015 15 LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking SS71 Feb 2015 16 Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter SS72 Mar 2015 17 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems SS73 Mar 2015 18 White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes SS74 June 2015 19 Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs SS75 Mar 2015 20 Secrecy Transmission With a Helper: To Relay or to Jam SS76 Feb 2015 21 Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks SS77 July 2015 22 Continuous and Transparent User Identity Verification for Secure Internet Services SS78 June 2015 23 Privacy-Preserving Detection of Sensitive Data Exposure SS79 May 2015 24 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming SS80 2015
  • 8. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 IMAGE PROCESSING S.No TITLES ID YEAR 1 A Methodology for Extracting Standing HumanBodies From Single Images SS81 JUNE 2015 2 Detection and Rectificationof Distorted Fingerprints SS82 March 2015 3 Eye Gaze Tracking With a Web Camera in a Desktop Environment SS83 Aug 2015 4 An Attribute-Assisted Reranking Model for Web Image Search SS84 JAN 2015 5 Fiducial Facial Point Extraction Using a Novel Projective Invariant SS85 March 2015 6 Face Recognition Across Non-Uniform Motion Blur, Illumination, and Pose SS86 July 2015 7 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images SS87 2015 8 Steganography Using Reversible Texture Synthesis SS88 2015 9 An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles SS89 May 2015 10 Face Spoof Detection With Image Distortion Analysis SS90 April 2015 11 Median Filtered Image Quality Enhancement and Anti- Forensics via Variational Deconvolution SS91 May 2015 12 Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features SS92 Mar 2015 13 Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study SS93 Mar 2015
  • 9. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 APPLICATION PROJECTS S.No Titles Code 1 Drug Management System SAD01 2 Community Forum SAD02 3 Evaluation of Employee Performance SAD03 4 Global Loan System. SAD04 5 Healthcare Security System SAD05 6 Hierarchical Organization Information SAD06 7 IT Documentation SAD07 8 Referendum Crusader Scrutiny System SAD08 9 Sales & Inventory Management System SAD09 10 Software Project Management SAD10 11 Travel Management System SAD11 12 Communication-Intensive Workloads SAD12 13 Micro-Blogging in Classroom Students Relevant and Irrelevant Questions SAD13 14 Blocking IP Address of Misbehaving User In Anonymous Network SAD14 15 Online E-Payments For Government Taxes SAD15 16 Cloud Computing SAD16 17 Virtual Class Room SAD17 18 Cyber Eye SAD18 19 Online Training And Exam SAD19 20 GSM Medical Report SAD20
  • 10. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 21 Online Tourism SAD21 22 Rail Way Route SAD22 23 RFID Smart Card Verification SAD23 24 Mobile Sync SAD24 25 Analyzing and Opinion In For Mobile Products SAD25 26 Antiphishing Banking System SAD26 27 Construction Plus SAD27 28 Sending Resume Through SMS Gateway SAD28 29 RTO Management System SAD29 30 Graphical Password Authentication System Using Sound Signature SAD30 31 Attance Verification SAD31 32 Bio-Matrix And RFID Remote Voting System SAD32 33 Resume Send Using Mobile Application SAD33 34 Communication-Aware Load Balancing on clusters SAD34 35 Relevant and Irrelevant Questions in a Micro Blogging Supported Classroom SAD35 36 Authenticated Nearest Neighbor Search SAD36 37 Spatial Ranking SAD37 38 Slicing the Privacy Data Publishing SAD38 39 Revisiting Password Guessing Attacks in the Network SAD39 40 Flexible Robust Group Agreement SAD40 41 Passport Verification Based On RFID SAD41 42 Finger Print based Attendance Verification SAD42
  • 11. Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : shreesiddhisoftsolutions@gmail.com Mobile : 90032 33336 / 90032 44446 43 Finger Print Based Authentication For ATM Using Mobile Service SAD43 44 Steganography SAD44 45 Defect Tracking System SAD45 46 Copyright Protection Using Multimedia Documents Authentication SAD46 47 Automatic Composition of Semantic Web Services SAD47 48 Mage Fusion & Steganography SAD48 49 Path Selection Under Budget Constraints SAD49 50 AMES-Cloud An Adaptive Mobile Video Streaming SAD50