Soft ware testing in Trichy,
Upcoming SlideShare
Loading in...5

Soft ware testing in Trichy,



Siddhi Soft Solutions is a leading Web development firm in Trichy. ...

Siddhi Soft Solutions is a leading Web development firm in Trichy.
The aims of the company are help trainee to keep enlightens you technical wise.
This company provides real time experience and software knowledge to the young generation engineers. Our motive towards intake technology into the students and developers world for developing class products.
The training at SIDDHI SOFT SOLUTIONS focus on developing the tech oriented concepts that turn graduates into employable assets. Handled only by professionals from MNC companies, we know how to equip you with strong technologies fundamentals. We promise you to achieve your goals and dreams in your future.
Siddhi soft solutions are providing here mini projects
Final year projects for different stream.



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Soft ware testing in Trichy, Soft ware testing in Trichy, Document Transcript

  • NETWORK S.No Titles Code Year 1 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks SID01 2013 2 Optimizing Link Sleeping Reconfigurations in ISP Networks with Off-Peak Time Failure Protection SID02 2013 3 Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems SID03 2013 4 Lightweight Location Verification Algorithms for Wireless Sensor Networks SID04 2013 5 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks SID05 2013 6 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm SID06 2013 7 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks SID07 2013 8 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks SID08 2013 9 Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management SID09 2013 10 Efficient Two-Server Password-Only Authenticated Key Exchange SID10 2013 11 Network Traffic Classification Using Correlation Information SID11 2013 12 Cut Detection in Wireless Sensor Networks SID12 2012 13 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks SID13 2012 14 Scalable RFID Systems: A Privacy-Preserving Protocol with Constant- Time Identification SID14 2012 15 ES-MPICH2: A Message Passing Interface with Enhanced Security SID15 2012 16 Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRT-Based Packet-Forwarding Solution SID16 2012 17 Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks SID17 2012 18 Privacy in VOIP Networks : Flow Analysis Attacks and Defense SID18 2012 19 Flexible Robust Group Key Agreement SID19 2011 20 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection SID20 2011
  • NETWORK SECURITY S.No Titles Code Year 1 To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks SID21 2013 2 Privacy Preserving Data Sharing With Anonymous ID Assignment. SID22 2013 3 Distributed Detection in Mobile Access Wireless Sensor networks Under Byzantine Attacks SID23 2013 4 Entrusting Private Computation and Data to Untrusted Networks SID24 2013 5 Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption SID25 2013 6 Security Analysis of a Single Sign-On Mechanismfor Distributed Computer Networks SID26 2013 7 Fully Anonymous Profile Matching inMobile Social Networks SID27 2013 8 Secure Two-Party Differentially Private DataRelease for Vertically- Partitioned Data SID28 2013 9 On the Performance of Byzantine Fault-Tolerant MapReduce SID29 2013 10 oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks SID30 2012 11 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SID31 2012 12 Secure Data Aggregation in Wireless Sensor Networks SID32 2012 13 Detecting and Resolving Firewall Policy Anomalies SID33 2012 14 Nymble: Blocking Misbehaving Users in Anonymizing Networks SID34 2011 15 A puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory SID35 2010 INFORMATION SECURITY S.NO TITLES CODE YEAR 1 Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks SID36 2013 2 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model SID37 2013 3 Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Cipher texts SID38 2013 4 On Cooperative and Malicious Behaviors in Multi-relay Fading Channels SID39 2013 5 Recursive Linear and Differential Cryptanalysis of Ultra-light-weight Authentication Protocols SID40 2013 6 Fingerprint Combination for Privacy Protection SID41 2013
  • MOBILE COMPUTING S.No TITLES CODE YEAR 1 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks SID42 2013 2 DT-MAC: An Efficient and Scalable Medium Access Control Protocol for Wireless Networks SID43 2013 3 Privacy-Preserving Distributed Profile Matching in Proximity- Based Mobile Social Networks SID44 2013 4 Vampire Attacks :Draining Life from Wireless Ad Hoc Sensor Networks SID45 2013 5 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks SID46 2013 6 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks SID47 2013 7 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach SID48 2013 8 Capacity of Hybrid Wireless Mesh Networks with Random APs SID49 2013 9 Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks SID50 2013 10 Path Selection under Budget Constraints in Multihop Cognitive Radio Networks SID51 2013 11 Understanding the Interaction between Packet Forwarding and Channel Access in Multiphop Wireless Networks SID52 2012 12 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks SID53 2012 13 On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling SID54 2012 14 Adaptive Selective Verification : An Efficient Adaptive Countermeasure to Thwart DOS Attacks SID55 2012 15 Privacy-Preserving Universal Authentication Protocol for Wireless Communication SID56 2011 16 ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks SID57 2011 17 Network Coding Based Privacy Preserving Against Traffic Analysis in Multi-Hop Wireless SID58 2011
  • DATA MINING S.NO TITLES CODE YEAR 1 Spatial Query Integrity with Voronoi Neighbors SID59 2013 2 Enabling Multilevel Trust in Privacy Preserving Data Mining SID60 2013 3 CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks SID61 2013 4 Supporting Search-As-You-Type Using SQL in Databases SID62 2013 5 Annotating Search Results from Web Databases SID63 2013 6 Protecting Sensitive Labels in Social Network Data Anonymization SID64 2013 7 Modeling Noisy Annotated Data with Application to Social Annotation SID65 2013 8 Halite: Fast and Scalable Multi resolution Local-Correlation Clustering SID66 2013 9 U-Skyline: A New Skyline Query for Uncertain Databases SID67 2013 10 Optimal Route Queries with Arbitrary order Constraints SID68 2013 11 Efficient Service Skyline Computation for Composite Service Selection SID69 2013 12 A System to Filter Unwanted Messages from OSN User Walls SID70 2013 13 Slicing: A New Approach for Privacy Preserving Data Publishing SID71 2012 14 Incremental Information Extraction Using Relational Databases SID72 2012 15 Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction SID73 2012 16 Mono-chromatic and Bio-chromatic Reverse Top-K Queries SID74 2011 17 Data leakage Detection SID75 2011 18 Ranking Spatial Data by Quality Preferences SID76 2011 19 Authenticated Multistep Nearest Neighbor Search SID77 2011 20 Learning to Adapt Web Information Extraction Knowledge and Discovering New Attributes Via a Bayesian Approach SID78 2010
  • CLOUD COMPUTING S.No TITLES CODE YEAR 1 Privacy-Preserving Public Auditing for Secure Cloud Storage SID79 2013 2 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption SID80 2013 3 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud SID81 2013 4 Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment SID82 2013 5 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud SID83 2013 6 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System SID84 2013 7 Optimal Multi server Configuration for Profit Maximization in Cloud Computing SID85 2013 8 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems SID86 2013 9 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud SID87 2013 10 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds SID88 2013 11 Toward Secure and Dependable Storage Services in Cloud Computing SID89 2012 12 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding SID90 2012 13 Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing SID91 2011