IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
DreamwebTechnosolutions is a technology solutions company located in Trichy, India. The document lists several research projects from 2016-2017 in the areas of mobile computing, data mining, cloud computing, big data, and network security. It includes project titles, descriptions, and contact information for K. Ranjith Kumar, with phone number 0431 4050403.
This document contains contact information for DreamwebTechnosolutions in Trichy, India and lists several mobile computing, data mining, cloud computing, big data, and network security research project titles and their years. It provides titles and years for 11 mobile computing projects, 11 data mining projects, 13 cloud computing projects, 6 big data projects, and 5 network security projects conducted between 2016-2017. The contact listed is K.RanjithKumar who can be reached by phone.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
DreamwebTechnosolutions is a technology solutions company located in Trichy, India. The document lists several research projects from 2016-2017 in the areas of mobile computing, data mining, cloud computing, big data, and network security. It includes project titles, descriptions, and contact information for K. Ranjith Kumar, with phone number 0431 4050403.
This document contains contact information for DreamwebTechnosolutions in Trichy, India and lists several mobile computing, data mining, cloud computing, big data, and network security research project titles and their years. It provides titles and years for 11 mobile computing projects, 11 data mining projects, 13 cloud computing projects, 6 big data projects, and 5 network security projects conducted between 2016-2017. The contact listed is K.RanjithKumar who can be reached by phone.
This document contains 50 code topics related to power electronics. The codes cover a wide range of topics including boost converters, buck-boost converters, isolated converters, high step-up converters, inverters, and control techniques for photovoltaic systems. Control methods discussed include maximum power point tracking and power factor correction. Applications mentioned include energy harvesting, renewable energy systems, motor drives, and LED lighting.
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
This document contains 50 code topics related to power electronics. The codes cover a wide range of topics including boost converters, buck-boost converters, isolated converters, high step-up converters, inverters, and control techniques for photovoltaic systems. Control methods discussed include maximum power point tracking and power factor correction. Applications mentioned include energy harvesting, renewable energy systems, motor drives, and LED lighting.
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
IEEE Final Year Projects for M.E/M.TECH-CSE,VLSI,COMMUNICATION SYSTEM,B.E-CSE/IT from any domain & Technologies.For more detail contact:-DreamWeb TechnoSolutions@7200021403/04, 73/5 3rd floor,Kamatchi cmplx,SALAI ROADThillai nagar 1st cross,Trichy
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
We are offering PROJECTS in EMBEDDED, MATLAB, NS2, VLSI, Power Electronics,Power Systems for BE- ECE & EEE Students.
Own Concepts also accepted.providing real time projects on MATLAB,EMB&VLSI for ECE Dept DreamwebTechnosolutions
73/5,3rd FLOOR,SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Ph: 0431 4050403,7200021403/04.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Ieee 2016 project titles in mobilecomputing for me m.tech
1. DreamwebTechnosolutions
73/5,3rdFLOOR, SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Contact:-K.RanjithKumar:7200021403/04 PH: 0431 4050403.
S/No PROJECT CAPTION YEAR
MOBILE COMPUTING TITLES LIST
1 A Street-Centric Opportunistic Routing Protocol Based on Link
Correlation for Urban VANETs
2016-17
2 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic
Approach
2016-17
3 Optimizing Video Request Routing in Mobile Networks with Built-in
Content Caching
2016-17
4 Toward Optimal Distributed Monitoring of Multi-Channel Wireless
Networks
2016-17
5 Delay Minimization for Data Dissemination in Large-Scale VANETs
with Buses and Taxis
2016-17
6 Profit Maximization through Online Advertising Scheduling for a
Wireless Video Broadcast Network
2016-17
7 Secure Run: Cheat-Proof and Private Summaries for Location-Based
Activities
2016-17
8 Distance-based Location Management Utilizing Initial Position for
Mobile CommunicationNetworks
2016-17
9 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone
Malware
2016-17
10 Propagation- and Mobility-Aware D2D Social Content Replication 2016-17
DATA MINING TITLES LIST
1 A Novel Recommendation Model Regularized with User Trust and Item
Ratings
2016-17
2 Resolving Multi-Party Privacy Conflicts in Social Media 2016-17
3 A Framework for Categorizing and Applying Privacy-Preservation
Techniques in Big Data Mining
2016-17
4 Truth Discovery in Crowdsourced Detection of Spatial Events 2016-17
2. DreamwebTechnosolutions
73/5,3rdFLOOR, SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Contact:-K.RanjithKumar:7200021403/04 PH: 0431 4050403.
5 Inductive Visual Miner Plugin Customization for the Detection of
Eventualities in the Processes of a Hospital Information System
2016-17
6 Hierarchical Spatio-Temporal Pattern Discovery and Predictive
Modeling
2016-17
7 Resolving Multi-party Privacy Conflicts in Social Media 2016-17
S/No PROJECT CAPTION YEAR
CLOUD COMPUTINGTITLES LIST
1 Encrypted Data Management with Deduplication in Cloud Computing 2016-17
2 Secure Data Analytics for Cloud-Integrated Internet of Things
Applications
2016-17
3 Security in Cloud-Computing-Based Mobile Health 2016-17
4 Migrating Smart City Applications to the Cloud 2016-17
5 Optimizing Cost for Online Social Networks on Geo-Distributed Clouds 2016-17
6 Supporting Multi Data Stores Applications in Cloud Environments 2016-17
7 Dispersing Instant Social Video Service Across Multiple Clouds 2016-17
8 Propagation- and Mobility-Aware D2D Social Content Replication
9 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone
Malware
BIG DATA TITLES LIST
1 Conjunctive Keyword Search With Designated Tester and Timing
Enabled Proxy Re-Encryption Function for E-Health Clouds
2016-17
2 Leveraging Data Deduplication to Improve the Performance of Primary
Storage Systems in the Cloudk
2016-17
3. DreamwebTechnosolutions
73/5,3rdFLOOR, SRI KAMATCHI COMPLEX
OPP.CITY HOSPITAL (NEAR LAKSHMI COMPLEX)
SALAI ROAD,Trichy - 620 018,
Contact:-K.RanjithKumar:7200021403/04 PH: 0431 4050403.
3 A Parallel Patient Treatment Time Prediction Algorithm and Its
Applications in Hospital Queuing-Recommendation in
a Big Data Environment
2016-17
4 OverFlow: Multi-Site Aware Big Data Management for Scientific
Workflows on Clouds
2016-17
5 Conjunctive Keyword Search With Designated Tester and Timing
Enabled Proxy Re-Encryption Function for E-Health Clouds
2016-17
6 Leveraging Data Deduplication to Improve the Performance of Primary
Storage Systems in the Cloudk
2016-17
NETWORK SECURITY TITLES LIST
1 FakeMask: A Novel Privacy Preserving Approach for Smartphones 2016-17
2 The Server Provisioning Problem for Continuous Distributed Interactive
Application
2016-17