SlideShare a Scribd company logo
1 of 3
Download to read offline
IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
Sl.No PROJECT CAPTION
DTSJV1
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost
Optimization
DTSJV2 A Hybrid Cloud Approach for Secure Authorized Deduplication
DTSJV3
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud
Computing Services
DTSJV4 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
DTSJV5
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in
Cloud Computing
DTSJV6
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute-Based Encryption
DTSJV7
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
DTSJV8 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
DTSJV9
Public Integrity Auditing for Dynamic Data Sharing with Multi-User
Modification
DTSJV10
Service Operator-Aware Trust Scheme for Resource Matchmaking across
Multiple Clouds
DTSJV11
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User
Revocation
DTSJV12
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
DTSJV13
CloudArmor: Supporting Reputation-based Trust Management for Cloud
Services
DTSJV14
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption
DTSJV15 Enabling Cloud Storage Auditing With Key-Exposure Resistance
DTSJV16
An Iterative MapReduce Based Frequent Subgraph Mining Algorithm
DTSJV17 Collaborative Fuzzy Clustering From Multiple Weighted Views
IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
DTSJV18 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
DTSJV19
Discovering Data Set Nature through Algorithmic Clustering Based on String
Compression
DTSJV20
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based
on the Word
DTSJV21 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DTSJV22 Resampling-Based Ensemble Methods for Online Class Imbalance Learning
DTSJV23
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational
Data
DTSJV24
PPDM: Privacy-preserving Protocol for Dynamic Medical Text Mining and Image
Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare
Systems
DTSJV25 Scalable Constrained Spectral Clustering
DTSJV26
Scalable Distributed Processing of K Nearest Neighbor Queries over Moving
Objects
DTSJV27
Smart Diary: A Smartphone-Based Framework for Sensing, Inferring, and
Logging Users’ Daily Life
DTSJV28 Efficient reversible data hiding based on multiple histograms modification
DTSJV29 Image Search Reranking With Hierarchical Topic Awareness
DTSJV30 Learning to Rank Using User Clicks and Visual Features for Image Retrieval
DTSJV31 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DTSJV32
What Can Pictures Tell Us About Web Pages? Improving Document Search Using
Images
DTSJV33
Adaptive Video Streaming for Wireless Networks With Multiple Users and
Helpers
DTSJV34 Context-Based Access Control Systems for Mobile Devices
IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
DTSJV35 Discovery of Ranking Fraud for Mobile Apps
DTSJV36
Friendbook: A Semantic-Based Friend Recommendation System for Social
Networks
DTSJV37
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading
in Wireless Sensor Networks
DTSJV38 Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud
DTSJV39 A Survey of Security Attacks in Information-Centric Networking
DTSJV40 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
DTSJV41 Cooperative Positioning and Tracking in Disruption Tolerant Networks
DTSJV42 Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
DTSJV43 Low-Rate DoS Attacks Detection Based on Network Multifractal
DTSJV44
Secure Data Aggregation Technique for Wireless Sensor Networks in the
Presence of Collusion Attacks
DTSJV45
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service
Attacks
DTSJV46 Top-k Similarity Join in Heterogeneous Information Networks
DTSJV47
VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud
Environments
DTSJV48 Towards Effective Bug Triage with Software Data Reduction Techniques
DTSJV49
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous
Hadoop Clusters
DTSJV50 An Efficient Privacy-Preserving Ranked Keyword Search Method
DTSJV51
Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid
Clouds
DTSJV52
HadoopCL2: Motivating the Design of a Distributed, Heterogeneous
Programming System With Machine-Learning Applications
DTSJV53 i2MapReduce: Incremental MapReduce for Mining Evolving Big Data

More Related Content

Viewers also liked (16)

Career_Hohyun Lee
Career_Hohyun LeeCareer_Hohyun Lee
Career_Hohyun Lee
 
Finderskeepers.3
Finderskeepers.3Finderskeepers.3
Finderskeepers.3
 
aaa
aaaaaa
aaa
 
Defesa do meio_ambiente_
Defesa do meio_ambiente_Defesa do meio_ambiente_
Defesa do meio_ambiente_
 
Ação metrópole belém
Ação metrópole belémAção metrópole belém
Ação metrópole belém
 
Testedegravidez
TestedegravidezTestedegravidez
Testedegravidez
 
As letrinhas magicas
As letrinhas magicasAs letrinhas magicas
As letrinhas magicas
 
eliana
elianaeliana
eliana
 
Jump Jilani Movie Stills
Jump Jilani Movie Stills Jump Jilani Movie Stills
Jump Jilani Movie Stills
 
Profile -Harbin Dadi
Profile -Harbin DadiProfile -Harbin Dadi
Profile -Harbin Dadi
 
inventory management
inventory managementinventory management
inventory management
 
20160529082148005
2016052908214800520160529082148005
20160529082148005
 
Preciosidade (1)
Preciosidade (1)Preciosidade (1)
Preciosidade (1)
 
Ijazah AKPAR
Ijazah AKPARIjazah AKPAR
Ijazah AKPAR
 
0
00
0
 
Informe final
Informe finalInforme final
Informe final
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Final year java dreamweb techno solutions trichy - copy (2)

  • 1. IEEE 2015-2016 PROJECT CAPTION –JAVA 73/5,3rd Floor,Sri Kamatchi Complex Opp.City Hospital (Near Lakshmi Complex) Trichy- 620018, Contact No: 7200021403/04 Sl.No PROJECT CAPTION DTSJV1 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization DTSJV2 A Hybrid Cloud Approach for Secure Authorized Deduplication DTSJV3 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services DTSJV4 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems DTSJV5 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing DTSJV6 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption DTSJV7 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications DTSJV8 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage DTSJV9 Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification DTSJV10 Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds DTSJV11 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation DTSJV12 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems DTSJV13 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services DTSJV14 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption DTSJV15 Enabling Cloud Storage Auditing With Key-Exposure Resistance DTSJV16 An Iterative MapReduce Based Frequent Subgraph Mining Algorithm DTSJV17 Collaborative Fuzzy Clustering From Multiple Weighted Views
  • 2. IEEE 2015-2016 PROJECT CAPTION –JAVA 73/5,3rd Floor,Sri Kamatchi Complex Opp.City Hospital (Near Lakshmi Complex) Trichy- 620018, Contact No: 7200021403/04 DTSJV18 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security DTSJV19 Discovering Data Set Nature through Algorithmic Clustering Based on String Compression DTSJV20 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word DTSJV21 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DTSJV22 Resampling-Based Ensemble Methods for Online Class Imbalance Learning DTSJV23 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data DTSJV24 PPDM: Privacy-preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems DTSJV25 Scalable Constrained Spectral Clustering DTSJV26 Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects DTSJV27 Smart Diary: A Smartphone-Based Framework for Sensing, Inferring, and Logging Users’ Daily Life DTSJV28 Efficient reversible data hiding based on multiple histograms modification DTSJV29 Image Search Reranking With Hierarchical Topic Awareness DTSJV30 Learning to Rank Using User Clicks and Visual Features for Image Retrieval DTSJV31 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DTSJV32 What Can Pictures Tell Us About Web Pages? Improving Document Search Using Images DTSJV33 Adaptive Video Streaming for Wireless Networks With Multiple Users and Helpers DTSJV34 Context-Based Access Control Systems for Mobile Devices
  • 3. IEEE 2015-2016 PROJECT CAPTION –JAVA 73/5,3rd Floor,Sri Kamatchi Complex Opp.City Hospital (Near Lakshmi Complex) Trichy- 620018, Contact No: 7200021403/04 DTSJV35 Discovery of Ranking Fraud for Mobile Apps DTSJV36 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks DTSJV37 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks DTSJV38 Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud DTSJV39 A Survey of Security Attacks in Information-Centric Networking DTSJV40 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption DTSJV41 Cooperative Positioning and Tracking in Disruption Tolerant Networks DTSJV42 Identifying High-Cardinality Hosts from Network-wide Traffic Measurements DTSJV43 Low-Rate DoS Attacks Detection Based on Network Multifractal DTSJV44 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks DTSJV45 Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks DTSJV46 Top-k Similarity Join in Heterogeneous Information Networks DTSJV47 VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments DTSJV48 Towards Effective Bug Triage with Software Data Reduction Techniques DTSJV49 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters DTSJV50 An Efficient Privacy-Preserving Ranked Keyword Search Method DTSJV51 Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid Clouds DTSJV52 HadoopCL2: Motivating the Design of a Distributed, Heterogeneous Programming System With Machine-Learning Applications DTSJV53 i2MapReduce: Incremental MapReduce for Mining Evolving Big Data