A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
Cloud2Sim - An Elastic Middleware Platform for Concurrent and Distributed Cloud and MapReduce Simulations.
This is a presentation that partially describes the work-in-progress CloudSim, as presented at MASCOTS 2014 in Paris.
I presented "Cloudsim & Green Cloud" in First National Workshop of Cloud Computing at Amirkabir University on 31st October and 1st November, 2012.
Enjoy it!
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
Cloud2Sim - An Elastic Middleware Platform for Concurrent and Distributed Cloud and MapReduce Simulations.
This is a presentation that partially describes the work-in-progress CloudSim, as presented at MASCOTS 2014 in Paris.
I presented "Cloudsim & Green Cloud" in First National Workshop of Cloud Computing at Amirkabir University on 31st October and 1st November, 2012.
Enjoy it!
Towards CloudML, a Model-Based Approach to Provision Resources in the CloudsSébastien Mosser
The Cloud-computing paradigm advocates the use of re- sources available “in the clouds”. In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogene- ity. In this paper, we propose to define an abstraction layer used to model resources available in the clouds. This cloud modelling language (CloudML) allows cloud users to focus on their needs, i.e., the modelling the resources they expect to retrieve in the clouds. An automated provi- sioning engine is then used to automatically analyse these requirements and actually provision resources in clouds. The approach is implemented, and was experimented on prototypical examples to provision resources in major public clouds (e.g., Amazon EC2 and Rackspace).
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...idescitation
Cloud computing is a very budding area in the
research field and as well as in the IT enterprises. Cloud
Computing is basically on-demand network access to a
collection of physical resources which can be provisioned
according to the need of cloud user under the supervision of
Cloud Service provider interaction. In this era of rapid usage
of Internet all over the world, Cloud computing has become
the center of Internet-oriented business place. For enterprises,
cloud computing is the worthy of consideration and they try to
build business systems with minimal costs, higher profits and
more choice; for large-scale industry, energy consumption
and total execution tome are the two important aspects of
cloud computing. In the current scenario, IT Enterprises are
trying to minimize the energy-consumption which, in turn,
maximizes the profit of the industry. And they are also trying
to reduce total execution time which, in turn, is concerned
with providing better Quality of Service (QoS). Therefore, in
this paper we have made an attempt to evaluate energy-
consumption and total execution time using CloudSim
simulator which helps to make evaluation performance of
energy consumption and total execution time of user
application.
The past decade has seen increasingly ambitious and successful methods for outsourcing computing. Approaches such as utility computing, on-demand computing, grid computing, software as a service, and cloud computing all seek to free computer applications from the limiting confines of a single computer. Software that thus runs "outside the box" can be more powerful (think Google, TeraGrid), dynamic (think Animoto, caBIG), and collaborative (think FaceBook, myExperiment). It can also be cheaper, due to economies of scale in hardware and software. The combination of new functionality and new economics inspires new applications, reduces barriers to entry for application providers, and in general disrupts the computing ecosystem. I discuss the new applications that outside-the-box computing enables, in both business and science, and the hardware and software architectures that make these new applications possible.
Towards CloudML, a Model-Based Approach to Provision Resources in the CloudsSébastien Mosser
The Cloud-computing paradigm advocates the use of re- sources available “in the clouds”. In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogene- ity. In this paper, we propose to define an abstraction layer used to model resources available in the clouds. This cloud modelling language (CloudML) allows cloud users to focus on their needs, i.e., the modelling the resources they expect to retrieve in the clouds. An automated provi- sioning engine is then used to automatically analyse these requirements and actually provision resources in clouds. The approach is implemented, and was experimented on prototypical examples to provision resources in major public clouds (e.g., Amazon EC2 and Rackspace).
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...idescitation
Cloud computing is a very budding area in the
research field and as well as in the IT enterprises. Cloud
Computing is basically on-demand network access to a
collection of physical resources which can be provisioned
according to the need of cloud user under the supervision of
Cloud Service provider interaction. In this era of rapid usage
of Internet all over the world, Cloud computing has become
the center of Internet-oriented business place. For enterprises,
cloud computing is the worthy of consideration and they try to
build business systems with minimal costs, higher profits and
more choice; for large-scale industry, energy consumption
and total execution tome are the two important aspects of
cloud computing. In the current scenario, IT Enterprises are
trying to minimize the energy-consumption which, in turn,
maximizes the profit of the industry. And they are also trying
to reduce total execution time which, in turn, is concerned
with providing better Quality of Service (QoS). Therefore, in
this paper we have made an attempt to evaluate energy-
consumption and total execution time using CloudSim
simulator which helps to make evaluation performance of
energy consumption and total execution time of user
application.
The past decade has seen increasingly ambitious and successful methods for outsourcing computing. Approaches such as utility computing, on-demand computing, grid computing, software as a service, and cloud computing all seek to free computer applications from the limiting confines of a single computer. Software that thus runs "outside the box" can be more powerful (think Google, TeraGrid), dynamic (think Animoto, caBIG), and collaborative (think FaceBook, myExperiment). It can also be cheaper, due to economies of scale in hardware and software. The combination of new functionality and new economics inspires new applications, reduces barriers to entry for application providers, and in general disrupts the computing ecosystem. I discuss the new applications that outside-the-box computing enables, in both business and science, and the hardware and software architectures that make these new applications possible.
Modeling and Optimization of Resource Allocation in Cloud [PhD Thesis Progres...AtakanAral
In addition to software delivered as services over the Internet, hardware and software systems that make the delivery possible are referred as cloud computing. In cloud computing, resources such as CPU, memory, bandwidth and storage are treated as utilities that can scale up and down on demand. It also allows per-usage metering and billing of these resources. By means of cloud computing, cloud users can handle unexpected high demands without over-provisioning and they do not need to invest for abundant hardware resources initially. Cloud providers, on the other hand, have the opportunity of reallocating idle resources for other cloud users.
One general research challenge in cloud computing is the efficient allocation of cloud resources to users since cloud providers should satisfy quality of service (QoS) objectives while minimizing their operational cost \cite{Zhang2010}. Up to 85 percent of computing capacity remains idle in distributed computing environments \cite{Papagianni2013} and this wastage is mainly due to poor optimization of job placement, parallelization and scheduling. We aim to model resource allocation problem in cloud systems, analyze and optimize it using graphs and formal behavioral models (e.g. finite automata).
The problem that we are currently interested, is to distribute virtual machines (VMs) to the datacenters (DCs) with geographical locations in such a way that latency is minimized while WAN bandwidth and DC capacity limits are respected. We model latency as a function of DC load, inter-DC communication and proximity to user. Both VM requests and cloud infrastructure are represented by graphs where vertices correspond to machines (either physical or virtual) and edges correspond to network connections between them. Our approach employs weighted graph similarity and subgraph matching to suggest an efficient placement or the list of migrations to reach an efficient placement.
In the first six months period of the thesis project, we collected evaluation data, developed the simulation environment and defined the experimental setup which contains metrics and baseline methods. In addition, we developed the preliminary version of the resource selection algorithm and evaluated it.
In today’s world the growing demand for knowledge has made cloud computing a center of attraction. Cloud computing is providing utility based services to all the users worldwide. It enables presentation of applications from consumers, scientific and business domains. However, data centers created for cloud computing applications consume huge amounts of energy, contributing to high operational costs and a large amount of carbon dioxide emission to the environment. With enhancement of data center, the power consumption is increasing at such a rate that it has become a key concern these days because it is ultimately leading to energy shortcomings and global climatic change. Therefore, we need green cloud computing solutions that can not only save energy, but also reduce operational costs.
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
Main Modules:-
1. User Module:
In this module, Users are having authentication and security to access the detail which is presented in the ontology system. Before accessing or searching the details user should have the account in that otherwise they should register first.
2. Secure DeDuplication System:
To support authorized deduplication, the tag of a file F will be determined by the file F and the privilege. To show the difference with traditional notation of
tag, we call it file token instead. To support authorized access, a secret key kp will be bounded with a privilege p to generate a file token. Let ϕ′ F;p = TagGen(F, kp) denote the token of F that is only allowed to access by user with privilege p. In another word, the token ϕ′ F;p could only be computed by the users with privilege p. As a result, if a file has been uploaded by a user with a duplicate token ϕ′
F;p, then a duplicate check sent from another user will be successful if and only if he also has the file F and privilege p. Such a token generation function could be
easily implemented as H(F, kp), where H(_) denotes a cryptographic hash function.
3. Security Of Duplicate Check Token :
We consider several types of privacy we need protect, that is, i) unforgeability of duplicate-check token: There are two types of adversaries, that is, external adversary and internal adversary. As shown below, the external adversary
can be viewed as an internal adversary without any privilege. If a user has privilege p, it requires that the adversary cannot forge and output a valid duplicate token with any other privilege p′ on any file F, where p does not match p′. Furthermore, it also requires that if the adversary does not make a request of token with its own privilege from private cloud server, it cannot forge and output a valid duplicate token with p on any F that has been queried.
4. Send Key:
Once the key request was received, the sender can send the key or he can decline it. With this key and request id which was generated at the time of sending key request the receiver can decrypt the message.
Exceller Technologies offers M.E projects based on IEEE 2014 .M.Phil Research project Final Year Projects, M.E projects 2014-2015, mini projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2014 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2014 - 2015 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
Exceller Technologies offers M.E projects based on IEEE 2014 .M.Phil Research project Final Year Projects, M.E projects 2014-2015, mini projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2014 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2014 - 2015 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
Gagner Technologies offers M.E projects based on IEEE 2014 . M.Phil Research projects,Final Year Projects, M.E projects 2014-2015, mini projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE2014-2015 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering,NS2 projects,Mechanical Projects,VLSI projects,Matlab Projects
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
Gagner Technologies offers M.E projects based on IEEE 2013 . Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2013 - 2014 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
K nearest neighbor classification over semantically secure encryptedShakas Technologies
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
2015- 2016
IEEE PROJECT
CLOUDSIM PROJECTS
S.NO PROJECT TITLES
ST01 Distributed Online Hybrid Cloud Management for Profit-Driven Multimedia Cloud
Computing
ST02 Uncertainty-Aware Autonomic Resource Provisioning for Mobile Cloud Computing
ST03 An Online Auction Framework for Dynamic Resource Provisioning in Cloud
Computing
ST04 Web Scaling Frameworks for Web Services in the Cloud
ST05 A Cost-Effective Deadline-Constrained Dynamic Scheduling Algorithm for Scientific
Workflows in a Cloud Environment
ST06 Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless
Metropolitan Area Networks
ST07 Scaling Social Media Applications Into Geo-Distributed Clouds, IEEE Transactions
on Networking
ST08 Energy Efficient Dynamic Load Balancing Algorithm for Cloud Environment
ST09 A Secured and Searchable Encryption Algorithm for Cloud Storage
ST10 Decentralized Way to Manage with Secret Validation of Information Stored in
Clouds.
ST11 Adaptive Workflow Scheduling on Cloud Computing Platforms with Iterative
Ordinal Optimization
ST12 A Hybrid Cloud Approach for Secure Authorized Deduplication
ST13 Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile
Cloud
ST14 Cost-Effective Resource Provisioning for Map Reduce in a Cloud
ST15 Developing Secure Cloud Storage System by Applying AES and RSA Cryptography
Algorithms with Role based Access Control Model.
ST16 Live Migration of Virtual Machines in Cloud Environment using Prediction of CPU
Usage.
2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
2015- 2016
ST17 Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage.
ST18 Decentralized Computation Offloading Game for Mobile Cloud Computing,
ST19 Deploying Large-Scale Datasets on-Demand in the Cloud: Treats and Tricks on Data
Distribution
ST20 End-to-End Delay Minimization for Scientific Workflows in Clouds under Budget
Constraint,
ST21 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-
Constrained Devices
ST22 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study
of Linear Programming
ST23 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
ST24 Similarity and Locality Based Indexing for High Performance Data Deduplication
ST25 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
ST26 Stealthy Denial of Service Strategy in Cloud Computing
ST27 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
ST28 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
ST29 AppATP: An Energy Conserving Adaptive Mobile-Cloud Transmission Protocol
ST30 Verifiable Auditing for Outsourced Database in Cloud Computing
ST31 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
ST32 Secure Auditing and Deduplication Data in Cloud
ST33 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
ST34 MobiContext: A Context-aware Cloud-based Recommendation Framework
ST35 Computation Offloading for Service Workflow in Mobile Cloud Computing
ST36 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the
Cloud
ST37 On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
ST38 A Hyper-Heuristic Scheduling Algorithm for Cloud
3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
2015- 2016
ST39 An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
ST40 An Online Integrated Resource Allocator for Guaranteed Performance in Data
Centers
ST41 Authentication of k Nearest Neighbor Query on Road Networks
ST42 Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient
Verifiable Fine-grained Updates
ST43 CIVSched: A Communication-aware Inter-VM Scheduling Technique for Decreased
Network Latency between Co-located VMs
ST44 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
ST45 A Mechanism Design Approach to Resource Procurement in Cloud Computing
ST46 DR-Cloud: Multi-Cloud Based Disaster Recovery Service
ST47 Lifelong Personal Health Data and Application Software via Virtual Machines in the
Cloud
ST48 Task-Based System Load Balancing in Cloud Computing Using Particle Swarm
Optimization,
ST49 SLA-aware Provisioning and Scheduling of Cloud Resources for Big Data Analytics
ST50 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
ST51 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
ST52 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear
Equations