This document lists 54 project captions for Java projects related to cloud computing, distributed systems, data mining, and information security. The projects involve developing frameworks and techniques for topics such as cloud firewall optimization, deduplication in hybrid clouds, privacy-preserving data analysis, and attacks in information-centric networks. Contact information is provided for the IEEE 2015-2016 projects.
This document provides a list of 53 projects related to image processing, computer vision, biometrics and signal processing. The projects focus on topics such as change detection, object classification, image segmentation, image enhancement, image compression, watermarking, biometrics, image retrieval and signal denoising using techniques including neural networks, clustering, sparse representation, wavelets and machine learning. The document also provides contact information for the IEEE 2015-2016 project caption in Trichy, India.
Ieee 2015 16 ped titles for me-mtech @triple n infotec-trichysubhu8430
This document contains details about a conference on power electronics and power systems held by Triple N Infotech in Chennai and Trichy, India. It includes 50 topics related to power electronics, drives, and modern power systems that were presented at the conference. Contact information is provided for Triple N Infotech in Chennai and Trichy.
This document lists 66 project captions for embedded systems projects proposed by the Department of Electronics and Communication Engineering at Sri Kamatchi Complex in Trichy, India. The projects focus on areas like wireless sensor networks, smart homes, agriculture monitoring, structural health monitoring, traffic control, biometric identification, medical devices, and industrial automation. Contact information is provided for more details on the proposed embedded systems projects.
This document lists 54 project captions for Java projects related to cloud computing, distributed systems, data mining, and information security. The projects involve developing frameworks and techniques for topics such as cloud firewall optimization, deduplication in hybrid clouds, privacy-preserving data analysis, and attacks in information-centric networks. Contact information is provided for the IEEE 2015-2016 projects.
This document provides a list of 53 projects related to image processing, computer vision, biometrics and signal processing. The projects focus on topics such as change detection, object classification, image segmentation, image enhancement, image compression, watermarking, biometrics, image retrieval and signal denoising using techniques including neural networks, clustering, sparse representation, wavelets and machine learning. The document also provides contact information for the IEEE 2015-2016 project caption in Trichy, India.
Ieee 2015 16 ped titles for me-mtech @triple n infotec-trichysubhu8430
This document contains details about a conference on power electronics and power systems held by Triple N Infotech in Chennai and Trichy, India. It includes 50 topics related to power electronics, drives, and modern power systems that were presented at the conference. Contact information is provided for Triple N Infotech in Chennai and Trichy.
This document lists 66 project captions for embedded systems projects proposed by the Department of Electronics and Communication Engineering at Sri Kamatchi Complex in Trichy, India. The projects focus on areas like wireless sensor networks, smart homes, agriculture monitoring, structural health monitoring, traffic control, biometric identification, medical devices, and industrial automation. Contact information is provided for more details on the proposed embedded systems projects.
This document lists 66 project captions for embedded systems projects proposed by the Department of Electronics and Communication Engineering at Sri Kamatchi Complex in Trichy, India. The projects focus on areas like wireless sensor networks, smart homes, agriculture monitoring, traffic control, health monitoring, industrial monitoring, and more. Contact information is provided for the institute.
This document provides a list of 53 projects related to image processing, computer vision, and biometrics. The projects cover topics such as change detection, object classification, image segmentation, image enhancement, image compression, watermarking, biometrics, and content-based image retrieval. The document also provides contact information for IEEE 2015-2016 PROJECT CAPTION –MATLAB located in Trichy, India.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
This document lists 66 project captions for embedded systems projects proposed by the Department of Electronics and Communication Engineering at Sri Kamatchi Complex in Trichy, India. The projects focus on areas like wireless sensor networks, smart homes, agriculture monitoring, traffic control, health monitoring, industrial monitoring, and more. Contact information is provided for the institute.
This document provides a list of 53 projects related to image processing, computer vision, and biometrics. The projects cover topics such as change detection, object classification, image segmentation, image enhancement, image compression, watermarking, biometrics, and content-based image retrieval. The document also provides contact information for IEEE 2015-2016 PROJECT CAPTION –MATLAB located in Trichy, India.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
1. IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
Sl.No PROJECT CAPTION
DTSJV1
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost
Optimization
DTSJV2 A Hybrid Cloud Approach for Secure Authorized Deduplication
DTSJV3
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud
Computing Services
DTSJV4
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
DTSJV5
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in
Cloud Computing
DTSJV6
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute-Based Encryption
DTSJV7
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
DTSJV8 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
DTSJV9
Public Integrity Auditing for Dynamic Data Sharing with Multi-User
Modification
DTSJV10
Service Operator-Aware Trust Scheme for Resource Matchmaking across
Multiple Clouds
DTSJV11
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User
Revocation
DTSJV12
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
DTSJV13
CloudArmor: Supporting Reputation-based Trust Management for Cloud
Services
DTSJV14
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption
DTSJV15 Enabling Cloud Storage Auditing With Key-Exposure Resistance
DTSJV16
An Iterative MapReduce Based Frequent Subgraph Mining Algorithm
DTSJV17 Collaborative Fuzzy Clustering From Multiple Weighted Views
2. IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
DTSJV18 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
DTSJV19
Discovering Data Set Nature through Algorithmic Clustering Based on String
Compression
DTSJV20
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based
on the Word
Alignment Model
DTSJV21 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DTSJV22 Resampling-Based Ensemble Methods for Online Class Imbalance Learning
DTSJV23
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational
Data
DTSJV24
PPDM: Privacy-preserving Protocol for Dynamic Medical Text Mining and Image
Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare
Systems
DTSJV25 Scalable Constrained Spectral Clustering
DTSJV26
Scalable Distributed Processing of K Nearest Neighbor Queries over Moving
Objects
DTSJV27
Smart Diary: A Smartphone-Based Framework for Sensing, Inferring, and
Logging Users’ Daily Life
DTSJV28 Efficient reversible data hiding based on multiple histograms modification
DTSJV29 Image Search Reranking With Hierarchical Topic Awareness
DTSJV30 Learning to Rank Using User Clicks and Visual Features for Image Retrieval
DTSJV31 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DTSJV32
What Can Pictures Tell Us About Web Pages? Improving Document Search Using
Images
DTSJV33
Adaptive Video Streaming for Wireless Networks With Multiple Users and
Helpers
DTSJV34 Context-Based Access Control Systems for Mobile Devices
3. IEEE 2015-2016 PROJECT CAPTION –JAVA
73/5,3rd Floor,Sri Kamatchi Complex
Opp.City Hospital (Near Lakshmi Complex)
Trichy- 620018, Contact No: 7200021403/04
DTSJV35 Discovery of Ranking Fraud for Mobile Apps
DTSJV36
Friendbook: A Semantic-Based Friend Recommendation System for Social
Networks
DTSJV37
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading
in Wireless Sensor Networks
DTSJV38 Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud
DTSJV39 A Survey of Security Attacks in Information-Centric Networking
DTSJV40 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
DTSJV41 Cooperative Positioning and Tracking in Disruption Tolerant Networks
DTSJV42 Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
DTSJV43 Low-Rate DoS Attacks Detection Based on Network Multifractal
DTSJV44
Secure Data Aggregation Technique for Wireless Sensor Networks in the
Presence of Collusion Attacks
DTSJV45
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service
Attacks
DTSJV46 Top-k Similarity Join in Heterogeneous Information Networks
DTSJV47
VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud
Environments
DTSJV48 Towards Effective Bug Triage with Software Data Reduction Techniques
DTSJV49
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous
Hadoop Clusters
DTSJV50 An Efficient Privacy-Preserving Ranked Keyword Search Method
DTSJV51
Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid
Clouds
DTSJV52
HadoopCL2: Motivating the Design of a Distributed, Heterogeneous
Programming System With Machine-Learning Applications
DTSJV53 i2MapReduce: Incremental MapReduce for Mining Evolving Big Data