This document provides contact information for the head office and two branch offices of iGenuine Soft Solutions Pvt Ltd in Chennai and Coimbatore, India. It also lists 20 Java conference papers from 2013 related to topics including cloud computing, data mining, image processing, and mobile computing. Finally, it presents a table with the title and publication details of 200 papers from 2013 on various computer science topics.
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESMusthafa Tema
This document contains 166 titles for Java and .NET software projects related to various topics including cloud computing, image processing, data mining, parallel and distributed systems, dependable and secure computing, and mobile computing. It provides contact information for Temasolution, a company that can provide more details on these projects. Interested parties are instructed to send requests to info@temasolution.com or visit the listed website or email.
Exceller Technologies offers M.E projects based on IEEE 2014 .M.Phil Research project Final Year Projects, M.E projects 2014-2015, mini projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2014 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2014 - 2015 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
The document lists potential 2014-2015 Java project titles from the IEEE across several domains: Big Data, Cloud Computing, Data Mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing, and Cloudsim. The projects focus on topics like big data analysis, cloud security and scalability, data mining techniques, privacy and anonymity in networks and databases, mobile and distributed systems, and simulating cloud infrastructure.
This document lists 156 project titles completed between 2015-2016 related to dot net and web application projects. The projects cover a wide range of topics including cloud computing, cyber security, healthcare, networking, image processing, gaming, and more.
Gagner Technologies offers M.E projects based on IEEE 2013 . Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2013 - 2014 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
The document provides a list of 82 titles and keywords related to various topics in information technology including cloud computing, parallel and distributed systems, mobile computing, data mining, image processing and MATLAB, and network security. The titles involve research on efficient data processing in clouds, privacy-preserving search, data integrity proofs, load balancing, intrusion detection, and more. The keywords indicate that the research involves programming languages including Java, .NET, and NS2.
This document provides contact information for the head office and two branch offices of iGenuine Soft Solutions Pvt Ltd in Chennai and Coimbatore, India. It also lists 20 Java conference papers from 2013 related to topics including cloud computing, data mining, image processing, and mobile computing. Finally, it presents a table with the title and publication details of 200 papers from 2013 on various computer science topics.
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESMusthafa Tema
This document contains 166 titles for Java and .NET software projects related to various topics including cloud computing, image processing, data mining, parallel and distributed systems, dependable and secure computing, and mobile computing. It provides contact information for Temasolution, a company that can provide more details on these projects. Interested parties are instructed to send requests to info@temasolution.com or visit the listed website or email.
Exceller Technologies offers M.E projects based on IEEE 2014 .M.Phil Research project Final Year Projects, M.E projects 2014-2015, mini projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2014 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2014 - 2015 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
The document lists potential 2014-2015 Java project titles from the IEEE across several domains: Big Data, Cloud Computing, Data Mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing, and Cloudsim. The projects focus on topics like big data analysis, cloud security and scalability, data mining techniques, privacy and anonymity in networks and databases, mobile and distributed systems, and simulating cloud infrastructure.
This document lists 156 project titles completed between 2015-2016 related to dot net and web application projects. The projects cover a wide range of topics including cloud computing, cyber security, healthcare, networking, image processing, gaming, and more.
Gagner Technologies offers M.E projects based on IEEE 2013 . Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE 2013 - 2014 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering
For more details contact below Address
No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17
The document provides a list of 82 titles and keywords related to various topics in information technology including cloud computing, parallel and distributed systems, mobile computing, data mining, image processing and MATLAB, and network security. The titles involve research on efficient data processing in clouds, privacy-preserving search, data integrity proofs, load balancing, intrusion detection, and more. The keywords indicate that the research involves programming languages including Java, .NET, and NS2.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryLeMeniz Infotech
Greeting From LeMeniz Infotech…
Do Your Projects With Technology Experts…
IEEE Master is a unit of LeMeniz Infotech. We are the leading software concern since past five years we do ieee projects and we guide final year student with latest technology update. Our aim is to initiate student to get updated in latest technology which is much more helpful to their carrier. Our team member has more than 5+ years of experience in IT field so that they can easily guide student to drive 100% Output result for their academic projects. We Provide guidance for M.E/M.Tech, B.E/B.Tech, MPhil, MCA, BCA, M.Sc, B.Sc, and Diploma. In Latest technology like java, dot net, android, hadoop, ns2, matlab, vlsi, embedded, power system, power electronics, mechanical, civil.
Web : http://www.lemenizinfotech.com/
Web : http://www.lemenizinfotech.com/tag/ieee-projects-in-pondicherry/
Web : http://ieeemaster.com/
Web : http://ieeeprojectspondicherry.weebly.com/
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
YouTube : https://www.youtube.com/watch?v=eesBNUnKvws
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Java and Dotnet Final year Software Projectsmusthafa01
This document provides contact information for Tema Solutions and lists 80 journal and magazine articles from 2015 related to various topics including cloud computing, data mining, web mining, big data, wireless networking, networking, network security, mobile computing, parallel and distributed systems. The articles are referenced by title and identifier number.
Java non ieee project titles 2014-2015Nandha Kumar
The document lists 96 potential Java non-IEEE projects related to topics like network security, distributed systems, cryptography, cloud computing, and more. The projects cover a wide range of techniques and applications including intrusion detection, load balancing, steganography, authentication systems, and modeling worm containment.
We have experience in research and development on IT sector. We developed many software products and Real-time projects. We are one of the leading organization developing research and providing better solution in Networking, Data mining, Image Processing, Information Security, Dependable and Secure Computing, Mobile computing etc., we are continuously and giving new innovative solution in this fields.
We provide better solution for IEEE paper implementation and enhancement with appropriate performance evolutions. In our concern expert professor giving guidance for students and also complete level training on the technology is provided along with.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
Gagner Technologies offered Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, Final Year Projects for BE cse, Final Year Projects for IT,
Mini projects, .Net projects,Java project,J2EE projects,Projects in Networking, Projects in data mining, Projects in mobile computing,Projects in distributed systems, Projects in networking security,software Engineering
This document contains descriptions of 16 code titles related to cloud computing, data mining, and other topics. The codes include titles like "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud" and "Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query". Each code title has a short 1-3 word description provided such as "Public auditing, privacy-preserving, shared data" or "Consumer-centric cloud, Multi Keyword search, ranked search. Synonym query".
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
This document lists 90 projects available from Logicsystems in 2014 across various technologies and domains. It provides the contact information for Arunkumar to discuss the projects further. The projects cover topics such as cloud computing, data mining, secure computing, networking, parallel and distributed systems, mobile computing, and service computing. Programming languages included are Java and .NET.
This document lists engineering project titles and descriptions conducted between 2017-2018 by 3I TECHSO TECHNOLOGIES across several domains including cloud computing, data mining, mobile computing, networking, and secure computing. There are over 100 projects listed involving technologies like Java, Android, and focusing on optimization, security, and efficiency in areas such as distributed systems, machine learning, and computer networks. The projects aimed to develop solutions for challenges in cloud services, smart devices, wireless networks, and privacy-preserving data analysis.
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
DOTNET/JAVA/MATLAB/VLSI/NS2/EMBEDDED IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS FOR CSE/IT/ECE/EEE/ STUDENTS IN CHENNAI (S3 INFOTECH : 09884848198).
Final year IEEE 2014 projects for BE, BTech, ME, MTech &PHD Students (09884848198 : S3 Infotech)
Dear Students,
Greetings from S3 INFOTECH (0988 48 48 198). We are doing Final year (IEEE & APPLICATION) projects in DOTNET, JAVA, MATLAB, ANDROID, VLSI, NS2, EMBEDDED SYSTEMS and POWER ELECTRONICS.
For B.E, M.E, B.Tech, M.Tech, MCA, M.Sc, & PHD Students.
We implement your own IEEE concepts also in ALL Technologies. We are giving support for Journal Arrangement & Publication also.
Send your IEEE base paper to yes3info@gmail.com (or) info@s3computers.com.
To Register your project: www.s3computers.com
We are providing Projects in
• DOT NET
• JAVA / J2EE / J2ME
• EMBEDDED & POWER ELECTRONICS
• MATLAB
• NS2
• VLSI
• NETWORKING
• HADOOP / Bigdata
• Android
• PHP
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
This document proposes a visual secret sharing scheme to encode secret QR codes into shares to improve security. The secret message is first encrypted then divided into shares that are encoded as valid QR codes. Only by recombining an authorized set of shares can the secret be recovered. This approach aims to resist attacks while maintaining the readability of QR codes. The proposed scheme is experimentally proven to be feasible and low cost. It could enhance the security of transmitting private information via QR codes.
FINAL YEAR IEEE POJECTS IN PONDICHERRY,IEEE PROJECTS IN PONDICHERRY ,BULK IEEE PROJECTS ,BULK 2015-16 IEEE PROJECTS TITLES, BULK IEEE PROJECTS,BULK IEEE PROJECTS IN CHENNAI,BULK IEEE PROJECTS IN PONDICHERRY,2015-16 IEEE PROJECTS,IEEE 2015-16 PROJECTS IN PONDICHERRY,IEEE PROJECTS IN PONDICHERRY,FINAL YEAR IEEE PROJECTS IN PONDICHERRY
The document lists 75 MS.NET projects with codes and titles in various domains including cloud computing, data mining, networking, mobile computing, parallel and distributed systems, secure computing, image processing, and service computing. The projects focus on developing techniques for secure and efficient data storage, access and sharing in cloud environments, privacy protection in data mining and mobile applications, optimization of network and system performance, and recommendation systems for web services.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryLeMeniz Infotech
Greeting From LeMeniz Infotech…
Do Your Projects With Technology Experts…
IEEE Master is a unit of LeMeniz Infotech. We are the leading software concern since past five years we do ieee projects and we guide final year student with latest technology update. Our aim is to initiate student to get updated in latest technology which is much more helpful to their carrier. Our team member has more than 5+ years of experience in IT field so that they can easily guide student to drive 100% Output result for their academic projects. We Provide guidance for M.E/M.Tech, B.E/B.Tech, MPhil, MCA, BCA, M.Sc, B.Sc, and Diploma. In Latest technology like java, dot net, android, hadoop, ns2, matlab, vlsi, embedded, power system, power electronics, mechanical, civil.
Web : http://www.lemenizinfotech.com/
Web : http://www.lemenizinfotech.com/tag/ieee-projects-in-pondicherry/
Web : http://ieeemaster.com/
Web : http://ieeeprojectspondicherry.weebly.com/
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
YouTube : https://www.youtube.com/watch?v=eesBNUnKvws
Mail : projects@lemenizinfotech.com
Mobile : 9566355386 / 9962588976
Java and Dotnet Final year Software Projectsmusthafa01
This document provides contact information for Tema Solutions and lists 80 journal and magazine articles from 2015 related to various topics including cloud computing, data mining, web mining, big data, wireless networking, networking, network security, mobile computing, parallel and distributed systems. The articles are referenced by title and identifier number.
Java non ieee project titles 2014-2015Nandha Kumar
The document lists 96 potential Java non-IEEE projects related to topics like network security, distributed systems, cryptography, cloud computing, and more. The projects cover a wide range of techniques and applications including intrusion detection, load balancing, steganography, authentication systems, and modeling worm containment.
We have experience in research and development on IT sector. We developed many software products and Real-time projects. We are one of the leading organization developing research and providing better solution in Networking, Data mining, Image Processing, Information Security, Dependable and Secure Computing, Mobile computing etc., we are continuously and giving new innovative solution in this fields.
We provide better solution for IEEE paper implementation and enhancement with appropriate performance evolutions. In our concern expert professor giving guidance for students and also complete level training on the technology is provided along with.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
Gagner Technologies offered Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, Final Year Projects for BE cse, Final Year Projects for IT,
Mini projects, .Net projects,Java project,J2EE projects,Projects in Networking, Projects in data mining, Projects in mobile computing,Projects in distributed systems, Projects in networking security,software Engineering
This document contains descriptions of 16 code titles related to cloud computing, data mining, and other topics. The codes include titles like "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud" and "Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query". Each code title has a short 1-3 word description provided such as "Public auditing, privacy-preserving, shared data" or "Consumer-centric cloud, Multi Keyword search, ranked search. Synonym query".
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
This document lists 90 projects available from Logicsystems in 2014 across various technologies and domains. It provides the contact information for Arunkumar to discuss the projects further. The projects cover topics such as cloud computing, data mining, secure computing, networking, parallel and distributed systems, mobile computing, and service computing. Programming languages included are Java and .NET.
This document lists engineering project titles and descriptions conducted between 2017-2018 by 3I TECHSO TECHNOLOGIES across several domains including cloud computing, data mining, mobile computing, networking, and secure computing. There are over 100 projects listed involving technologies like Java, Android, and focusing on optimization, security, and efficiency in areas such as distributed systems, machine learning, and computer networks. The projects aimed to develop solutions for challenges in cloud services, smart devices, wireless networks, and privacy-preserving data analysis.
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
DOTNET/JAVA/MATLAB/VLSI/NS2/EMBEDDED IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS FOR CSE/IT/ECE/EEE/ STUDENTS IN CHENNAI (S3 INFOTECH : 09884848198).
Final year IEEE 2014 projects for BE, BTech, ME, MTech &PHD Students (09884848198 : S3 Infotech)
Dear Students,
Greetings from S3 INFOTECH (0988 48 48 198). We are doing Final year (IEEE & APPLICATION) projects in DOTNET, JAVA, MATLAB, ANDROID, VLSI, NS2, EMBEDDED SYSTEMS and POWER ELECTRONICS.
For B.E, M.E, B.Tech, M.Tech, MCA, M.Sc, & PHD Students.
We implement your own IEEE concepts also in ALL Technologies. We are giving support for Journal Arrangement & Publication also.
Send your IEEE base paper to yes3info@gmail.com (or) info@s3computers.com.
To Register your project: www.s3computers.com
We are providing Projects in
• DOT NET
• JAVA / J2EE / J2ME
• EMBEDDED & POWER ELECTRONICS
• MATLAB
• NS2
• VLSI
• NETWORKING
• HADOOP / Bigdata
• Android
• PHP
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
This document proposes a visual secret sharing scheme to encode secret QR codes into shares to improve security. The secret message is first encrypted then divided into shares that are encoded as valid QR codes. Only by recombining an authorized set of shares can the secret be recovered. This approach aims to resist attacks while maintaining the readability of QR codes. The proposed scheme is experimentally proven to be feasible and low cost. It could enhance the security of transmitting private information via QR codes.
FINAL YEAR IEEE POJECTS IN PONDICHERRY,IEEE PROJECTS IN PONDICHERRY ,BULK IEEE PROJECTS ,BULK 2015-16 IEEE PROJECTS TITLES, BULK IEEE PROJECTS,BULK IEEE PROJECTS IN CHENNAI,BULK IEEE PROJECTS IN PONDICHERRY,2015-16 IEEE PROJECTS,IEEE 2015-16 PROJECTS IN PONDICHERRY,IEEE PROJECTS IN PONDICHERRY,FINAL YEAR IEEE PROJECTS IN PONDICHERRY
The document lists 75 MS.NET projects with codes and titles in various domains including cloud computing, data mining, networking, mobile computing, parallel and distributed systems, secure computing, image processing, and service computing. The projects focus on developing techniques for secure and efficient data storage, access and sharing in cloud environments, privacy protection in data mining and mobile applications, optimization of network and system performance, and recommendation systems for web services.
This document contains a list of 98 project titles related to various topics including cloud computing, data mining, image processing, networking, parallel and distributed computing, wireless sensor networking, mobile computing, and dependable and secure computing. It also provides contact information for Shakastech, the organization offering these projects, including their address, phone number, website, and emails.
The document contains a list of project codes for various topics from the IEEE 2014 projects. There are codes for projects related to cloud computing (GC001-GC022), data mining (GD001-GD018), distributed systems (GDS01-GDS38), mobile computing (GM001-GM020), network security (GNS01-GNS38), networking (GN001-GN024), and software engineering (GS001-GS027). The codes provide brief titles for each project within each topic area.
This document lists 30 project captions from IEEE 2015-2016 related to wireless networks and mobile ad hoc networks. The projects focus on topics like energy efficient routing protocols, secure data discovery and dissemination, context-aware trust frameworks, cooperative load balancing, and defending against collaborative attacks in mobile ad hoc networks. It provides contact information for the project list.
We are Offering the projects in quality and low price with free projects class and demonstration classes. Further Details visit our website TEMASOLUTION.COM
2013 NEW PROJECT TITLES LIST FOR JAVA AND DOTNETtema_solution
We are Offering the projects in quality and low price with free projects class and demonstration classes. Further Details visit our website TEMASOLUTION.COM
NON IEEE REAL TIME PROJECT FOR JAVA,DOTNET,ANDROIDtema_solution
We are Offering the projects in quality and low price with free projects class and demonstration classes. Further Details visit our website TEMASOLUTION.COM
NON IEEE PROJECT TITLES FOR JAVA & DOTNETtema_solution
We are Offering the projects in quality and low price with free projects class and demonstration classes. Further Details visit our website TEMASOLUTION.COM
We are Offering the projects in quality and low price with free projects class and demonstration classes. Further Details visit our website TEMASOLUTION.COM
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attri
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
Detecting Mental Disorders in social Media through Emotional patterns-The case of Anorexia and depression
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evolution Model Based on Distributed Representations.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
Shakas project titles 2014 2015
1. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
1
IEEE JAVA PROJECTS ANDROID SYSTEM
S.NO
PROJECT TITLE
ST01
A Real‐Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
ST02
A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks
ST03
Catch Me If You Can: Evaluating Android Anti‐Malware against Transformation Attacks
ST04
Collaborative Policy Administration
ST05
Context‐based Access Control Systems for Mobile Devices
ST06
Context‐driven, Prescription‐Based Personal Activity Classification: Methodology, Architecture, and End‐to‐End Implementation
ST07
Cooperative Positioning and Tracking in Disruption Tolerant Networks
ST08
DELTA++ Reducing the Size of Android Application Updates
ST09
Easy SMS: A Protocol for End-to-End Secure Transmission of SMS
ST10
Effective Risk Communication for Android Apps
ST11
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
ST12
Face‐to‐Face Proximity Estimation Using Bluetooth on Smartphone’s
ST13
Generating Summary Risk Scores for Mobile Applications
ST14
Green Droid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications
ST15
Hiding in the Mobile Crowd: Location Privacy through Collaboration
ST16
How Long to Wait? Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing
ST17
Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive
ST18
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
ST19
LocaWard A Security and Privacy Aware Location-Based Rewarding System
ST20
Mobility Prediction-based Smartphone Energy Optimization for Everyday Location Monitoring
2. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
2
ST21
Modeling Energy Consumption of Data Transmission Over Wi-Fi
ST22
MOSES: Supporting and Enforcing Security Profiles on Smart phones
ST23
Online Signature Verification on Mobile Devices
ST24
Privacy-Preserving and Content-Protecting Location Based Queries
ST25
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
ST26
Security Threats to Mobile Multimedia Applications: Camera Based Attacks on Mobile Phones.
ST27
Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring
ST28
SOS A Distributed Mobile Q&A System Based on Social Networks
ST29
The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data
NS2
ST30
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Net
ST31
A QoS‐Oriented Distributed Routing Protocol for Hybrid Wireless Networks
ST32
A Study on False Channel Condition Reporting Attacks in Wireless Networks
ST33
AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment
ST34
ALBA‐R: Load‐Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks
ST35
An Energy‐Balanced Routing Method Based on Forward‐Aware Factor for Wireless Sensor Networks
ST36
ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks
ST37
Autonomous Mobile Mesh Networks
ST38
Data Density Correlation Degree Clustering Method for Data Aggregation in WSN
ST39
Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast Environments
3. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
3
ST40
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
ST41
Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile Sensors
ST42
Eergy-Optimum Throughput and Carrier Sensing Rate in CSMA- Based Wireless Networks
ST43
Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
ST44
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
ST45
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
ST46
Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks
ST47
Modeling, Evaluation and Detection of Jamming Attacks in Time- Critical Wireless Applications
ST48
Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
ST49
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
ST50
Parallel Workload Modeling with Realistic Characteristics
ST51
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
ST52
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks
ST53
RBTP: Low‐Power Mobile Discovery Protocol through Recursive Binary Time Partitioning
ST54
Secure Time Synchronization in Wireless Sensor Networks: A Maximum Consensus-Based Approach
ST55
Secure and Efficient Data Transmission for Cluster‐Based Wireless Sensor Networks
ST56
Secure Continuous Aggregation in Wireless Sensor Networks
ST57
Sleep Scheduling for Geographic Routing in Duty‐Cycled Mobile Sensor Networks
ST58
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks
ST59
STARS: A Statistical Traffic Pattern Discovery System for MANETs
ST60
Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
ST61
VSPN: VANET‐Based Secure and Privacy‐Preserving Navigation
ST62
Distributed Scheduling in MIMO Empowered Cognitive Radio Ad Hoc Networks
4. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
4
MATLAB
ST63
A New Fast Accurate Non-Linear Medical Image Registration Program Including Surface Preserving Regularization
ST64
A New Secure Image Transmission Technique via Secret‐ Fragment‐Visible Mosaic Images by Nearly Reversible Color Transformations
ST65
A Unified Data Embedding and Scrambling Method
ST66
An Automatic Mass Detection System in Mammograms Based on Complex Texture Features
ST67
An Efficient Parallel Approach for Sclera Vein Recognition
ST68
BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification
ST69
Characterless: An Indicator of Text in the Wild
ST70
Common Feature Discriminant Analysis for Matching Infrared Face Images to Optical Face Images
ST71
Designing an Efficient Image Encryption‐Then‐Compression System via Prediction Error Clustering and Random Permutation
ST72
Digital Image Sharing by Diverse Image Media
ST73
Dual‐Geometric Neighbor Embedding for Image Super Resolution With Sparse Tensor
ST74
Energy Preserving QMF for Image Processing
ST75
Exposing Digital Image Forgeries by Illumination Color Classification
ST76
Fingerprint Compression Based on Sparse Representation
ST77
Group Sparse Multiview Patch Alignment Framework With View Consistency for Image Classification
ST78
Hyper spectral Image Classification Through Bilayer Graph‐Based Learning
ST79
Image Denoising using Orthonormal Wavelet Transform with Stein Unbiased Risk Estimator
ST80
Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition
ST81
Images as Occlusions of Textures: A Framework for Segmentation
5. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
5
ST82
Low‐Rank Neighbor Embedding for Single Image Super‐ Resolution
ST83
Lp-Norm IDF for Scalable Image Retrieval
ST84
Mining Weakly Labeled Web Facial Images for Search‐Based Face Annotation
ST85
Multitouch Gesture-Based Authentication
ST86
One-Class Classification of Mammograms Using Trace Transform Functionals
ST87
Phase‐Based Binarization of Ancient Document Images: Model and Applications
ST88
Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A Unified Framework
ST89
Real Time Hand Gesture Recognition for Computer Interaction
ST90
Scanned Image Descreening With Image Redundancy and Adaptive Filtering
ST91
Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration
ST92
Segmentation of Skin Lesions From Digital Images Using Joint Statistical Texture Distinctiveness
ST93
Spatial Pooling of Heterogeneous Features for Image Classification
ST94
Stationary Probability Model for Microscopic Parallelism in JPEG2000
PARALLEL AND DISTRIBUTED SYSTEMS – NETWORKING
ST95
A Decision Procedure for Deadlock-Free Routing in Wormhole Network
ST96
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices
ST97
A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks.
ST98
A Scalable and Modular Architecture for High-Performance Packet Classification.
ST99
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
ST100
A Two-stage Deanonymization Attack Against Anonymized Social Networks
ST101
An Online Integrated Resource Allocator for Guaranteed Performance in Data Centers.
ST102
Behavioral Malware Detection in Delay Tolerant Networks
ST103
Breaking the Barrier to Transferring Link Information across Networks
6. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
6
ST104
Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self- Organization Mechanism in a Distributed Agent Network
ST105
Coding Opportunity Aware Backbone Metrics for Broadcast in Wireless Networks
ST106
Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks
ST107
CPU Scheduling for Power Energy Management on Multicore Processors Using Cache Miss and Context Switch Data.
ST108
Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
ST109
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing.
ST110
Efficient Data Collection for Large-Scale Mobile Monitoring Applications.
ST111
Efficient Response Time Approximations for Multiclass Fork and Join Queues in Open and Closed Queuing Networks.
ST112
Evolving Fuzzy Rules for Anomaly Detection in Data Streams
ST113
From Shortest-Path to All-Path: The Routing Continuum Theory and Its Applications
ST114
Harmonic-Aware Multi-Core Scheduling for Fixed-Priority Real-Time Systems.
ST115
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
ST116
Hyperbolic Utilization Bounds for Rate Monotonic Scheduling on Homogeneous Multiprocessors.
ST117
Improvement of Real-Time Multi-Core Schedulability with Forced Non-Preemption.
ST118
Improving the Performance of Independent Task Assignment Heuristics MinMin, MaxMin and Sufferage.
ST119
ISP-Friendly Live P2P Streaming
ST120
List Scheduling Algorithm for Heterogeneous Systems by an Optimistic Cost Table
ST121
Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing
ST122
Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless Networks.
ST123
Multicast Capacity in MANET with Infrastructure Support.
ST124
Multi-Core Embedded Wireless Sensor Networks Architecture and Applications.
7. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
7
ST125
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
ST126
Network Aware Scheduling for Virtual Machine Workloads with Interference Models
ST127
On Social Delay-Tolerant Networking Aggregation, Tie Detection, and Routing.
ST128
Order-Optimal Information Dissemination in MANETs via Network Coding
ST129
Peer-Assisted VoD Systems: An Efficient Modeling Framework
ST130
Performance Analysis of EDF Scheduling in a Multi-Priority Preemptive M/G/1 Queue
ST131
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
ST132
Reservation-Based Packet Buffers with Deterministic Packet Departures
ST133
SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Systems
ST134
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
ST135
Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
ST136
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
ST137
Signature Searching in a Networked Collection of Files
ST138
Towards Differential Query Services in Cost-Efficient Clouds.
NETWORK SECURITY
ST139
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
ST140
A Least Squares Approach to the Static Traffic Analysis of High- Latency Anonymous Communication Systems
ST141
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
ST142
An Empirical Study of Ontology-Based Multi-Document Summarization in Disaster Management
ST143
An Error Minimizing Framework for Localizing Jammers in Wireless Networks
ST144
An Optimal Distributed Malware Defense System for Mobile Networks with Heterogeneous Devices
ST145
Bandwidth Distributed Denial of Service: Attacks and Defenses
ST146
Behavioral Malware Detection in Delay Tolerant Networks
8. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
8
ST147
Building a Scalable System for Stealthy P2P-Botnet Detection
ST148
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
ST149
Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design
ST150
E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels.
ST151
Generating Summary Risk Scores for Mobile Applications.
ST152
MINT: A Reliability Modeling Framework for Energy-Efficient Parallel Disk Systems
ST153
Modeling the Propagation of Worms in Networks A Survey.
ST154
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
ST155
Private Searching on Streaming Data Based on Keyword Frequency
ST156
Probabilistic Threat Propagation for Network Security.
ST157
PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes
ST158
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions
ST159
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
ST160
Secure Ordered Bucketization
ST161
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
ST162
Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption
ST163
Security Analysis of Handover Key Management in 4G LTESAE Networks.
ST164
Sybil Belief: A Semi-Supervised Learning Approach for Structure- Based Sybil Detection
ST165
The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluations
ST166
Toward Unified Security and Privacy Protection for Smart Meter Networks
ST167
Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack
9. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
9
NETWORK TOPOLOGY
ST168
A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks.
ST169
An Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh Networks.
ST170
Congestion Aware Routing in Nonlinear Elastic Optical Networks.
ST171
Degraded Service Provisioning in Mixed-Line-Rate WDM Backbone Networks Using Multipath Routing.
ST172
On the Network Sharing of Mixed Network Coding and Routing Data Flows in Congestion Networks.
ST173
Scalable Dynamic Routing Protocol for Cognitive Radio Sensor Networks.
ST174
Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Networks.
DATA MINING
ST175
A K-Main Routes Approach to Spatial Network Activity Summarization Java
ST176
A generic framework for top k pairs and top k objects queries over sliding windows
ST177
Access Control in Decentralized Online Social Networks Applying a Policy Hiding Cryptograph
ST178
Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data
ST179
Active Learning of Constraints for Semi-Supervised Clustering.
ST180
An Efficient Approach for Outlier Detection with Imperfect Data Labels
ST181
An Empirical Performance Evaluation of Relational Keyword Search Techniques.
ST182
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme.
ST183
Authenticating Location-Based Skyline Queries in Arbitrary Subspaces
ST184
Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
ST185
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
ST186
Collaborative Online Multitask Learning
10. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
10
ST187
Dealing With Concept Drifts in Process Mining
ST188
Discovering Emerging Topics in Social Streams via Link-Anomaly
ST189
Efficient Instant-Fuzzy Search with Proximity Ranking
ST190
Efficient Prediction of Difficult Keyword Queries over Databases
ST191
Efficient Ranking on Entity Graphs with Personalized Relationships
ST192
Facilitating Document Annotation using Content and Querying Value
ST193
Fast Nearest Neighbor Search with Keywords
ST194
Infrequent Weighted Item set Mining Using Frequent Pattern Growth
ST195
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
ST196
Personalized Recommendation Combining User Interest and Social Circle
ST197
Privacy-Preserving and Content-Protecting Location Based Queries
ST198
Privacy-Preserving Authenticated Key-Exchange Over Internet.
ST199
Product Aspect Ranking and Its Applications
ST200
Range Aggregation with Set Selection
ST201
Secure Mining of Association Rules in Horizontally Distributed Databases
ST202
Secure Outsourced Attribute-Based Signatures
ST203
Security Evaluation of Pattern Classifiers under Attack
ST204
SOS: A Distributed Mobile Q&A System Based on Social Networks
ST205
Supporting Privacy Protection in Personalized Web Search
ST206
Temporal Workload-Aware Replicated Partitioning for Social Networks
ST207
Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
ST208
XSPath Navigation on XML Schemas Made Easy
DATA MINING OR DATA ENGINEERING
ST209
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to- Business E-Services
ST210
A K-Main Routes Approach to Spatial Network Activity Summarization
ST211
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs
ST212
A Probabilistic Approach to String Transformation.
11. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
11
ST213
A System for Automatic Notification and Severity Estimation of Automotive Accidents.
ST214
Adaptive Replica Synchronization for Distributed File Systems
ST215
An Empirical Performance Evaluation of Relational Keyword Search Techniques
ST216
Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation
ST217
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
ST218
Commuter Route Optimized Energy Management of Hybrid Electric Vehicles.
ST219
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
ST220
Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs.
ST221
Efficient Range-Based Storage Management for Scalable Data stores
ST222
Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource
ST223
Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases
ST224
Mining Statistically Significant Co-location and Segregation Patterns.
ST225
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
ST226
Probabilistic Aspect Mining Model for Drug Reviews
ST227
PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
ST228
Random Projection Random Discretization Ensembles—Ensembles of Linear Multivariate Decision Trees.
ST229
Reinforced Similarity Integration in Image-Rich Information Networks
ST230
Scalable Keyword Search on Large RDF Data
ST231
Secure Mining of Association Rules in Horizontally Distributed Databases.
ST232
Supporting Privacy Protection in Personalized Web Search
ST233
Task Trail: An Effective Segmentation of User Search Behavior
ST234
Using Incomplete Information for Complete Weight Annotation of Road Networks.
ST235
Web-Based Traffic Sentiment Analysis Methods and Applications.
12. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
12
BIG DATA
ST236
Big Data and the SP Theory of Intelligence.
ST237
Big Data Deep Learning Challenges and Perspectives.
ST238
Dache A Data Aware Caching for Big-Data Applications Using the MapReduce Framework.
ST239
Data Mining with Big Data.
ST240
Finding the Needle in the Image Stack Performance Metrics for Big Data Image Analysis.
MOBILE COMPUTING
ST241
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices.
ST242
A Novel Unified Analytical Model for Broadcast Protocols in Multi- Hop Cognitive Radio Ad Hoc Networks
ST243
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
ST244
A Study on False Channel Condition Reporting Attacks in Wireless Networks.
ST245
Achieving Maximum Throughput in Random Access Protocols with Multi packet Reception
ST246
Adaptive and Energy Efficient Context Representation Framework in Mobile Sensing
ST247
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
ST248
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
ST249
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
ST250
Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
ST251
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
ST252
Efficient Authentication for Mobile and Pervasive Computing
ST253
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
ST254
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
ST255
Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
13. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
13
ST256
Friend book: A Semantic-based Friend Recommendation System for Social Networks
ST257
Interference and Outage in Mobile Random Networks: Expectation, Distribution, and Correlation
ST258
Iterative Group Splitting Algorithm For Opportunistic Scheduling Systems
ST259
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
ST260
Multicast Capacity in MANET with Infrastructure Support
ST261
Optimal Multicast Capacity and Delay Tradeoffs in MANET.
ST262
Preserving Location Privacy in Geo-Social Applications
ST263
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
ST264
QOF: Towards Comprehensive Path Quality measurement in Wireless Sensor Networks
ST265
Secure Time Synchronization in Wireless Sensor Networks: A Maximum Consensus- Based Approach
ST266
Throughput Optimization in Wireless Networks Under Stability and Packet Loss Constraints.
ST267
Trajectory Improves Data Delivery in Urban Vehicular Networks
CLOUD COMPUTING
ST268
A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
ST269
A hybrid cloud approach for secure authorized deduplication
ST270
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
ST271
Automatic Scaling of Internet Applications for Cloud Computing Services
ST272
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
ST273
CCIoT-CMfg Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System.
ST274
Cloud Service Negotiation in Internet of Things Environment A Mixed Approach.
ST275
CLOUDQUAL A Quality Model for Cloud Services.
ST276
Consistency as a Service: Auditing Cloud Consistency
14. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
14
ST277
DaaS: Cloud-based mobile Web service discovery
ST278
Decentralized access control with anonymous Authentication of data stored in clouds
ST279
Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments
ST280
Developing Vehicular Data Cloud Services In The It Environment
ST281
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
ST282
DynamicMR: A Dynamic Slot Allocation Optimization Framework for Map Reduce Clusters
ST283
Enabling Smart Cloud Services Through Remote Sensing An Internet of Everything Enabler.
ST284
KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
ST285
Key-aggregate cryptosystem for scalable data sharing in cloud storage Oruta privacy- preserving public auditing for shared data in the cloud
ST286
Lifelong Personal Health Data And Application Software Via Virtual Machines In The Cloud
ST287
Liquid: A Scalable Deduplication File System for Virtual Machine Images
ST288
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
ST289
Proactive Workload Management in Hybrid Cloud Computing
ST290
Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery
ST291
Resource Availability Characteristics and Node Selection in Cooperatively Shared Computing Platforms
ST292
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
ST293
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
ST294
Toward Transcoding as a Service in a Multimedia Cloud Energy-Efficient Job- Dispatching Algorithm.
15. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
15
WEB SERVICES
ST295
A Graph Derivation Based Approach for Measuring and Comparing Structural Semantics of Ontologies.
ST296
Commitments to Regulate Social Web Services Operation
ST297
Constraint-Aware Approach to Web Service Composition.
ST298
Design of a RESTful Web Information System for Drug Prescription and Administration.
ST299
Designing an Architecture for Monitoring Patients at Home Ontologies and Web Services for Clinical and Technical Management Integration.
ST300
Introducing Replaceability into Web Service Composition.
ST301
Privacy-Enhanced Web Service Composition.
ST302
Scalable and Accurate Prediction of Availability of Atomic Web Services.
ST303
SMARTSPACE Multiagent Based Distributed Platform for Semantic Service Discovery.
ST304
Web Service Recommendation via Exploiting Location and QoS Information.
E-LEARNING
ST305
Building Families of Software Products for e-Learning Platforms A Case Study.
ST306
Development of e-Learning Solutions Different Approaches a Common Mission
ST307
E-Learning and Intelligent Planning Improving Content Personalization
ST308
Facilitating Teachers' Reuse of Mobile Assisted Language Learning Resources Using Educational Metadata
ST309
Performing Real Experiments From a Remote Learning Management System
ANT COLONY OPTIMIZATION (ACO)
ST310
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications.
ST311
Ant-Inspired Mini-Community-Based Solution for Video-On-Demand Services in Wireless Mobile.
ST312
Hybrid Ant Bee Algorithm for Fuzzy Expert System Based Sample Classification.
16. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
16
ST313
Optimization of the Wind Turbine Layout and Transmission System Planning for a Large-Scale Offshore WindFarm by AI Technology.
ST314
Spatial-Temporal Enhancement of ACO-Based Selection Schemes for Adaptive Routing in Network-on-Chip Systems. FUZZY NEURAL NETWORKS
ST315
A Comprehensive Review of Stability Analysis of Continuous-Time Recurrent Neural Networks.
ST316
A Nonlinear Semantic-Preserving Projection Approach to Visualize Multivariate Periodical Time Series.
ST317
Adaptive Consensus Control for a Class of Nonlinear Multiagent Time-Delay Systems Using Neural Networks.
ST318
Adaptive Neural Network Feedforward Control for Dynamically Substructured Systems
ST319
Fuzzy Neural Network-Based Adaptive Control for a Class of Uncertain Nonlinear Stochastic Systems.
ST320
Modeling of Batch Processes Using Explicitly Time-Dependent Artificial Neural Networks.
ST321
New Criteria for Global Robust Stability of Delayed Neural Networks With Norm- Bounded Uncertainties.
ST322
One-Layer Continuous-and Discrete-Time Projection Neural Networks for Solving Variational Inequalities and Related Optimization Problems.
ST323
Simplified Interval Type-2 Fuzzy Neural Networks. SOFTWARE ENGINEERING
ST324
Continuous and Transparent User Identity Verification for Secure Internet Services
ST325
Embedding reflection and learning into agile software Development
ST326
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems.
ST327
Governing Software Process Improvements in Globally Distributed Product Development.
ST328
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes.
ST329
Online Feature Selection and Its Applications
ST330
Variability in Software Systems-A Systematic Literature Review.
17. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
17
JIST (JAVA)
ST331
Cross-Layer Approach for Minimizing Routing Disruption in IP Networks.
ST332
Multicast Capacity in MANET with Infrastructure Support.
ST333
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks.
ST334
Scalable Dynamic Routing Protocol for Cognitive Radio Sensor Networks. CLOUDSIM
ST335
Developing Vehicular Data Cloud Services in the it Environment.
ST336
Efficient Data Collection for Large-Scale Mobile Monitoring Applications.
ST337
Towards Differential Query Services in Cost-Efficient Clouds.
MULTIMEDIA
ST338
Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
ST339
ComposingKerberosandMultimedia Internet Keying (MIKEY) for Authenticated Transport of Group Keys
ST340
Performance Analysis of Media Cloud-Based Multimedia Systems With Retrying Fault-Tolerance Technique
ST341
Uniform Embedding for Efficient JPEG Steganography
IMAGE PROCESSING
ST342
Fuzzy Clustering With a Modified MRF Energy Function for Change Detection in Synthetic Aperture Radar Images
ST343
Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition
ST344
Measures of Effective Video Tracking
ST345
Object-Oriented Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images GRID COMPUTING
ST346
Containing Byzantine Failures with Control Zones
ST347
Rate less Codes and Random Walks for P2P Resource Discovery in Grids
18. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
18
J2EE
ST348
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to- Business E-Services
ST349
Adaptive Replica Synchronization for Distributed File Systems
ST350
An Empirical Performance Evaluation of Relational Keyword Search Techniques
ST351
Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation
ST352
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
ST353
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
ST354
Efficient Range-Based Storage Management for Scalable Data stores
ST355
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
ST356
Probabilistic Aspect Mining Model for Drug Reviews
ST357
PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
ST358
Scalable Keyword Search on Large RDF Data
ST359
Supporting Privacy Protection in Personalized Web Search
ST360
Task Trail: An Effective Segmentation of User Search Behavior
19. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
19
DOT NET IEEE PROJECTS PARALLEL AND DISTRIBUTED SYSTEMS – NETWORKING
ST01
A Scalable and Mobility-Resilient Data Search System for Large- Scale Mobile Wireless Network
ST02
Certificate less Remote Anonymous Authentication Schemes for Wireless Body Area Networks
ST03
Cognitive Cooperative Random Access for Multicast: Stability and Throughput Analysis
ST04
Contiguous Link Scheduling for Data Aggregation in Wireless Sensor Networks
ST05
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
ST06
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
ST07
Exploiting Service Similarity for Privacy in Location-Based Search Queries
ST08
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems
ST09
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks
ST10
LocaWard: A Security and Privacy Aware Location-Based Rewarding System
ST11
On False Data-Injection Attacks against Power System State Estimation: Modeling and Counter measures
ST12
QoF: Towards Comprehensive Path Quality Measurementin Wireless Sensor Networks
ST13
Reliable Bulk-Data Dissemination in Delay Tolerant Networks
ST14
Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks
ST15
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
ST16
SOS: A Distributed Mobile Q&A System Based on Social Networks
ST17
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
ST18
Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
20. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
20
CLOUD COMPUTING
ST19
A Mechanism Design Approach to Resource Procurement in Cloud Computing.
ST20
A Scientometric Analysis of Cloud Computing Literature.
ST21
Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query.
ST22
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing
ST23
Automating Cloud Services Life Cycle through Semantic Technologies
ST24
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
ST25
Consistency as a Service Auditing Cloud Consistency
ST26
Deadline based Resource Provisioning and Scheduling Algorithm for Scientific Workflows on Clouds
ST27
Dynamic Multiservice Load Balancing in Cloud-Based Multimedia System
ST28
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
ST29
Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes
ST30
Optimal Multi server Configuration for Profit Maximization in Cloud Computing
ST31
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
ST32
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
ST33
Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
ST34
Performance and cost evaluation of an adaptive encryption architecture for cloud databases
ST35
Privacy Preserving Delegated Access Control in Public Clouds
ST36
Privacy-Preserving Public Auditing for Secure Cloud Storage
ST37
QoS Ranking Prediction for Cloud Services
ST38
Secure Logging As a Service Delegating Log Management to the Cloud
ST39
Strategic Management of Cloud Computing Services: Focusing on Consumer Adoption Behavior
ST40
System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments
ST41
Transformation-based Monetary Cost Optimizations for Workflows in the Cloud
21. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
21
MOBILE COMPUTING
ST42
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
ST43
Efficient Authentication for Mobile and Pervasive Computing
ST44
Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach
ST45
STARS: A Statistical Traffic Pattern Discovery System for MANETs GRID COMPUTING
ST46
Resource Selection for Tasks with Time Requirements Using Spectral Clustering
ST47
A Merge-and-Split Mechanism for Dynamic Virtual Organization Formation in Grids MULTIMEDIA
ST48
Weakly Supervised Multi-Graph Learning for Robust Image Reranking
ST49
Augmenting Image Descriptions Using Structured Prediction Output
ST50
Video Annotation via Image Groups from the Web
ST51
An Adaptive Cloud Downloading Service IMAGE PROCESSING – MULTIMEDIA
ST52
A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
ST53
A New Iterative Triclass Thresholding Technique in Image Segmentation.
ST54
An Iranian License Plate Recognition System Based on Color Features.
ST55
Corruptive Artifacts Suppression for Example-Based Color Transfer
ST56
How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version.
ST57
Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering.
ST58
LBP-Based Edge-Texture Features for Object Recognition.
ST59
Localization of License Plate Number Using Dynamic Image Processing Techniques and Genetic Algorithms.
ST60
Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks.
ST61
Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application.
22. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
22
ST62
Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces.
ST63
Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors.
ST64
Sharing Visual Secrets in Single Image Random Dot Stereogram’s.
ST65
Single-Image Super resolution of Natural Stochastic Textures Based on Fractional Brownian Motion.
ST66
Toward Experiential Mobile Media.
ST67
Weighted KPCA Degree of Homogeneity Amended Non classical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image. KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
ST68
A Decision Support Approach for Online Stock Forum Sentiment Analysis
ST69
A Food Recognition System for Diabetic Patients based on an Optimized Bag of Features Model*
ST70
Active Learning of Constraints for Semi-Supervised Clustering
ST71
An Empirical Performance Evaluation of Relational Keyword Search Systems.
ST72
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
ST73
Demand Bidding Program and Its Application in Hotel Energy Management.
ST74
Distribution, Data, Deployment: Software Architectural Convergence in Big Data Systems
ST75
Facilitating Document Annotation Using Content and Querying Value
ST76
Incremental Detection of Inconsistencies in Distributed Data.
ST77
Investigating QoS of Real-World Web Services
ST78
Keyword Query Routing.
ST79
Motif-based Hyponym Relation Extraction from Wikipedia Hyperlinks
ST80
Probability of Severe Adverse Events as a Function of Hospital Occupancy
ST81
Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups
ST82
Topic Machine: Conversion Prediction in Search Advertising using Latent Topic Models
ST83
Using data merging techniques for generating multi-document summarizations
23. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
23
ST84
Web Image Re-Ranking Using Query-Specific Semantic Signatures
ST85
Web System Upgrading With Transaction Failure and Strategic Customers
MOBILE COMPUTING - WIRELESS COMMUNICATION
ST86
Key logging-resistant Visual Authentication Protocols.
NETWORKING
ST87
Behavioral Malware Detection in Delay Tolerant Networks.
ST88
Cooperation versus Multiplexing Multicast Scheduling Algorithms for OFDMA Relay Networks.
ST89
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
ST90
D2P Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management.
ST91
Designing Truthful Spectrum Double Auctions with Local Markets.
ST92
DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs
ST93
Efficient and Scalable Metadata Management in EB-scale File Systems
ST94
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low- Rate DOS Attacks
ST95
Reservation-Based Packet Buffers with Deterministic Packet Departures
ST96
Retransmission Delays with Bounded Packets Power-Law Body and Exponential Tail.
ST97
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks.
ST98
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
ST99
Trust Management for Defending On-off Attacks
NETWORK SECURITY
ST100
Fragmentation in presence of data dependencies
ST101
Malware Propagation in Large-Scale Networks
ST102
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification
ST103
SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design
24. #13/19, 1st Floor, Municipal Colony, Gandhi Nagar, Vellore-632006.
Off: 0416-6066663/2247353, Mobile: +91 9500218218/8870603602
Website: www.shakastech.com. www.shakastech.weebly.com E.ID: shakastech@gmail.com
24
ST104
Structural Diversity for Resisting Community Identification in Published Social Networks
ST105
Sybil Belief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
ST106
Verifying Keys through Publicity and Communities of Trust: Quantifying Off-Axis Corroboration
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING SOFTWARE ENGINEERING
ST107
An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes.
ST108
Analyzing Critical Decision-Based Processes
ST109
Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems.
ST110
Coverage-based testing for Service Level Agreements
ST111
Determination of Weights for Multiobjective Decision Making or Machine Learning
ST112
Exploiting Service Similarity for Privacy in Location Based Search Queries.
ST113
Governing Software Process Improvements in Globally Distributed Product Development
ST114
Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis
ST115
Link Quality Aware Code Dissemination in Wireless Sensor Networks.
ST116
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.
ST117
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks.
ST118
Secure Deduplication With Efficient And Reliable Convergent Key Management.
ST119
Uniform Embedding for Efficient JPEG Steganography.
INTERNATIONAL CONFERENCE
ST120
A Secure Client Side Deduplication Scheme in Cloud Storage Environments.
ST121
Attribute Based Encryption with Privacy Preserving In Clouds
ST122
Efficient Instant-Fuzzy Search with Proximity Ranking.
ST123
Online Payment System using Steganography and Visual Cryptography.