Upload
krish-madhi
View
173
Download
0
Embed Size (px)
Citation preview
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
CLOUD COMPUTING
S.No TITLES ID YEAR
1 Cloud Federations in the Sky: Formation Game and Mechanism
SS01 March 2015
2 Stealthy Denial of Service Strategy in Cloud Computing SS02 March 2015
3 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
SS03 March 2015
4 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
SS04 March 2015
5 A Secure Data Self-Destructing Scheme in Cloud Computing
SS05 Dec 2015
6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
SS06 2015
7 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SS07 March 2015
8 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
SS08 2015
9 Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency
SS09 2015
10 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters
SS10 2015
11 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
SS11 2015
12 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
SS12 2015
13 Cloud-Based Multimedia Content Protection System SS13 March 2015
14 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
SS14 Dec 2014
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
15 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
SS15 2015
16 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
SS16 March 2015
17 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
SS17 Feb 2015
18 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
SS18 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
DATA MINING
S.No TITLES ID YEAR
1 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
SS19 May 2015
2 A Unifying Framework of Mining Trajectory Patterns of Various Temporal Tightness
SS20 June 2015
3 TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets
SS21 June 2015
4 Discovery of Path Nearby Clusters in Spatial Networks SS22 June 2015
5 Best Keyword Cover Search SS23 Jan 2015
6 Discovery of Ranking Fraud for Mobile Apps SS24 Jan 2015
7 Efficient Top-k Retrieval on Massive Data SS25 2015
8 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
SS26 Jan 2015
9 GDCluster: A General Decentralized Clustering Algorithm SS27 July 2015
10 Tweet Segmentation and Its Application to Named Entity Recognition
SS28 Feb 2015
11 Improving Web Navigation Usability by Comparing Actual and Anticipated Usage
SS29 Feb 2015
12 Rank-Based Similarity Search: Reducing the Dimensional Dependence
SS30 Jan 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
MOBILE COMPUTING
S.No TITLES ID YEAR
1 BRACER: A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with Collision Avoidance
SS31 March 2015
2 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
SS32 March 2015
3 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
SS33 May 2015
4 Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
SS34 May 2015
5 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
SS35 April 2015
6 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
SS36 April 2015
7 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
SS37 April 2015
8 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
SS38 March 2015
9 Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET
SS39 March 2015
10 On-Demand Discovery of Software Service Dependencies in MANETs
SS40 June 2015
11 Nearest Neighbor Search for Location-Dependent Sensor Data in MANETs
SS41 June 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
NETWORK/ NETWORK SECURITY
S.No TITLES ID YEAR
1 A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees
SS42 JUNE 2015
2 Continuous and Transparent User Identity Verification for Secure Internet Services
SS43 June 2015
3 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
SS44 April 2015
4 A Hierarchical Account-Aided Reputation Management System for MANETs
SS45 Feb 2015
5 Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks
SS46 Feb 2015
6 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
SS47 2015
7 Data Collection in Multi-Application Sharing Wireless Sensor Networks
SS48 Feb 2015
8 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
SS49 2015
9 Authenticated Key Exchange Protocols for Parallel Network File Systems
SS50 2015
10 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
SS51 2015
11 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
SS52 April 2015
12 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
SS53 Jan 2015
13 A Hybrid Cloud Approach for Secure Authorized Deduplication
SS54 May 2015
14 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
SS55 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
INFORMATION FORENSICS
S.No TITLES ID YEAR
1 A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
SS57 May 2015
2 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
SS58 July 2015
3 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
SS59 Jan 2015
4 An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
SS60 May 2015
5 Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
SS61 Mar 2015
6 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute-Based Encryption
SS62 Jan 2015
7 Correlated Differential Privacy: Hiding Information in Non-IID Data Set
SS63 Feb 2015
8 A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval
SS64 Jan 2015
9 Implementation of a New Lightweight Encryption Design for Embedded Security
SS65 Jan 2015
10 Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
SS66 Mar 2015
11 Enabling Cloud Storage Auditing With Key-Exposure Resistance
SS67 June 2015
15 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
SS56 April 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
12 Effective Key Management in Dynamic Wireless Sensor Networks
SS68 Feb 2015
13 Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
SS69 Jan 2015
14 Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
SS70 Mar 2015
15 LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
SS71 Feb 2015
16 Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
SS72 Mar 2015
17 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
SS73 Mar 2015
18 White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
SS74 June 2015
19 Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
SS75 Mar 2015
20 Secrecy Transmission With a Helper: To Relay or to Jam SS76 Feb 2015
21 Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
SS77 July 2015
22 Continuous and Transparent User Identity Verification for Secure Internet Services
SS78 June 2015
23 Privacy-Preserving Detection of Sensitive Data Exposure SS79 May 2015
24 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
SS80 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
IMAGE PROCESSING
S.No TITLES ID YEAR
1 A Methodology for Extracting Standing HumanBodies From Single Images
SS81 JUNE 2015
2 Detection and Rectificationof Distorted Fingerprints SS82 March 2015
3 Eye Gaze Tracking With a Web Camera in a Desktop Environment
SS83 Aug 2015
4 An Attribute-Assisted Reranking Model for Web Image Search
SS84 JAN 2015
5 Fiducial Facial Point Extraction Using a Novel Projective Invariant
SS85 March 2015
6 Face Recognition Across Non-Uniform Motion Blur, Illumination, and Pose
SS86 July 2015
7 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
SS87 2015
8 Steganography Using Reversible Texture Synthesis SS88 2015
9 An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
SS89 May 2015
10 Face Spoof Detection With Image Distortion Analysis SS90 April 2015
11 Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
SS91 May 2015
12 Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
SS92 Mar 2015
13 Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study
SS93 Mar 2015
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
APPLICATION PROJECTS
S.No Titles Code
1 Drug Management System SAD01
2 Community Forum SAD02
3 Evaluation of Employee Performance SAD03
4 Global Loan System. SAD04
5 Healthcare Security System SAD05
6 Hierarchical Organization Information SAD06
7 IT Documentation SAD07
8 Referendum Crusader Scrutiny System SAD08
9 Sales & Inventory Management System SAD09
10 Software Project Management SAD10
11 Travel Management System SAD11
12 Communication-Intensive Workloads SAD12
13 Micro-Blogging in Classroom Students Relevant and Irrelevant Questions
SAD13
14 Blocking IP Address of Misbehaving User In Anonymous Network SAD14
15 Online E-Payments For Government Taxes SAD15
16 Cloud Computing SAD16
17 Virtual Class Room SAD17
18 Cyber Eye SAD18
19 Online Training And Exam SAD19
20 GSM Medical Report SAD20
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
21 Online Tourism SAD21
22 Rail Way Route SAD22
23 RFID Smart Card Verification SAD23
24 Mobile Sync SAD24
25 Analyzing and Opinion In For Mobile Products SAD25
26 Antiphishing Banking System SAD26
27 Construction Plus SAD27
28 Sending Resume Through SMS Gateway SAD28
29 RTO Management System SAD29
30 Graphical Password Authentication System Using Sound Signature SAD30
31 Attance Verification SAD31
32 Bio-Matrix And RFID Remote Voting System SAD32
33 Resume Send Using Mobile Application SAD33
34 Communication-Aware Load Balancing on clusters SAD34
35 Relevant and Irrelevant Questions in a Micro Blogging Supported Classroom
SAD35
36 Authenticated Nearest Neighbor Search SAD36
37 Spatial Ranking SAD37
38 Slicing the Privacy Data Publishing SAD38
39 Revisiting Password Guessing Attacks in the Network SAD39
40 Flexible Robust Group Agreement SAD40
41 Passport Verification Based On RFID SAD41
42 Finger Print based Attendance Verification SAD42
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446
43 Finger Print Based Authentication For ATM Using Mobile Service SAD43
44 Steganography SAD44
45 Defect Tracking System SAD45
46 Copyright Protection Using Multimedia Documents Authentication SAD46
47 Automatic Composition of Semantic Web Services SAD47
48 Mage Fusion & Steganography SAD48
49 Path Selection Under Budget Constraints SAD49
50 AMES-Cloud An Adaptive Mobile Video Streaming SAD50