Eligible Majors: M.E, M.Tech, B.E, Btech, MCA, Msc, Bsc, BCA,B.Com CA (All Disciplines)

Eligible Majors: M.E, M.Tech, B.E, Btech, MCA, Msc, Bsc, BCA,B.Com CA (All Disciplines)

ASCENTZ TECHNOLOGIES

Eligible Majors: M.E, M.Tech, B.E, BTech, MCA, MSc, BSc, BCA,B.Com CA (All Disciplines)

S.No / Technologies
1 / JAVA / J2EE / J2ME IEEETransactions (Networking, Network Security, Data Mining, Mobile Computing, Software Engineering, Image Processing, Grid Computing, Multimedia, Neural Networks) Application Projects (Windows Application, Web Application, Device Application)
2 / DOTNET (VB.Net, ASP.Net , C#.Net, ADO.Net, AJAX, J#.Net) IEEE Transactions(Networking, Network Security, Data Mining, Mobile Computing, Software Engineering, Image Processing, Grid Computing, Multimedia, Neural Networks) Application Projects (Windows Application, Web Application, Device Application, Console Application, Control libraries)
3 / NS2
MATLAB
PHP
ANDROID
OUR SPECIALIZATIONS:
  • REAL TIME PROJECT BASED TRAINING WITH CUTTING EDGE
TECHNOLOGIES
  • CURRENT YEAR IEEE / ACM / RESEARCH PAPER BASED PROJECTS
  • STUDENTS OWN CONCEPTS ALSO ACCEPTABLE
  • SHAPE12 CONCEPT IMPLEMENTATION
  • PROJECT WITH COURSE IS COVERED UNDER THE SAME COST
  • SOUNDS IN PROVIDING THE TECHNOLOGY TRAINING IN BOTH
HARDWARE AND SOFTWARE
  • STAFFS ARE EXPERIENCED IN REAL TIME ABOUT MORE THAN 5 YEAR
  • SEMINARS BY CORPORATE PROFESSIONALS
  • TRAINING PROVIDED BY DEDICATED, EXPERIENCED STAFFS
  • APPROPRIATE OUTPUT FOR ALL THE PROJECTS
  • EFFECTIVE COURSE MATERIAL PREPARED BY PERSONS WITH
OVER 5 YEARS OF INDUSTRIAL EXPERIENCE
  • PROVIDING PLACEMENT ASSISTANCE / INPLANT TRAINING TOO
ACCEPTABLE

100 % output and quality assurance

100% practical training on all domains

More than 100+ IEEE 2014, 15,16, 17 & 18 Titles...

Placement Training

In-plant Training

Contact

@

900 3502338,96295 95205

Ascentz Technologies

383/11, 2nd Floor, D.A Complex,Cross Cut Road, 7th Street

(Behind Pothys), Gandhipuram, Coimbatore-12

JAVA

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON NETWORKING

CODE
NO / PROJECT TITLE / YEAR
AZJVN1 / TOWARDS LONG-VIEW COMPUTING LOAD BALANCING IN CLUSTER STORAGE SYSTEMS / 2017
AZJVN2 / PARALLELIZING EXACT AND APPROXIMATE STRING MATCHING VIA INCLUSIVE SCAN ON A GPU / 2017
AZJVN3 / ROUTING AND FAULT TOLERANCE IN Z-FAT TREE / 2017
AZJVN4 / Optimal Functional-Unit Assignment for Heterogeneous Systems UnderTiming Constraint / 2017
AZJVN5 / Parallel Graph Partitioning for Complex Networks / 2017
AZJVN6 / Perfect Hashing Based Parallel Algorithmsfor Multiple String Matching on GraphicProcessing Units / 2017
AZJVN7 / A DELAYED CONTAINER ORGANIZATION APPROACH TO IMPROVE RESTORE SPEED FOR DEDUPLICATION SYSTEMS / 2016
AZJVN8 / SUPPORTING SOFT REAL-TIME SPORADIC TASK SYSTEMS ON UNIFORM HETEROGENEOUS MULTIPROCESSORS WITH NO UTILIZATION LOSS / 2016
AZJVN9 / COST PERFORMANCE DRIVEN SERVICE MASHUP: A DEVELOPER PERSPECTIVE / 2016
AZJVN10 / ENHANCING COLLUSION RESILIENCE IN REPUTATION SYSTEMS / 2016
AZJVN11 / EFFICIENT FILE SEARCH IN DELAY TOLERANT NETWORKS WITH SOCIAL CONTENT AND CONTACT AWARENESS / 2016
AZJVN12 / JOINT WORKLOAD AND BATTERY SCHEDULING WITH HETEROGENEOUS SERVICE DELAY GUARANTEES FOR DATA CENTER ENERGY COST MINIMIZATION / 2015
AZJVN13 / NEIGHBOR DISCOVERY IN WIRELESS NETWORKS WITH MULTIPACKET RECEPTION / 2015
AZJVN14 / AN ENERGY-EFFICIENT AND DELAY-AWARE WIRELESS COMPUTING SYSTEM FOR INDUSTRIAL WIRELESS SENSOR NETWORK / 2015
AZJVN15 / MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING / 2015
AZJVN16 / A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS / 2014
AZJVN17 / LIGHTWEIGHT PRIVACY-PRESERVING AND SECURE COMMUNICATION PROTOCOL FOR HYBRID AD HOC WIRELESS NETWORKS / 2014
AZJVN18 / FAULT TOLERANCE MANAGEMENT IN CLOUD COMPUTING:
A SYSTEM-LEVEL PERSPECTIVE / 2013
AZJVN19 / RELAY SELECTION FOR GEOGRAPHICAL FORWARDING IN
SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS / 2013
AZJVN20 / A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING / 2012
AZJVN21 / RCDA: RECOVERABLE CONCEALED DATA AGGREGATION FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS / 2012
AZJVN22 / TOPOLOGY ENHANCEMENTS IN WIRELESS MULTIHOP NETWORKS: A TOP-DOWN APPROACH / 2012
AZJVN23 / SLEEP SCHEDULING FOR CRITICAL EVENT MONITORING IN WIRELESS SENSOR NETWORKS / 2012

TECHNOLOGY : JAVA

DOMAIN : IEEE TRANSACTIONS ON DATA MINING

CODE
NO / PROJECT TITLE / YEAR
AZJVD1 / USER VITALITY RANKING AND PREDICTION IN SOCIAL NETWORKING SERVICES: A DYNAMIC NETWORK PERSPECTIVE / 2017
AZJVD2 / SEARCHING TRAJECTORIES BY REGIONS OF INTEREST / 2017
AZJVD3 / ENHANCING BINARY CLASSIFICATION BY MODELING UNCERTAIN BOUNDARY IN THREE-WAY DECISIONS / 2017
AZJVD4 / CROWDSOURCED COVERAGE AS A SERVICE: TWO-LEVEL COMPOSITION OF SENSOR CLOUD SERVICES / 2017
AZJVD5 / ADAPTIVE ENSEMBLING OF SEMI-SUPERVISED CLUSTERING SOLUTIONS / 2017
AZJVD6 / LEARNING SOCIAL CIRCLES IN EGO-NETWORKS BASED ON MULTI-VIEW NETWORK STRUCTURE / 2017
AZJVD7 / EFFICIENT CLUE-BASED ROUTE SEARCH ON ROAD NETWORKS / 2017
AZJVD8 / MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS / 2017
AZJVD9 / TOWARD OPTIMAL FEATURE SELECTION IN NAÏVE BAYES FOR TEXT CATEGORIZATION / 2016
AZJVD10 / AUTOMATIC CLUSTERING VIA OUTWARD STATISTICAL TESTING ON DENSITY METRICS / 2016
AZJVD11 / MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS / 2016
AZJVD12 / RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA / 2016
AZJVD13 / A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS / 2016
AZJVD14 / A PRACTICAL AND EFFECTIVE SAMPLING SELECTION STRATEGY FOR LARGE SCALE DEDUPLICATION / 2015
AZJVD15 / CROWDOP: QUERY OPTIMIZATION FOR DECLARATIVE CROWDSOURCING SYSTEMS / 2015
AZJVD16 / PRACTICAL DATA PREDICTION FOR REAL-WORLD WIRELESS SENSOR NETWORKS / 2015
AZJVD17 / LARS: AN EFFICIENT AND SCALABLE LOCATION-AWARE RECOMMENDER SYSTEM / 2014
AZJVD18 / SECURE MINING OF ASSOCIATION RULES IN HORIZONTALLY DISTRIBUTED DATABASES / 2014
AZJVD19 / A METHODOLOGY FOR DIRECT AND INDIRECTDISCRIMINATION PREVENTION IN DATA MINING / 2013
AZJVD20 / DISTRIBUTED PROCESSING OF PROBABILISTIC TOP-K QUERIESIN WIRELESS SENSOR NETWORKS / 2013
AZJVD21 / A SYSTEM TO FILTER UNWANTED MESSAGES FROM OSNUSER WALLS / 2013

TECHNOLOGY : JAVA

DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING

CODE
NO / PROJECT TITLE / YEAR
AZJVM1 / AN ADAPTIVE BAYESIAN SYSTEM FOR CONTEXT-AWARE DATA FUSION IN SMART ENVIRONMENTS / 2017
AZJVM2 / TSRA: AN ADAPTIVE MECHANISM FOR SWITCHING BETWEEN COMMUNICATION MODES IN FULL-DUPLEX OPPORTUNISTIC SPECTRUM ACCESS SYSTEMS / 2017
AZJVM3 / AMD: AUDIT-BASED MISBEHAVIOR DETECTION IN WIRELESS AD HOC NETWORKS / 2016
AZJVM4 / MAXIMAL INDEPENDENT SETS IN HETEROGENEOUS WIRELESS AD HOC NETWORKS / 2016
AZJVM5 / RECEIVER-SIDE TCP COUNTERMEASURE TO BUFFERBLOAT IN WIRELESS ACCESS NETWORKS / 2016
AZJVM6 / GROUP-BASED NEIGHBOR DISCOVERY IN LOW-DUTY-CYCLE MOBILE SENSOR NETWORKS / 2016
AZJVM7 / EPLQ: EFFICIENT PRIVACY-PRESERVING LOCATION-BASED QUERY OVER OUTSOURCED ENCRYPTED DATA / 2016
AZJVM8 / COCOWA: A COLLABORATIVE CONTACT-BASED WATCHDOG FOR DETECTING SELFISH NODES / 2015
AZJVM9 / RING ROUTING: AN ENERGY-EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS WITH A MOBILE SINK / 2015
AZJVM10 / ENERGY-EFFICIENT BROADCAST IN MOBILE NETWORKS SUBJECT TO CHANNEL RANDOMNESS / 2015
AZJVM11 / PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS / 2015
AZJVM12 / TO STAY OR TO SWITCH: MULTIUSER MULTI-CHANNEL DYNAMIC ACCESS / 2015
AZJVM13 / COOPERATIVE LOAD BALANCING AND DYNAMIC CHANNEL ALLOCATION FOR CLUSTER-BASED MOBILE AD HOC NETWORKS / 2015
AZJVM14 / EFFICIENT PRIVACY-PRESERVING AUTHENTICATION IN WIRELESS MOBILE NETWORKS / 2014
AZJVM15 / A QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL FOR HYBRID WIRELESS NETWORKS / 2014
AZJVM16 / SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS / 2014
AZJVM17 / MODELING, EVALUATION AND DETECTION OF JAMMING ATTACKS IN TIME-CRITICAL WIRELESS APPLICATIONS / 2014
AZJVM18 / VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOCSENSOR NETWORKS / 2013

TECHNOLOGY : JAVA

DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY

CODE
NO / PROJECT TITLE / YEAR
AZJVNS1 / A NEW MULTIMODAL APPROACH FOR PASSWORD STRENGTH ESTIMATION-PART I: THEORY AND ALGORITHMS / 2017
AZJVNS2 / JAMMY: A DISTRIBUTED AND DYNAMIC SOLUTION TO SELECTIVE JAMMING ATTACK IN TDMA WSNS / 2017
AZJVNS3 / ENABLING SELF-HEALING SMART GRID THROUGH JAMMING RESILIENT LOCAL CONTROLLER SWITCHING / 2017
AZJVNS4 / A COMPREHENSIVE COMPARISON OF MULTIPARTY SECURE ADDITIONS WITH DIFFERENTIAL PRIVACY / 2017
AZJVNS5 / RESOURCE ALLOCATION FOR A MASSIVE MIMO RELAY AIDED SECURE COMMUNICATION / 2016
AZJVNS6 / SECRET COMMON RANDOMNESS FROM ROUTING METADATA IN AD HOC NETWORKS / 2016
AZJVNS7 / INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANALYTICS AND TWITTER METADATA / 2016
AZJVNS8 / WIRELESS COMMUNICATIONS UNDER BROADBAND REACTIVE JAMMING ATTACKS / 2016
AZJVNS9 / PROFILING ONLINE SOCIAL BEHAVIORS FOR COMPROMISED ACCOUNT DETECTION / 2016
AZJVNS10 / SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS / 2015
AZJVNS11 / A HYBRID SCHEME OF PUBLIC-KEY ENCRYPTION AND SOMEWHAT HOMOMORPHIC ENCRYPTION / 2015
AZJVNS12 / MARLIN: MITIGATING CODE REUSE ATTACKS USING CODE RANDOMIZATION / 2015
AZJVNS13 / TIME-DELAYED BROADCASTING FOR DEFEATING INSIDE JAMMERS / 2015
AZJVNS14 / A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS / 2015
AZJVNS15 / MIO: ENHANCING WIRELESS COMMUNICATIONS SECURITY THROUGH PHYSICAL LAYER MULTIPLE INTER-SYMBOL OBFUSCATION / 2015
AZJVNS16 / OPTIMAL PROBABILISTIC ENCRYPTION FOR SECURE DETECTION IN WIRELESS SENSOR NETWORKS / 2014
AZJVNS17 / A LIGHTWEIGHT ENCRYPTION SCHEME FOR NETWORK-CODED MOBILE ADHOC NETWORKS / 2014
AZJVNS18 / A SECURE PAYMENT SCHEME WITH LOW COMMUNICATIONAND PROCESSING OVERHEAD FOR MULTI HOP WIRELESSNETWORKS / 2013
AZJVNS19 / SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FORDISTRIBUTED COMPUTER NETWORKS / 2013

TECHNOLOGY : JAVA

DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING

CODE
NO / PROJECT TITLE / YEAR
AZJVC1 / A SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR EFFICIENT BIG SENSING DATA PROCESSING ON CLOUD / 2017
AZJVC2 / DYSCALE: A MAPREDUCE JOB SCHEDULER FOR HETEROGENEOUS MULTICORE PROCESSORS / 2017
AZJVC3 / SELF-ADJUSTING SLOT CONFIGURATIONS FOR HOMOGENEOUS AND HETEROGENEOUS HADOOP CLUSTERS / 2017
AZJVC4 / OPTIMIZING CLOUD-SERVICE PERFORMANCE: EFFICIENT RESOURCE PROVISIONING VIA OPTIMAL WORKLOAD ALLOCATION / 2017
AZJVC5 / CLAP: COMPONENT-LEVEL APPROXIMATE PROCESSING FOR LOW TAIL LATENCY AND HIGH RESULT ACCURACY IN CLOUD ONLINE SERVICES / 2017
AZJVC6 / ACSTOR: OPTIMIZING ACCESS PERFORMANCE OF VIRTUAL DISK IMAGES IN CLOUDS / 2017
AZJVC7 / DCLOUD: DEADLINE-AWARE RESOURCE ALLOCATION FOR CLOUD COMPUTING JOBS / 2016
AZJVC8 / EXPLOITING WORKLOAD CHARACTERISTICS AND SERVICE DIVERSITY TO IMPROVE THE AVAILABILITY OF CLOUD STORAGE SYSTEMS / 2016
AZJVC9 / DYNAMIC AND FAULT-TOLERANT CLUSTERING FOR SCIENTIFIC WORKFLOWS / 2016
AZJVC10 / AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD / 2016
AZJVC11 / AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING / 2016
AZJVC12 / A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION / 2015
AZJVC13 / ATTRIBUTE-BASED ENCRYPTION WITH EFFICIENT VERIFIABLE OUTSOURCED DECRYPTION / 2015
AZJVC14 / DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY / 2015
AZJVC15 / DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS / 2014
AZJVC16 / KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE / 2014
AZJVC17 / PRIVACY-PRESERVING OPTIMAL MEETING LOCATION DETERMINATION ON MOBILE DEVICES / 2014
AZJVC18 / A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECUREDATA FORWARDING / 2012
AZJVC19 / ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD / 2012

DOMAIN : BIG DATA

CODE
NO / PROJECT TITLE / YEAR
AZBD1 / SEEN: A SELECTIVE ENCRYPTION METHOD TO ENSURE CONFIDENTIALITY FOR BIG SENSING DATA STREAMS / 2017
AZBD2 / NPP: A NEW PRIVACY-AWARE PUBLIC AUDITING SCHEME FOR CLOUD DATA SHARING WITH GROUP USERS / 2017
AZBD3 / HETEROGENEOUS DATA STORAGE MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING / 2017
AZBD4 / PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING / 2017
AZBD5 / A PRE-AUTHENTICATION APPROACH TO PROXY RE-ENCRYPTION IN BIG DATA CONTEXT / 2017
AZBD6 / DATA TRANSFER SCHEDULING FOR MAXIMIZINGTHROUGHPUT OF BIG-DATA COMPUTINGIN CLOUD SYSTEMS / 2016
AZBD7 / DEDUPLICATION ON ENCRYPTED BIG DATA IN CLOUD / 2016
AZBD8 / DYNAMIC JOB ORDERING AND SLOT CONFIGURATIONSFOR MAPREDUCE WORKLOADS / 2016
AZBD9 / FIDOOP-DP: DATA PARTITIONING IN FREQUENT ITEMSETMINING ON HADOOP CLUSTERS / 2016
AZBD10 / HEALTH-CPS: HEALTHCARE CYBER-PHYSICAL SYSTEMASSISTED BY CLOUD AND BIG DATA / 2016
AZBD11 / ON TRAFFIC-AWARE PARTITION AND AGGREGATIONIN MAPREDUCE FOR BIG DATA APPLICATIONS / 2016
AZBD12 / I2MAPREDUCE: INCREMENTAL MAPREDUCE FOR MINING EVOLVING BIG DATA / 2015
AZBD13 / FASTRAQ: A FAST APPROACH TO RANGE-AGGREGATE QUERIES IN BIG DATA ENVIRONMENTS / 2015
AZBD14 / A SECURE CLOUD COMPUTING BASED FRAMEWORK FOR BIG DATA INFORMATION MANAGEMENT OF SMART GRID / 2015
AZBD15 / AN ITERATIVE MAP REDUCE BASED FREQUENT SUB GRAPH MINING ALGORITHM / 2015
AZBD16 / DATA MINING WITH BIG DATA / 2014

JAVA: Application Projects(Windows Application/Web Application)

S.NO / CODE / PROJECT TITLE
1 / AZJVA1 / MIDDLEWARE SERVICES FOR DYNAMIC CLUSTERING OF APPLICATION SERVERS
2 / AZJVA2 / SERIAL COMMUNICATION NETWORK SHARING
3 / AZJVA3 / ORDERING TRACKING SYSTEM
4 / AZJVA4 / NETWORK BROWSER IN JAVA
5 / AZJVA5 / VIRTUAL QUERY BUILDER
6 / AZJVA6 / STOCK MANAGEMENT CONTROL
7 / AZJVA7 / SECURE DISTRIBUTED BANKING
8 / AZJVA8 / ADHOC NETWORK USING LAR PROTOCOL
9 / AZJVA9 / SINGLE SOURCE SHORTEST PATH ALGORITHM
10 / AZJVA10 / WEB MINING
11 / AZJVA11 / JAVA WEB PORT FOR STORAGE SYSTEM
12 / AZJVA12 / ONLINE LENDING PROCESS
13 / AZJVA13 / COUNTRYWIDE LICENSE SCHEME
14 / AZJVA14 / CONSTRAINED NEAREST NEIGHBOUR QUERIES
15 / AZJVA15 / MAINTAING DATA PRIVACY IN ASSOCIATION RULE MINING
16 / AZJVA16 / EFFICIENT APPROXIMATE QUERY PROCESSING IN PEER-TO-PEER NETWORKS
17 / AZJVA17 / DYNAMIC SOFTWARE LOAD BALANCING
18 / AZJVA18 / FACE RECOGNITION
19 / AZJVA19 / ONLINE HANDWRITTEN SCRIPT RECOGNITION
20 / AZJVA20 / AN ACKNOWLEDGMENT BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR IN MANETS
21 / AZJVA21 / NETWORK TRAFFIC ANALYZER & CLUSTER CONTROL:
22 / AZJVA22 / DATA COMMUNICATION & AUTHENTICATION OVER INTRANET
23 / AZJVA23 / ONLINE SQL ENTERPRISE MANAGER
24 / AZJVA24 / DISTRIBUTED SERVER MAINTAING FOR THE UNIVERSITY MARK SYSTEM
25 / AZJVA25 / ONLINE BANKING SECURITY ANALYSIS
26 / AZJVA26 / INCORPORATED COLLEGE INFORMATION SYSTEM
27 / AZJVA27 / ONLINE PHARMACY MANAGEMENT SYSTEM
28 / AZJVA28 / ACCOMPLISHING ALTERNATIVE SERVER IN MOBILE NETWORK
29 / AZJVA29 / WEB CACHING AND PREFETCHING IN CLIENT-SIDE PROXIES
30 / AZJVA30 / MANAGEMENT INFORMATION SYSTEM
31 / AZJVA31 / WIRELESS TRAFFIC VIEWER
32 / AZJVA32 / PROVABLY SECURE THREE-PARTY AUTHENTICATED QUANTUM KEY DISTRIBUTION PROTOCOLS
33 / AZJVA33 / PROTECTED DATA TRANSMISSION
34 / AZJVA34 / PROACTIVE TREE RESCUEMENT
35 / AZJVA35 / ALLOTMENT OF WORK TIME
36 / AZJVA36 / RANDOMIZED PROTOCOLS FOR DUPLICATE ELIMINATION IN PEER-TO-PEER STORAGE SYSTEM
37 / AZJVA37 / A NEW TCP PERSISTENT PACKET RECORDING
38 / AZJVA38 / TIME MINIMIZATION IN FILE DOWNLOAD
39 / AZJVA39 / PROJECT MANAGEMENT SYSTEM
40 / AZJVA40 / LOAD DISTRIBUTION TO SERVERS
41 / AZJVA41 / ON SELFISH ROUTING IN INTERNET LIKE ENVIRONMENT
42 / AZJVA42 / WEB REPORT ORGANIZATION METHOD
43 / AZJVA43 / SELLING PRODUCTS THROUGH ONLINE WEB SHARING
44 / AZJVA44 / PHOTO SHARING
45 / AZJVA45 / A MEASUREMENT-BASED ANALYSIS OF MULTIHOMING
46 / AZJVA46 / ONLINE TENDER PROCESS
47 / AZJVA47 / ONLINE INSURANCE MANAGEMENT SYSTEM
48 / AZJVA48 / ONLINE JOB PORTAL MANAGEMENT SYSTEM
49 / AZJVA49 / BUISNESS MANAGEMENT SYSTEM
50 / AZJVA50 / ALUMINI ASSOCIATION
51 / AZJVA51 / ONLINE INSURANCE MANAGEMENT SYSTEM
52 / AZJVA52 / ONLINE JOB PORTAL MANAGEMENT SYSTEM
53 / AZJVA53 / HYPOTHETICAL DESCRIPTION OF A COMPLEX ENTITY FOR XML FRAMEWORK
54 / AZJVA54 / ANALYSIS FOR DETECTION OF WEB APPLICATION VULNERABILITES
55 / AZJVA55 / TO REDUCE EFFORT FOR TRACKING AND COORDINATION OF PROJECTS
56 / AZJVA56 / BANKING PROCESS USING MOBILE
57 / AZJVA57 / A SPECIFICATION-BASED INTRUSION DETECTION SYSTEM TO AODV
58 / AZJVA58 / NETWORK FORENSICS USING HONEYNETS
59 / AZJVA59 / MOBILE COMMUNICATION THROUGH WAP GATEWAY
60 / AZJVA60 / MOBILE TRAFFIC MANAGEMENT OF WIRELESS SENSOR NETWORK
61 / AZJVA61 / ONLINE FILE MANAGEMENT SYSTEM
62 / AZJVA62 / DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS FOR DYNAMIC PEER GROUPS
63 / AZJVA63 / AN ADAPTIVE PROGRAMMING MODEL FOR FAULT-TOLERANT DISTRIBUTED COMPUTING
64 / AZJVA64 / ALUMINI ASSOCIATION
65 / AZJVA65 / BANKING PROCESS USING MOBILE
66 / AZJVA66 / WEB REPORT ORGANIZATION METHOD
67 / AZJVA67 / JAVA WEB PORT FOR STORAGE SYSTEM
68 / AZJVA68 / ONLINE LENDING PROCESS
69 / AZJVA69 / VIRTUAL RING NETWORK USING TCP-RING PROTOCOL
70 / AZJVA70 / IMPLEMENTING SIP FOR MOBILE APPLICATION & SUPER NETWORKING
71 / AZJVA71 / PERSONAL AUTHENTICATION USING 3-D FINGER GEOMETRY
72 / AZJVA72 / ASSET MANAGEMENT SYSTEM ( HOSPITALS ECG)
73 / AZJVA73 / EMPLOYEE PERFORMANCE AND REWARDING
74 / AZJVA74 / LOGISTICS AUTOMATION SYSTEM
75 / AZJVA75 / TRUST MANAGEMENT
76 / AZJVA76 / CLINICAL LABORATORY MANAGEMENT SYSTEM
77 / AZJVA77 / TRAVEL AND TOURISM MANAGEMENT
78 / AZJVA78 / WEB BASED MEETING SCHEDULER
79 / AZJVA79 / A WEB BASED DOCTOR APPOINTMENT FIXING
80 / AZJVA80 / ONLINE HOME REMEDY
81 / AZJVA81 / TECHNO TASK
82 / AZJVA82 / ONLINE PASSPORT REGISTRATRATION
83 / AZJVA83 / EVENT MANAGEMENT SYSTEM
84 / AZJVA84 / VIRTUAL JOB PORTAL
85 / AZJVA85 / TIME SHEET AUTOMATION

DOTNET

TECHNOLOGY : DOTNET

DOMAIN : IEEE TRANSACTIONS ON NETWORKING

CODE
NO / PROJECT TITLE / YEAR
AZDN1 / SWEET: SERVING THE WEB BY EXPLOITING EMAIL TUNNELS / 2017
AZDN2 / AN EFFICIENT CLOUD MARKET MECHANISM FOR COMPUTING JOBS WITH SOFT DEADLINES / 2017
AZDN3 / BINARY-TREE BASED ESTIMATION OF FILE REQUESTS FOR EFFICIENT DATA REPLICATION / 2017
AZDN4 / OPTIMAL TASK DISPATCHING ON MULTIPLE HETEROGENEOUS MULTI SERVER SYSTEMS WITH DYNAMIC SPEED AND POWER MANAGEMENT / 2017
AZDN5 / EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS / 2017
AZDN6 / COLLABORATIVE AUTHENTICATION IN DECENTRALIZED DENSE MOBILE NETWORKS WITH KEY REDISTRIBUTION / 2017
AZDN7 / CONTENT-AWARE CONCURRENT MULTIPATH TRANSFERFOR HIGH-DEFINITION VIDEO STREAMING OVERHETEROGENEOUS WIRELESS NETWORKS / 2016
AZDN8 / DISCHARGING THE NETWORK FROM ITS FLOW CONTROLHEADACHES: PACKET DROPS AND HOL BLOCKING / 2016
AZDN9 / SIMULTANEOUSLY GENERATING SECRET AND PRIVATE KEYS
IN A COOPERATIVE PAIRWISE-INDEPENDENT NETWORK / 2016
AZDN10 / THROUGHPUT AND DELAY IN HETEROGENEOUS COGNITIVE RADIO NETWORKS WITH COOPERATIVE SECONDARY USERS / 2015
AZDN11 / MAXIMIZING NETWORK TOPOLOGY LIFETIME USING MOBILE NODE ROTATION / 2015
AZDN12 / INCENTIVE-DRIVEN AND FRESHNESS-AWARE CONTENT DISSEMINATION IN SELFISH OPPORTUNISTIC MOBILE NETWORKS / 2015
AZDN13 / AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS / 2015
AZDN14 / A DISTRIBUTED FAULT-TOLERANT TOPOLOGYCONTROL ALGORITHM FOR HETEROGENEOUS
WIRELESS SENSOR NETWORKS / 2015
AZDN15 / AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLELNETWORK FILE SYSTEMS / 2015
AZDN16 / SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS / 2014
AZDN17 / DYNAMIC AUTHENTICATION WITH SENSORYINFORMATION FOR THE ACCESS CONTROL SYSTEMS / 2014
AZDN18 / PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM / 2014
AZDN19 / DYNAMIC TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKS AND ITS APPLICATION TO SECURE ROUTING / 2014
AZDN20 / RELIABLE BULK-DATA DISSEMINATION IN DELAY TOLERANT NETWORKS / 2014
AZDN21 / NETWORK CODING AWARE COOPERATIVE MACPROTOCOL FOR WIRELESS AD HOC NETWORKS / 2014
AZDN22 / LIGHTWEIGHT PRIVACY-PRESERVING AND SECURECOMMUNICATION PROTOCOL FOR HYBRID AD HOC WIRELESS NETWORKS / 2014
AZDN23 / ROBUST COLLABORATIVE SPECTRUM SENSING SCHEMES FOR COGNITIVE RADIO NETWORKS / 2014
AZDN24 / DISTORTION-AWARE SCALABLE VIDEO STREAMINGTO MULTINETWORK CLIENTS / 2013
AZDN25 / A DISTRIBUTED CONTROL LAW FOR LOAD BALANCINGIN CONTENT DELIVERY NETWORKS / 2013
AZDN26 / A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FORWIRELESS SENSOR NETWORKS / 2013
AZDN27 / AN EFFICIENT AND ROBUST ADDRESSING PROTOCOL FOR NODEAUTO CONFIGURATION IN AD HOC NETWORKS / 2013

TECHNOLOGY : DOTNET

DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY

CODE
NO / PROJECT TITLE / YEAR
AZDNS1 / EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS / 2017
AZDNS2 / NDIVIDUAL DIFFERENTIAL PRIVACY: A UTILITY-PRESERVING FORMULATION OF DIFFERENTIAL PRIVACY GUARANTEES / 2017
AZDNS3 / NETSPAM: A NETWORK-BASED SPAM DETECTION FRAMEWORK FOR REVIEWS IN ONLINE SOCIAL MEDIA / 2017
AZDNS4 / COLLABORATIVE AUTHENTICATION IN DECENTRALIZED DENSE MOBILE NETWORKS WITH KEY REDISTRIBUTION / 2017
AZDNS5 / PRIVACY-GUARANTEED TWO-AGENT INTERACTIONS USING INFORMATION-THEORETIC MECHANISMS / 2017
AZDNS6 / A CROSS TENANT ACCESS CONTROL (CTAC) MODEL FOR CLOUD COMPUTING: FORMAL SPECIFICATION AND VERIFICATION / 2017
AZDNS7 / STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE / 2017
AZDNS8 / A PRACTICAL SYSTEM FOR PUBLIC-AWARE TARGETED MOBILE ADVERTISING SERVICES / 2017
AZDNS9 / MINING DEFICIENCIES OF ONLINE REPUTATION SYSTEMS: METHODOLOGIES, EXPERIMENTS AND IMPLICATIONS / 2017
AZDNS10 / AUTHENTICATED KEY EXCHANGE PROTOCOLSFOR PARALLEL NETWORK FILE SYSTEMS / 2016
AZDNS11 / A SECURE ANTI-COLLUSION DATA SHARING SCHEMEFOR DYNAMIC GROUPS IN THE CLOUD / 2016
AZDNS12 / TMACS: A ROBUST AND VERIFIABLE THRESHOLDMULTI-AUTHORITY ACCESS CONTROL SYSTEMIN PUBLIC CLOUD STORAGE / 2016
AZDNS13 / EFFICIENT AND ANONYMOUS MOBILE USER AUTHENTICATION PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR MULTI-SERVER ARCHITECTURES / 2016
AZDNS14 / GROUP SECRET KEY GENERATION IN WIRELESS NETWORKS: ALGORITHMS AND RATE OPTIMIZATION / 2016
AZDNS15 / CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES / 2015
AZDNS16 / COST-AWARE SECURE ROUTING (CASER) PROTOCOL DESIGN FOR WIRELESS SENSOR NETWORKS / 2015
AZDNS17 / A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION / 2015
AZDNS18 / DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS / 2015
AZDNS19 / SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS / 2015
AZDNS20 / CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES / 2015
AZDNS21 / PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE / 2015
AZDNS22 / ANONYMOUS TWO-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT / 2015
AZDNS23 / CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS / 2014
AZDNS24 / SECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH ACTIVE ATTACKERS / 2014
AZDNS25 / KEY MANAGEMENT FOR STATIC WIRELESS SENSOR NETWORKS WITH NODE ADDING / 2014
AZDNS26 / SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS / 2014
AZDNS27 / SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS: FILTERING OUT THE ATTACKER’S IMPACT / 2014
AZDNS28 / DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS / 2014
AZDNS29 / A PROBABILISTIC MISBEHAVIOR DETECTION SCHEMETOWARD EFFICIENT TRUST ESTABLISHMENTIN DELAY-TOLERANT NETWORKS / 2014
AZDNS30 / ENFORCING SECURE AND PRIVACY-PRESERVING INFORMATION
BROKERING IN DISTRIBUTED INFORMATION SHARING / 2013
AZDNS31 / SORT: A SELF-ORGANIZING TRUST MODELFOR PEER-TO-PEER SYSTEMS / 2013
AZDNS32 / NETWORK CODING AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS / 2013
AZDNS33 / A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS / 2013
AZDNS34 / FINGERPRINT COMBINATION FOR PRIVACY PROTECTION / 2013
AZDNS35 / SPOC: A SECURE AND PRIVACY-PRESERVING OPPORTUNISTICCOMPUTING FRAMEWORK FOR MOBILE-HEALTHCAREEMERGENCY / 2013
AZDNS36 / PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS / 2012
AZDNS37 / MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN MULTIPARTY APPLICATIONS IN THE PRESENCE OF CLOCK DRIFTS / 2012
AZDNS38 / OPASS: A USER AUTHENTICATION PROTOCOL RESISTANT TO PASSWORD STEALING AND PASSWORD REUSE ATTACKS / 2012
AZDNS39 / PERSUASIVE CUED CLICK-POINTS: DESIGN, IMPLEMENTATION, AND EVALUATION OF AKNOWLEDGE-BASED AUTHENTICATIONMECHANISM / 2012

TECHNOLOGY : DOTNET