0% found this document useful (0 votes)
17 views2 pages

S.N o Title: Bihavoroal Model

This document contains a list of 27 projects with their titles, programming languages, and statuses. The projects cover a wide range of topics related to cloud computing, wireless networks, security, data mining, and more. The statuses indicate that most projects are complete, but a few are still in progress at 50-70% completion. Languages used include Java, Android, and one is listed as "ANDRIOD". The document provides a high-level overview of the various projects and their development progress.

Uploaded by

RajeshYosuva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

S.N o Title: Bihavoroal Model

This document contains a list of 27 projects with their titles, programming languages, and statuses. The projects cover a wide range of topics related to cloud computing, wireless networks, security, data mining, and more. The statuses indicate that most projects are complete, but a few are still in progress at 50-70% completion. Languages used include Java, Android, and one is listed as "ANDRIOD". The document provides a high-level overview of the various projects and their development progress.

Uploaded by

RajeshYosuva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

S.

n
o
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21

Title
attribute based encryption
Time Synchronization Based on Slow-Flooding in
Wireless Sensor Networks
Affective and content Analysis of analysis of online
Depression communities
Verifying Keys through Publicity and Communities
of Trust: Quantifying Off-Axis Corroboration
Product aspect ranking and applications
Enhanced Live Migration of Virtual Machine Using
Comparison of Modified and Unmodified Pages
Effective Approach towards intrusion detection
system using datamining techniques
Multi objective game theoretic scheduling of bag of
tasks workflows on hybrid clouds
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
Robust Hybrid precoding for multiuser MIMO
wireless communication sem
A Hybrid Cloud Approach for Secure Authorized
Deduplication
Automatic Test Packet Generation
Delay Power Rate Distortion model for wireless
video communication under delay and energy
constraints
Photo Album Compression for cloud storage using
local features
Exploiting Dynamic Resource Allocation for
Service Replication Strategies with MapReduce in
Clouds
fast clustaring
Efficient authentication for mobile and prevasive
computing
psr:light
Information hiding video
On the Security of Trustee-Based Social Authentications.

24

PROFILR: Toward Preserving Privacy and


Functionality in Geosocial Networks
bihavoroal model
Split and aggregated transmission control protocol
(SA-TCP) for smart power grid

25

CHILD PROTECTION SYSTEM

26

FOOD COURT
privacy preserving and content protecting location
based queries

22
23

27

Lang

status

java

completed

java

completed
50%
completed

java
java
java
java

jerome
jerome
90%
completed

java

completed

java

completed

java

completed

java

completed

java
java

completed
completed

java

jerome

java
java

krishna
completed

java
java
ANDR
OID
java
java
java

completed
completed

java
java

70%
completed

java
ANDR
OID
ANDR
OID

completed

java

jerome

jerome
completed
jerome
jerome

completed
grace

You might also like