Pulimoodu, Trivandrum - 01

Trinity Technologies is renowned for its quality Computer Training services. We deal with .Net Training, CCNP Certification Training, CCSP Certification Training, C/C++ Training, CCNA Certification Training, CCVP Certification Training, CHFI (Computer Hacking Forensic Investigation) Training, Java/J2EE Training, MCITP Certification Training, MCSA Certification Training, MCSE Certification Training, N+ Certification Training, PHP & MySQL Training, RHCE Certification Training, RHCA Training, RHCE Certification Training and VB Script Training. We address your needs with utmost care and ensure your satisfaction in whatever we do. Give us an opportunity to serve you. We will gift you with a pleasant experience. Contact us now.

2nd Floor, Radheyam Tower
Pulimoodu Junction
Statue, Thiruvananthapuram
Kerala, 695001.
0471-6454555, +919447387064, +919847003556
If you need any Project support or Abstract / Base paper fill up the following form. our representative will contact you soon.

For Project Abstract and Base paper
Contact Number


# Title Abstract Basepaper
1 Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
2 A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
3 Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
4 Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
5 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
6 Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
7 Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
8 Diversifying Web Service Recommendation Results via Exploring Service Usage History
9 A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
10 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
11 Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
12 A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
13 Interactive Streaming of Sequences of High Resolution JPEG2000 Images
14 Cross-Domain Feature Learning in Multimedia
15 A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
16 Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
17 Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
18 EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
19 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
20 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
21 Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
22 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
23 Authenticated Key Exchange Protocols for Parallel Network File Systems
24 Data Collection in Multi-Application Sharing Wireless Sensor Networks
25 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
26 Friendbook: A Semantic-based Friend Recommendation System for Social Networks
27 Optimum Power Allocation in Sensor Networks for Active Radar Applications
28 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
29 Context-based Diversification for Keyword Queries over XML Data
30 Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
31 Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
32 Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
33 Tweet Segmentation and Its Application to Named Entity Recognition
34 Rank-Based Similarity Search: Reducing the Dimensional Dependence
35 Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
36 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
37 Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
38 Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
39 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
40 Discovering Latent Semantics in Web Documents using Fuzzy Clustering
41 On the Security of data access control for multiauthority cloud storage system
42 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
43 Quantitative Reasoning About Cloud Security Using Service Level Agreements
44 Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
45 Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
46 MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
47 Towards reproducibility in online social network Research
48 Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
49 Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
50 Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
51 CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
52 The Impact of View Histories on Edit Recommendations
53 Auditing for Distributed Storage Systems
54 FRAppE: Detecting Malicious Facebook Applications
55 Uploader Intent for Online Video: Typology, Inference and Applications
56 YouTube Video Promotion by Cross-network
57 Semantic-Improved Color Imaging Applications: It Is All About Context
58 Geolocalized Modeling for Dish Recognition
59 Learning to Rank Image Tags with Limited Training Examples
60 Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
61 Tracking Temporal Community Strength in Dynamic Networks
62 Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
63 Towards Information Diffusion in Mobile Social Networks
64 User-Defined Privacy Grid System for Continuous Location-Based Services
65 An Efficient Privacy-Preserving Ranked Keyword Search Method
66 Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
67 Dispersing Instant Social Video Service Across Multiple Clouds
68 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
69 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
70 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
71 Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
72 Providing User Security Guarantees in Public Infrastructure Clouds
73 Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
74 Text Mining the Contributors to Rail Accidents
75 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
76 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
77 Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
78 Cloud workflow scheduling with deadlines and time slot availability
79 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
80 Keylogging-resistant Visual Authentication Protocols
81 A Hybrid Cloud Approach for Secure Authorized Deduplication
82 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
83 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
84 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
85 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
86 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
87 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
88 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
89 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
90 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
91 Enabling Cloud Storage Auditing With Key-Exposure Resistance
92 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
93 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
94 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
95 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
96 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
97 Secure Auditing and Deduplicating Data in Cloud
98 Stealthy Denial of Service Strategy in Cloud Computing
99 Best Keyword Cover Search
100 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
101 Discovery of Ranking Fraud for Mobile Apps
102 Malware Propagation in Large-Scale Networks
103 On Summarization and Timeline Generation for Evolutionary Tweet Streams
104 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
105 Progressive Duplicate Detection
106 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
107 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
108 Scalable Constrained Spectral Clustering
109 Towards Effective Bug Triage with Software Data Reduction Techniques
110 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
111 A Proximity-Aware Interest-Clustered P2P File Sharing System
112 Detecting Malicious Facebook Applications
113 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
114 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
115 User-Defined Privacy Grid System for Continuous Location-Based Services
116 A Computational Dynamic Trust Model for User Authorization
117 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
118 Continuous and Transparent User Identity Verification for Secure Internet Services
119 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertext
120 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
121 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
122 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
123 Secure Spatial Top-k Query Processing via Untrusted LocationBased Service Providers
124 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
125 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
126 Secure Distributed Deduplication Systems with Improved Reliability
127 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
128 Effective Key Management in Dynamic Wireless Sensor Networks
129 Key Updating for Leakage Resiliency with Application to AES Modes of Operation
130 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
131 Software Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks
132 An Attribute-Assisted Reranking Model for Web Image Search
133 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
# Title Abstract
1 Apartment and Builders
3 Cure N Care
4 E-Tripfixers
5 College Recruitment System
6 Student Management & Tracking System
7 E-Vehicle
8 Secure Crime Reporting Tool
9 Railway Rute Optimization System
10 Spare Wheels
11 Chat room
12 College Voting
13 Public Utility Cell
14 Asraya
15 E-Shopping
16 Multi Domain Shop World
17 Traffic Route Monitoring

© 2016. All Rights Reserved | Design by Trinity Technologies