Computer Science
Pivotalsoft is the NO.1 Core Java training institute offering the best Core
Java training in Visakhapatnam,
expert guidance and 100% placement assistance.
Are you seeking a job as Software Engineer? Are you an IT professional longing
for a career change to Java?
Are you a Application Developer looking to acquire the best Java project
support?
Are you a team looking for the best Core Java classroom training,
online training and real-time hands-on training on Core Java?
Are you looking for a fast track Core Java course?
Are you willing to do one on one Core Java training in Visakhapatnam? Are you
keen to undergo live online training on Core Java?
Are you a college student interested to learn basics of Java? Do you need Java
project support on the job?
If any of these above questions is hitting your mind, Don't worry...We are
here to help you with Core Java course.
From the day 1 until the course completion, Pivotalsoft and our well qualified
Java Developers,
tutors will provide you the unique, supportive and convenient learning
environment. So,
you can make use of this golden opportunity to learn a technology from the
scratch until advanced programming
Computer Science Projects
CLOUD COMPUTING
Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software.Cloud computing is a popular option for people and businesses for a number of reasons including cost savings, increased productivity, speed and efficiency, performance, and security.Cloud computing takes all the heavy lifting involved in crunching and processing data away from the device you carry around or sit and work at. It also moves all of that work to huge computer clusters far away in cyberspace.
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | Fog Computing as a Complementary Approach to Cloud Computing. | Download | Download | |
2. | SLA-Based Agile VM Management in Cloud & Datacenter | Download | Download | |
3. | Efficient Task Scheduling for Applications on Clouds | Download | Download | |
4. | A Simple and Secured Cryptography System of Cloud Computing | Download | Download | |
5. | A Novel Predictive Resource Allocation Framework for Cloud Computing | Download | Download | |
6. | Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage | Download | Download | |
7. | Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN and Priority | Download | Download | |
8. | A Hierarchical Receding Horizon Algorithm for QoS-driven control of Multi-IaaS Applications. | Download | Download | |
9. | Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data | Download | Download | |
10. | Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data | Download | Download | |
11. | Karma: Cost-effective Geo-replicated Cloud Storage with Dynamic Enforcement of Causal Consistency | Download | Download | |
12. | RIAL: Resource Intensity Aware Load Balancing in Clouds | Download | Download | |
13. | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | Download | Download | |
14. | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. | Download | Download | |
15. | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | Download | Download | |
16. | Provable Multicopy Dynamic Data Possession in Cloud Computing Systems. | Download | Download | |
17. | Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds | Download | Download | |
18. | PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System. | Download | Download | |
19. | Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation | Download | Download | |
20. | Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage. | Download | Download | |
21. | A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud | Download | Download | |
22. | CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring | Download | Download | |
23. | QoS Ranking Prediction for Cloud Services | Download | Download | |
24. | A Load Balancing Model Based on Cloud Partitioning for the Public Cloud | Download | Download | |
25. | Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption | Download | Download |
DATAMINING
Data mining is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research. Data mining involves effective data collection and warehousing as well as computer processing. For segmenting the data and evaluating the probability of future events, data mining uses sophisticated mathematical algorithms. Data mining is also known as Knowledge Discovery in Data.
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | Big Data Analytics and Mining for Effective Visualization and Trends Forecasting of Crime Data. | Download | Download | |
2. | Medical Data Stream Distribution Pattern Association Rule Mining Algorithm Based on Density Estimation | Download | Download | |
3. | Data-Pattern Enabled Self-Recovery Low-Power Storage System for Big Video Data | Download | Download | |
4. | A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With IoT | Download | Download | |
5. | Frequent Pattern Mining on Time and Location Aware Air Quality Data | Download | Download | |
6. | Untangling Blockchain: A Data Processing View of Blockchain Systems | Download | Download | |
7. | Correlated Matrix Factorization for Recommendation with Implicit Feedback | Download | Download | |
8. | Collaborative Filtering Algorithm Based on Rating Difference and User Interest | Download | Download | |
9. | A Framework for Real-Time Spam Detection in Twitter | Download | Download | |
10. | NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media | Download | Download | |
11. | Heterogeneous Information Network Embedding for Recommendation | Download | Download | |
12. | Harnessing Multi-source Data about Public Sentiments and Activities for Informed Design | Download | Download | |
13. | FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data | Download | Download | |
14. | An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques | Download | Download | |
15. | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | Download | Download | |
16. | Analysis of users' behaviour in structured e-commerce websites. | Download | Download | |
17. | Location Aware Keyword Query Suggestion Based on Document Proximity | Download | Download | |
18. | Top-Down XML Keyword Query Processing. | Download | Download | |
19. | Nearest Keyword Set Search in Multi-Dimensional Datasets | Download | Download | |
20. | DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud. | Download | Download | |
21. | A Novel Recommendation Model Regularized with User Trust and Item Ratings | Download | Download | |
22. | Resolving Multi-Party Privacy Conflicts in Social Media | Download | Download |
NETWORKING & NETWORK SECURITY
Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
Network security typically consists of three different controls: physical, technical and administrative. Here is a brief description of the different types of network security and how each control works.
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning. | Download | Download | |
2. | Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning | Download | Download | |
3. | Hierarchical Edge Cloud Enabling Network Slicing for 5G Optical Fronthaul | Download | Download | |
4. | Information Network Risk Assessment Based on AHP and Neural Network | Download | Download | |
5. | Mining network stream data for self learning networks | Download | Download | |
6. | A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks | Download | Download | |
7. | ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN | Download | Download | |
8. | A Stable Approach for Routing Queries in Unstructured P2P Networks | Download | Download | |
9. | Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks | Download | Download | |
10. | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | Download | Download | |
11. | Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks | Download | Download | |
12. | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | Download | Download | |
13. | Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design | Download | Download |
BIG DATA
Big Data is a collection of data that is huge in volume, yet growing exponentially with time. It is a data with so large size and complexity that none of traditional data management tools can store it or process it efficiently. Big data is also a data but with huge size.
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | Big Data Quality Framework: Pre-Processing Data in Weather Monitoring Application. | Download | Download | |
2. | Stocks Analysis and Prediction Using Big Data Analytics | Download | Download | |
3. | A Probability based Model for Big Data Security in Smart City | Download | Download | |
4. | Adaptive Learning Model and Implementation Based on Big Data | Download | Download | |
5. | Accurate marking method of network attacking information based on big data analysis | Download | Download | |
6. | Cloud Centric Authentication for Wearable Healthcare Monitoring System | Download | Download | |
7. | Logic Bug Detection and Localization Using Symbolic Quick Error Detection | Download | Download | |
8. | Map Reduce Programming Model for Parallel K-Mediod Algorithm on Hadoop Cluster | Download | Download | |
9. | Research on Reliability Evaluation of Big Data System | Download | Download | |
10. | Smart Governance through Bigdata: Digital Transformation of Public Agencies | Download | Download | |
11. | Online Data Deduplication for In-Memory Big-Data Analytic Systems | Download | Download | |
12. | Big Data Set Privacy Preserving through Sensitive Attribute-based Grouping | Download | Download | |
13. | Designing Self-Tuning Split-Map-Merge Applications for High Cost-Efficiency in the Cloud | Download | Download | |
14. | H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jobs | Download | Download | |
15. | A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment | Download | Download | |
16. | A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud | Download | Download | |
17. | Data Mining with Big Data | Download | Download | |
18. | A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud | Download | Download |
MOBILE COMPUTING
Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage, which allows for the transmission of data, voice, and video. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | Advanced Query Processing and its Optimization for Mobile Computing Environment. | Download | Download | |
2. | Mobile Privacy Protection Enhanced with Multi-access Edge Computing | Download | Download | |
3. | Energy Consumption in Hand-Held Mobile Communication Devices: A Comparative Study | Download | Download | |
4. | Hotspot-based Resource Sharing System for Mobile Ad hoc Networks | Download | Download | |
5. | Effect of Queueing Delay and Service Discrimination on Offloading Performance in Two-Class Mobile Edge Computing Systems | Download | Download | |
6. | Wormhole Attack Detection Algorithms in Wireless Network Coding Systems | Download | Download | |
7. | User-Defined Privacy Grid System for Continuous Location-Based Services | Download | Download | |
8. | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Download | Download |
SECURE COMPUTING
Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.The field is becoming more significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | Privacy Protection for Wireless Medical Sensor Data. | Download | Download | |
2. | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | Download | Download | |
3. | Data Lineage in Malicious Environments | Download | Download | |
4. | A Computational Dynamic Trust Model for User Authorization | Download | Download | |
5. | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | Download | Download | |
6. | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers | Download | Download |
DOT NET
.Net is a deprecated software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large class library called Framework Class Library (FCL) and provides language interoperability (each language can use code written in other languages) across several programming languages..NET development to more closely follow a contemporary model of a community-developed software project, including issuing an update to its patent promising to address the concerns..
Sno |
Projects List |
Abstract |
Base Paper |
|
1. | Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks | Download | Download | |
2. | Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks | Download | Download | |
3. | Network Traffic Classification Using Correlation Information | Download | Download | |
4. | A Data Fusion Technique for Wireless Ranging Performance Improvement | Download | Download | |
5. | EAACK—A Secure Intrusion-Detection System for MANETs | Download | Download | |
6. | A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks | Download | Download | |
7. | Efficient Algorithms for Neighbor Discovery in Wireless Networks | Download | Download | |
8. | FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems | Download | Download | |
9. | Measu-Routing: A Framework for Routing Assisted Traffic Monitoring | Download | Download | |
10. | Measuring Multipath Routing in the Internet IEEE | Download | Download | |
11. | Design and implementation of TARF: a trust aware routing framework for wsns | Download | Download | |
12. | An Authentication Code Against Pollution Attacks in Network Coding | Download | Download | |
13. | AMPLE: An adaptive traffic engineering system based on virtual routing topologies | Download | Download | |
14. | Providing end to end secure communications in wireless sensor networks. | Download | Download | |
15. | Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks. | Download | Download | |
16. | Jamming-Aware Traffic Allocation for Multiple- Path Routing Using Portfolio Selection. | Download | Download | |
17. | Dynamic query forms for database queries | Download | Download | |
18. | Automatic extraction of top-k lists from the web. | Download | Download | |
19. | Sampling online social network | Download | Download | |
20. | Secure Mining of Association Rules in Horizontally Distributed Databases. | Download | Download | |
21. | SUSIE Search using services and information extraction | Download | Download | |
22. | Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis | Download | Download | |
23. | Scalable Learning of Collective behavior | Download | Download | |
24. | Data leakage detection. | Download | Download | |
25. | A Survey of Indexing Techniques for Scalable Record Linkage and De duplication | Download | Download | |
26. | Organizing user search histories. | Download | Download | |
27. | One Size Does Not Fit All: Towards User-and Query-Dependent Ranking For Web Databases | Download | Download | |
28. | Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes | Download | Download |