Top Banner
Iris Solutions #73/1, 3 rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail: [email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem IEEE PRJECT TITLE BOOK 2013-14
48

IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Oct 28, 2015

Download

Documents

jock1403

IEEE PROJECT TITLES IN NETWORKING, IEEE PROJECT TITLES IN NETWORK SECURITY, IEEE PROJECT TITLES IN CLOUD COMPUTING, IEEE PROJECT TITLES IN GRID COMPUTING, IEEE PROJECT TITLES IN MOBILE COMPUTING, IEEE PROJECT TITLES IN DATA MINING, IEEE PROJECT TITLES IN NS2, IEEE 2013 PROJECT TITLES IN JAVA, IEEE 2013 PROJECT TITLES IN DOTNET, IEEE PROJECT 2013 TITLES IN ANDROID,
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

IEEE PRJECT TITLE BOOK2013-14

Page 2: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

JAVATECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON NETWORKING

SNO P.CODE TITLES DESCRIPTION YEAR

1 ISJNW01 An Error MinimizingFramework for LocalizingJammers in WirelessNetworks

in this paper, we aim to design aframework that can localize oneOr multiple jammers with a highaccuracy. Most of existing jammer-localization schemes utilize indirectmeasurements (e.g.,hearing ranges)affected by jamming attacks, whichmakes it difficult to localize jammersaccurately

2013

2 ISJNW02 Incentive-Driven and Privacy-Preserving MessageDissemination in Large ScaleMobile Networks

In this paper, we propose a new typeof incentive-driven and privacy-preserving systems for large scalemessage dissemination in mobilenetworks. To distribute incentiveswhich encourage forwardingbehaviors, such as monetary rewards,we want to keep track of the forwarderlist.

2013

3 ISJNW03 Understanding Multi-TaskSchedulability in Duty-Cycling Sensor Networks

Here, We investigate a fundamentalscheduling problem of both theoreticaland practical importance,called multi-task schedulabilityproblem, i.e., given multiple dataforwarding tasks, to determine themaximum number of tasks thatcan be scheduled within theirdeadlines and work out such aschedule. We

2013

Page 3: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

4 ISJNW04 Cluster-Based CertificateRevocation with VindicationCapability for Mobile Ad HocNetworks

In this paper, we focus on the issue ofcertificate revocation to isolateattackers from further participating innetwork activities. For quick andaccurate certificate revocation, wepropose the Cluster-based CertificateRevocation With VindicationCapability (CCRVC) scheme.

2013

5 ISJNW05 Enabling Efficient WiFi-Based Vehicular ContentDistribution

In this paper, we introduceCooperative Content DistributionSystem for Vehicles (CCDSV) whichoperates upon a network ofinfrastructure APs to collaborativelydistribute contents tomoving vehicles.

2013

6 ISJNW06 Balancing the Trade-Offsbetween query Delay and dataavailability in MANETs

In This Project, we propose schemestoBalance the trade –offs between dataavailability and query delay underdifferent system settings andrequirements. Mobile nodes in onepartition are not able to access datahosted by nodes in other partitions,and hence significantly degrade theperformance of data access. To dealwith this problem, we apply datareplication techniques.

2013

7 ISJNW07 Rake: Semantics AssistedNetwork-Based TracingFramework

The ability to trace request executionpaths is critical for diagnosingperformance faults in large-scaledistributed systems. Previous black-box and white-box approaches areeither inaccurate or invasive. Wepresent a novel semantics-assistedgray-box tracing approach, calledRake, which can accurately traceindividual request by observingnetwork traffic.

2013

Page 4: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

8 ISJNW08 MeasuRouting:A FrameworkFor Routing Assisted TrafficMonitoring.

In this paper we present a theoreticalframework for Misrouting.Furthermore, as proofs-of-concept, wepresent synthetic and praticalmonitoring applications to showcasethe utility enhancement achieved withMeasuRouting.

2012

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY

SNO P.CODE TITLES DESCRIPTION YEAR

8 ISJNS01 SORT: A Self-Organizing TrustModel for Peer-to-Peer Systems

This paper presents distributedalgorithms that enable a peer to reasonabout trustworthiness of Other peersbased on past interactions andrecommendations. Peers create theirown trust network in their proximity byusing local Information available and donot try to learn global trust information.

2013

9 ISJNS02 Unprivileged Black-BoxDetection of User-SpaceKeyloggers

We propose a new detection techniquethat simulates carefully craftedkeystroke sequences in input andobserves the behavior of the keyloggerin output to unambiguously identify itamong all the running processes. Wehave prototyped our technique as anunprivileged application, hencematching the same ease of deploymentof a keylogger executing inunprivileged mode

2013

Page 5: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

10 ISJNS03 Automatic Reconfiguration forLarge-Scale Reliable StorageSystems

In this paper, we present a completesolution for dynamically changingsystem membership in a large-scaleByzantine-fault-tolerant system. Wepresent a service that tracks systemmembership and periodically notifiesother system nodes of changes

2013

11 ISJNS04 On the Security and Efficiencyof Content Distribution viaNetwork Coding

Content distribution via network codinghas received a lot of attention lately.However, direct application of networkcoding may be insecure. In particular,attackers can inject "bogus” data tocorrupt the content distribution processso as to hinder the information dispersalor even deplete the network resource.Therefore, content verification is animportant and practical issue whennetwork coding is employed.

2013

ISJNS05 COKE Crypto-Less Over-the-Air Key Establishment

In this paper, we present a novelprobabilistic protocol (COKE) to allowtwo wireless communicating parties tocommit over-the-air (OTA) on a sharedsecret, even in the presence of aglobally eavesdropping adversary. Theproposed solution leverages no cryptobut just plaintext messages exchange.

2013

ISJNS06 Performance of VirtualMachines Under NetworkedDenial of Service Attacks:Experiments and Analysis

The use of virtual machines (VMs) toprovide computational infrastructureand services to organizations isincreasingly prevalent in the modern ITindustry. The growing use of thistechnology has been driven by a desireto increase utilization of resourcesthrough server consolidation.Virtualization has also made the dreamof such utility computing platforms ascloud computing a reality.

2013

Page 6: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

12 ISJNS07 Packet-Hiding Methods forPreventing Selective JammingAttacks.

In this paper, we address the problemof selective jamming attacks in wirelessnetworks. In these attacks, theadversary is active only for a shortperiod of time, selectively targetingmessages of high importance.

2012

13 ISJNS08 Efficient Network Modificationto Improve QoS Stability atFailures

As real-time traffic such as video orvoice increases on the Internet, ISPs arerequired to provide stable quality aswell as connectivity at failures. ForISPs, how to effectively improve thestability of these qualities at failureswith the minimum investment cost is animportant issue, and they need toeffectively select a limited number oflocations to add link facilities

2011

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON DATA MINING

SNO P.CODE TITLES DESCRIPTION YEAR

14 ISJDM01 Tweet Analysis for Real-TimeEvent Detection and EarthquakeReporting System Development

Twitter has received much attentionrecently. An important characteristic ofTwitter is its real-time nature. Weinvestigate the real-time interaction ofevents such as earthquakes in Twitterand propose an algorithm to monitortweets and to detect a target event. Todetect a target event, we devise aclassifier of tweets based on featuressuch as the keywords in a tweet, thenumber ofWords and their context.

2013

15 ISJDM02 A Fast Clustering-BasedFeature Subset Selection

Feature selection involves identifying asubset of the most useful features that

2013

Page 7: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

Algorithm for High-Dimensional Data

produces compatible results as theoriginal entire set of features. A featureselection algorithm may be evaluatedfrom both the efficiency andeffectiveness points of view. Whilethe efficiency concerns the timerequired to find a subset of features, theeffectiveness is related to the quality ofthe subset of features.Based on these criteria, a fastclustering-based feature selectionalgorithm (FAST) is proposed andexperimentally evaluated in this paper.

16 ISJDM03 A Genetic ProgrammingApproach to RecordDeduplication

In this paper, we propose a geneticprogramming approach to recorddeduplication that combines severaldifferent pieces of evidenceextracted from the data content to find adeduplication function that is able toidentify whether two entries in arepository are replicas or not.

2013

17 ISJDM04 Clustering Sentence-Level TextUsing a Novel Fuzzy RelationalClustering Algorithm

This paper presents a novel fuzzyclustering algorithm that operates onrelational input data; i.e., data in theform of a square matrix of pairwisesimilarities between dataObjects. The algorithm uses a graphrepresentation of the data, and operatesin an Expectation-Maximizationframework in which the graph centralityof an object in the graph is interpretedas a likelihood.

2013

18 ISJDM05 Dynamic PersonalizedRecommendation on SparseData

In this paper, a novel dynamicpersonalized recommendation algorithmis proposed, in which informationcontained in both ratings and profilecontents are utilized by exploringlatent relations between ratings, a set ofdynamic features are designed to

2013

Page 8: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

describe user preferences in multiplephases, and finally a recommendation ismade by adaptively weighting thefeatures.

19 ISJDM06 Maximum LikelihoodEstimation from UncertainData in the Belief FunctionFramework

We consider the problem of parameterestimation in statistical models in thecase where data are uncertain andRepresented as belief functions. Theproposed method is based on themaximization of a generalizedlikelihood criterion, which can beInterpreted as a degree of agreementbetween the statistical model and theuncertain observations.

2013

20 ISJDM07 Ranking on Data Manifold withSink Points

In this paper, we introduce a novelApproach, Manifold Ranking with SinkPoints (MRSPs), to address diversity aswell as relevance and importance inranking. Specifically, our approach usesa manifold ranking process over thedata manifold, which can naturally findthe most relevant and Important dataobjects.

2013

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING

SNO P.CODE TITLES DESCRIPTION YEAR

21 ISJMC01 Channel Assignment forThroughput Optimization inMultichannel MultiradioWireless Mesh Networks UsingNetwork Coding

Compared to single-hop networks suchas Wi-Fi, multihop infrastructurewireless mesh networks (WMNs) canpotentially embrace the broadcastbenefits of a wireless medium in a moreflexible manner. Rather than beingpoint-to-point, links in the WMNsmay originate from a single node andreach more than one other node

2013

Page 9: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

22 ISJMC02 Discovery and Verification ofNeighbor Positions in MobileAd Hoc Networks

In this paper, we address the issues byproposing a fully distributedcooperative solution that is robustagainst independent and colludingadversaries, and can be impaired onlyby an overwhelming presence ofadversaries. Results show that ourprotocol canthwart more than 99 percent of theattacks under the best possibleconditions for the adversaries, withminimal false positive rates.

2013

23 ISJMC03 Distributed CooperativeCaching in Social WirelessNetworks

This paper introduces cooperativecaching policies for minimizingelectronic content provisioning cost inSocial Wireless Networks (SWNET).SWNETs are formed by mobiledevices, such as data enabled phones,electronic book readers etc., sharingcommon interests in electronic content,and physically gathering together inpublic places

2013

24 ISJMC04 EAACK—A Secure Intrusion-Detection System for MANETs

In this paper, we propose andimplement a new intrusion-detectionsystem named Enhanced Adaptiveacknowledgment (EAACK) speciallydesigned for MANETs. Comparedto contemporary approaches, EAACKdemonstrates higher malicious-Behavior-detection rates in certaincircumstances while does not greatlyaffect the network performances.

2013

25 ISJMC05 EMAP: Expedite MessageAuthentication Protocol forVehicular Ad Hoc Networks

In this paper, we propose anExpedite Message AuthenticationProtocol (EMAP) for VANETs, whichreplaces the time-consuming CRLchecking process by an efficientrevocation checking process. Therevocation check process in EMAP uses

2013

Page 10: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

a keyed Hash Message AuthenticationCode HMAC, where the key used incalculating the HMAC is shared onlybetween non revoked On-Board Units

26 ISJMC06 Adaptive Mobile CloudComputing to Enable RichMobile MultimediaApplications

In this paper, we look at early trends,and opportunities and benefits for newCMM applications and services. Weanalyze the challenges imposed by mobile cloud computing that need to beaddressed to make CMM applicationsviable, including response time, userexperience, cloud computing cost,mobile network bandwidth, and scalability to large number of CMMusers,besides other important cloudcomputing issues like energyconsumption, privacy, and security.

2013

27 ISJMC07 Pulse Switching: Toward aPacket-Less Protocol Paradigmfor Event Sensing

This paper presents a novel pulseswitching protocol framework for ultralight-weight wireless networkapplications. The key Idea is to abstracta single Ultra Wide Band (UWB) pulseas the information switchinggranularity. Pulse switching is shown tobe sufficient for on-off style eventmonitoring applications for which amonitored parameter can be modeledusing a binary variable.

2013

WiCop: Engineering WiFiTemporal White-Spaces forSafe Operations of WirelessPersonal Area Networks inMedical Applications

This paper exploits the Clear ChannelAssessment (CCA) mechanism in WiFidevices and proposes novel policingframework, WiCop, that can effectivelycontrol the temporal white-spacesbetween WiFi transmissions. Suchtemporal white-spaces can be utilizedfor delivering low duty cycle WPANtraffic. We have implemented andvalidated WiCop on SORA, a softwaredefined radio platform.

Page 11: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

28 ISJMC08 Quality-Differentiated VideoMulticast in Multirate WirelessNetworks

In this work, we investigate a rate-adaptive video multicast scheme thatcan provide heterogeneous clientsdifferentiated visual qualities matchingtheir channel conditions. We firstpropose a rate scheduling model thatselects the optimal transmission bit ratefor each video frame to maximize thetotal visual quality for a multicast groupsubject to the minimum-visual-quality-guaranteed constraint.

2013

29 ISJMC09 Toward Privacy Preserving andCollusion Resistance in aLocation Proof UpdatingSystem

we propose A Privacy-Preservinglocation proof Updating System(APPLAUS) in which colocatedBluetooth enabled mobile devicesmutually generate location proofs andsend updates to a location proof server.Periodically changed pseudonyms areused by the mobile devices to protectsource location privacy from each other,and from the untrusted location proofserver.

2013

30 ISJMC10 Vampire Attacks: Draining Lifefrom Wireless Ad Hoc SensorNetworks

This paper explores resource depletionattacks at the routing protocol layer,which permanently disable networks byquickly draining nodes’ battery power.These “Vampire” attacks are notspecific to any specific protocol, butrather rely on the properties of manypopular classes of routingProtocols.

2013

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

SNO P.CODE TITLES DESCRIPTION YEAR

61 ISJSE01 Ant Colony Optimization for this paper develops a novel approach 2013

Page 12: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

Software Project Schedulingand Staffing with an Event-Based Scheduler

with an event-based Scheduler (EBS)and an ant colony optimization (ACO)algorithm. The proposed approachrepresents a plan by a task list and aPlanned employee allocation matrix.

62 ISJSE02 Identifying and SummarizingSystematic Code Changes viaRule Inference

this paper proposes a rule-basedprogram differencing approach thatautomatically discovers andRepresents systematic changes as logicrules. To demonstrate the viability ofthis approach, we instantiated thisapproach at two Different abstractionlevels in Java: first at the level ofapplication programming interface(API) names and signatures, and secondat the level of code elements andstructural dependences.

2013

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING

SNO P.CODE TITLES DESCRIPTION YEAR

31 ISJCC01 Dynamic Resource AllocationUsing Virtual Machines forCloud Computing Environment

In this paper, we present a systemthat uses virtualization technology toallocate data center resourcesdynamically based on applicationdemands and support greencomputing by optimizing the number ofservers in use

2013

32 ISJCC02 Scalable and Secure Sharing ofPersonal Health Records inCloud Computing UsingAttribute-Based Encryption

we propose a novel patient-centricframework and a suite of mechanismsfor data access control to PHRs storedin semitrusted servers. To achieve fine-grained and scalable data access controlfor PHRs, we leverage attribute-basedencryption (ABE) techniques to encrypteach patient’s PHR file.

2013

Page 13: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

33 ISJCC03 PACK: Prediction-Based CloudBandwidth and Cost ReductionSystem

In this paper, we present PACK, a novelend-to-end traffic redundancyelimination (TRE) system, designed forcloud computing customers. Cloud-based TRE needs to apply a judicioususe of cloud resources so that thebandwidth cost reduction combinedwith the additional cost of TREcomputation And storage would beoptimized.

2013

34 ISJCC04 ANTELOPE: A Semantic-aware Data Cube Scheme forCloud Data Center Networks

we present ANTELOPE, a scalabledistributed data-centric scheme in clouddata centers, in which we systematicallytake into account both the property ofnetwork architecture andthe optimization of data placement.

2013

35 ISJCC05 Attribute-Based Access toScalable Media in Cloud-Assisted Content SharingNetworks

This paper presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE)technique, and employs the MCP-ABEto design an access control scheme forsharing scalable media based on dataconsumers’ attributes (e.g., age,nationality, or gender) rather than anexplicit list of the consumers’ names.

2013

36 ISJCC06 Dynamic Scheduling andPricing in Wireless CloudComputing

In this paper, we consider a wirelesscloud computing system in which thewireless service provider operates a datacenter and provides cloud services to itssubscribers at dynamic prices. Wepropose a joint optimization ofscheduling and pricing decisions fordelay-tolerant batch services tomaximize the service provider’s long-term profit.

2013

37 ISJCC07 pCloud: A Distributed Systemfor Practical PIR

In this paper we present pCloud, adistributed system that constitutes thefirst attempt towards practical cPIR.Our approach assumes a disk-based

2012

Page 14: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

architecture that retrieves one page witha single query. Using a stripingtechnique, we distribute the database toa number of cooperative peers, andleverage their computational resourcesto process cPIR queries in parallel. Weimplemented pCloud on the PlanetLabnetwork, and experimented extensivelywith several system parameters results.

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING

SNO P.CODE TITLES DESCRIPTION YEAR

61 ISJIM01 A Novel Joint Data-Hiding andCompression Scheme Based onSMVQ and Image Inpainting

In this paper, we propose a novel jointdata-hiding and compression schemefor digital images using side matchvector quantization (SMVQ) and imageinpainting. The two functions of datahiding and image compression can beintegrated into one single moduleseamlessly.

2013

62 ISJIM02 Image Size Invariant VisualCryptography for GeneralAccess Structures Subject toDisplay Quality Constraints

Conventional visual cryptography (VC)suffers from a pixel-expansionproblem, or an uncontrollable displayquality problem for recovered images,and lacks a general approach toconstruct visual secret sharing schemes(VSSs) for general access structures(GASs).

2013

ISJIM03 Multiview HessianRegularization for ImageAnnotation

The rapid development of computerhardware and Internet technologymakes large scale data dependentmodels computationally tractable, andopens a bright avenue for annotatingimages through innovative machinelearning algorithms.

2013

ISJIM04 Optimized 3D Watermarking This paper proposes a new approach to

Page 15: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

for Minimal Surface Distortion 3D watermarking by ensuring theoptimal preservation of mesh surfaces.A new 3D surface preservation functionmetric is defined consisting of thedistance of a vertex displaced bywatermarking to the original surface, tothe watermarked object surface as wellas the actual vertex displacement.

TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING

SNO P.CODE TITLES DESCRIPTION YEAR

61 ISJGC01 On the Design of MutuallyAware Optimal Pricing andLoad Balancing Strategies forGrid Computing Systems

Managing resources and cleverlypricing them on computing systems is achallenging task. Resource sharingdemands careful load balancing andoften strives to achieve a win-winsituation between resource providersand users. Toward this goal, weconsider a joint treatment of loadbalancing and pricing.

2013

62 ISJGC02 Multilayer Consensus ECC-Based Password AuthenticatedKey-Exchange (MCEPAK)Protocol for Smart Grid System

This paper aims at providing a keyagreement protocol for smart grid tocope with access control ofappliances/devices located inside aHome Area Network (HAN) by a set ofcontrollers outside the HAN. Thecommands/packets initiated by thecontrollers in crisis cases should bedelivered fast and immune from anyinterruption.

2013

ISJGC03 A Merge-and-Split Mechanismfor Dynamic VirtualOrganization Formation inGrids

Executing large scale applicationprograms in grids requires resourcesfrom several Grid Service Providers(GSPs). These providers form Virtual

Page 16: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

Organizations (VOs) by pooling theirresources together to provide therequired capabilities to execute theapplication.

JAVA APPLICATION PROJECTS

TECHNOLOGY : JAVADOMAIN : NON IEEE BASED PROJECTS

SNO P.CODE PROJECT TITLE

1 ISNIJ01 Inventory Management System

2 ISNIJ02 Human Capital Management System

3 ISNIJ03 CMS Measures Management System

4 ISNIJ04 MIS For Alumni Students

5 ISNIJ05 A Conceptual View Of Web Based E-Learning System

6 ISNIJ06 Marking large scale deliberation online management system

7 ISNIJ07 Printed Work To Spoken Vibration Converter

8 ISNIJ08 Quiver: Consistent And Scalable Sharing For Edge Services

9 ISNIJ09 Design And Implementation Of Scalable Edge Based Admission

10 ISNIJ10Strong Barrier Coverage For Intrusion Detection In Wireless SensorNetwork

11 ISNIJ11 A Dynamic Path Identification Mechanism To Defend Against Ddos

12 ISNIJ12 Mittigating Performance Degradation In Congested Sensor Networks

13 ISNIJ13 Efficient Dynamic Probabilistic Packet Marking Scheme

Page 17: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

AANNDDRROOIIDDTECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING

SNO P.CODE TITLES DESCRIPTION YEAR

1 ISACC01 A Review on DistributedApplication ProcessingFrameworks in Smart MobileDevices for Mobile CloudComputing

It proposes thematic taxonomy ofcurrent DAPFs, reviews currentoffloading frameworks by usingthematic taxonomy and analyzes theimplications and critical aspects ofcurrent offloading frameworks. Further,it investigates commonalities anddeviations in such frameworks on thebasis significant parameters such asoffloading scope, migration granularity,partitioning approach, and migrationpattern. Finally, we put forward openresearch issues in distributed

2013

14 ISNIJ14 Dynamic Adaptation Of Checkpoints And Rescheduling In Grid

15 ISNIJ15Fully Predictable HPC Infrastructure Using Admission Control WithVirtualization

16 ISNIJ16 E Compiler For Java With Security Editor

17 ISNIJ17 Change Point Monitoring For Detection Of Dos Attacks

18 ISNIJ18Bi-Criteria Scheduling With Dynamic Instantiation For WorkflowExecution On Grids

19 ISNIJ19 Eight Times Acceleration Of Geospatial Data Archiving

20 ISNIJ20 Automatic Reconfiguration In Wireless Mesh Networks

Page 18: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

application processing for MCC thatremain to be addressed.

2 ISACC02 A Network and Device AwareQoS Approach for Cloud-BasedMobile Streaming.

, this study presented a network anddevice-aware Quality of Service (QoS)approach that provides multimedia datasuitable for a terminal unit environmentvia interactive mobile streamingservices, further considering the overallnetwork environment and adjusting theinteractive transmission frequency andthe dynamic multimedia transcoding, toavoid the waste of bandwidth andterminal power.

2013

TECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING

SNO P.CODE TITLES DESCRIPTION YEAR

3 ISAMC01 Wireless Machine-to-MachineHealthcare Solution UsingAndroid Mobile Devices inGlobal Networks

This paper presents a prototypemachine-to machine (M2M) healthcaresolution that combines mobile and IPv6techniques in a wireless sensor networkto monitor the health condition ofpatients and provide a wide range ofeffective, comprehensive, andconvenient healthcare services.

2013

4 ISAMC02 Traffic Signature-based MobileDevice LocationAuthentication

In this paper, We describe a prototypenon-cryptographic locationauthentication system we constructed,and explain how to design both voiceand data transmissions with distinct,discernible traffic signatures. Usingboth analytical modeling and empiricalresults from our implementation, wedemonstrate that these signatures canbe reliably detected even in thepresence of heavy cross-traffic

2013

Page 19: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

introduced by other femtocell users

TECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON DATA ENGINEERING

SNO P.CODE TITLES DESCRIPTION YEAR

5 ISADE01 PMSE: A Personalized MobileSearch Engine

In this paper, We propose apersonalized mobile search engine(PMSE) that captures the users’preferences in the form of concepts bymining their click through data. Due tothe importance of location informationin mobile search, PMSE classifies theseconcepts into content concepts andlocation concepts. In addition, users’locations (positioned by GPS) are usedto supplement the location concepts inPMSE.

2013

6 ISADE02 Smartphone-Based IndustrialInformatics Projects andLaboratories

In this paper, smart phones andmultimedia technologies are proposedas an innovative way to tackle theformation of students, at differentlevels, in the Industrial Informatics(II) subject of the IndustrialElectronics Engineering (IEE) degree.II instructs future Engineers in thedesign of IT systems to controlindustrial processes. An application ofthe Smartphone multimedia tool ispresented to show how studentsinteract with the developed system

2013

TECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON CONTEXT AWARE SERVICES

SNO P.CODE TITLES DESCRIPTION YEAR

Page 20: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

7 ISACS01 A Survey on Context-AwareMobile and WirelessNetworking: On Networking andComputing Environments’Integration

In this survey paper, we aim toassemble all the ”puzzle-pieces” of theemerging research area of ContextAware Mobile and WirelessNetworking (CAMoWiN) in order toprovide the reader aholisticrepresentation of the work having beendone in the past emphasizing in recentresearch effort.

2013

8 ISACS02 Cloud-Based Augmentation forMobile Devices: Motivation,Taxonomies, and OpenChallenges

This paper comprehensively surveys themobile augmentation domain andpresents taxonomy of CMA approaches.The objectives of this study is tohighlight the effects of remote resourceson the quality and reliability ofaugmentation processes and discuss thechallenges and opportunities ofemploying varied cloud-based.

2013

TECHNOLOGY: MULTIMEDIADOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA

SNO P.CODE TITLES DESCRIPTION YEAR

3 ISJMM01 Learning to Photograph: ACompositional Perspective

In this paper, we present an intelligentphotography system which canrecommend the most user-favored viewrectangle for arbitrary camera input,from a photographic compositionalperspective. Automating this process isdifficult, due to the subjectivity ofhuman’s aesthetics judgment and largevariations of image contents, whereheuristic compositional rules lackgenerality.

2013

Page 21: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

4 ISJMM02 Affective Labeling in a Content-Based Recommender System forImages

Affective labeling of multimedia contenthas proved to be useful in recommendersystems. In this paper we present amethodology for the implicit acquisitionof affective labels for images. It is basedon an emotion detection technique thattakes as input the video sequences of theusers’ facial expressions.

2013

5 ISJMM03 Beyond Text QA: MultimediaAnswer Generation byHarvesting Web Information

In this paper, we propose a scheme thatis able to enrich textual answers in cQAwith appropriate media data. Ourscheme consists of three components:answer medium selection, querygeneration for multimedia sea rch, andmultimedia data selection andpresentation.

2013

DDOOTTNNEETTTECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON NETWORKING

SNO P.CODE TITLES DESCRIPTION YEAR

Page 22: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

1 ISDNW01 Dynamic Service ContractEnforcement in Service-OrientedNetworks

In this paper, we propose and validateDoWSS, a doubly weighted algorithmfor service traffic shaping. We show viasimulation that Do WSS possessesseveral advantages: It eliminates theapproximation issues, preventsstarvation, and contains the rapid creditconsumption issue in existing credit-based approaches.

2013

2 ISDNW02 Vulnerability of NetworkMechanisms to SophisticatedDDoS Attacks

Our approach is based on proposing ametric that evaluates thevulnerability of a system. We thenuseour vulnerability metric to evaluatea data structure which is commonlyused in network mechanisms-the Hashtable data structure.

2013

Design and PerformanceEvaluation of Overhearing-AidedData Cachingin Wireless Ad Hoc Networks

In this paper, we propose an efficientdata caching algorithm which makes useof the overhearing property of wirelesscommunication to improve cachingperformance.

2013

Page 23: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

IP-Geolocation Mapping forModerately Connected InternetRegions

In this paper, however, we investigate alarge region of moderately connectedInternet and find the delay-distancecorrelation is weak. But we discover amore probable rule—with highprobability the shortest delay comesfrom the closest distance.

2013

3 ISDNW03 Detection and Localization ofMultiple Spoofing Attackers inWireless Networks

In this paper, we propose to use spatialinformation, a physical propertyassociated with each node, hard tofalsify,and not reliant oncryptography, as the basis for 1)detecting spoofing attacks; 2)determining the no of attackers whenmultiple adversaries masquerading asthe same nodeidentity; and 3)localizing multiple adversaries.

2013

Page 24: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

4 ISDNW04 Robust Tracking of Small-ScaleMobile Primary User inCognitive Radio Networks

In this paper, we propose a newframework, called Sequential MonteCarlo combined with shadow-fadingestimation (SOLID), for accurate,attack/fault-tolerant tracking of small-scale mobile primary users. The key ideaunderlying SOLID is to exploit thetemporal shadow fadingcorrelation in sensing results induced bythe primary user's mobility. Specifically,SOLID augments conventionalSequential Monte Carlo (SMC)-basedtarget tracking with shadow-fadingestimation.

2013

5 ISDNW05 Attacks and Defenses in the DataPlane of Networks

We demonstrate-to ourknowledge the first-practical attack that exploits avulnerability in packet processingsoftware to launch a devastatingdenial-of-service attack fromwithin the network infrastructure.This attack uses only asingle attack packet to consume the fulllink bandwidth of the router's outgoinglink.

2013

Page 25: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

6. IDSNW06 A Decentralized PrivacyPreserving Reputation Protocolfor the Malicious AdversarialModel

In this paper,Wepresent a privacy preservingreputation protocol for the malicious adversarial model. The malicious users in this modelactively attempt to learn the privatefeedback values of honest users as wellas to disrupt the protocol.Our protocol does not require centralizedentities, trusted third parties, orspecialized platforms, such asanonymous networks and trustedhardware.

2013

IDSNW07 Privacy Vulnerability ofPublished Anonymous MobilityTraces

In this paper, we investigate how anadversary ,when equipped with a smallamount of the snapshot informationtermed as side information, can infer anextended view of the whereabouts of avictim node appearing in an anonymoustrace. Our results quantify the loss ofvictim nodes’ privacy as a function ofthe nodal mobility, the inferencestrategies of adversaries, and any noisethat may appear in the trace or the sideinformation.

Page 26: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

Security Analysis of a SingleSign-On Mechanism forDistributed Computer Networks

In this paper, however, we demonstrativethat their scheme is actually insecure asit fail s to meet credential privacy andsoundness of authentication.Specifically,we present twoimpersonation attacks. The first attackallows a malicious service provider, whohas successfully communicated with alegal user twice, to recover the user’scredential and then to impersonate theuser to access resources and servicesoffered by other service providers.

Identity-Based SecureDistributed Data StorageSchemes

In this paper, we propose two identity-based secure distributed data storage(IBSDDS) schemes. Our schemes cancapture the following properties: (1) Thefile owner can decide the accesspermission independently without thehelp of the private key generator (PKG);(2) For one query, a receiver can onlyaccess one file, instead of all files of theowner; (3) Our schemes are secureagainst the collusion attacks, namelyeven if the receiver can compromise theproxy servers, he cannot obtain theowner’s secret key.

2013

Page 27: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

Detecting Influential Spreaders inComplex, Dynamic Networks

A hybrid of node degree and k-shellindex is more effective at identifyinginfluential spreaders and has lesscomputational overhead than either ofthese traditional measures

2013

Dynamic Authentication withSensory Information for theAccess Control Systems.

In this work, we introduce a dynamicauthentication with sensory informationfor the access control systems. Bycombining sensory information obtainedfrom onboard sensors on the access cardsas well as the original encodedidentification information, we are able toeffectively tackle the problems such asaccess card loss, stolen and duplication.Our solution is backward-compatiblewith existing access

Page 28: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY

SNO P.CODE TITLES DESCRIPTION YEAR

7 ISDNS01 EAACK—A Secure Intrusion-Detection System for MANETs

In this paper,Access card authentication is critical andessential for manymodern access control systems, whichhave been widely deployed in variousgovernments, commercial andresidential environments. Althoughadvanced biometric authenticationmethods such as fingerprint and irisidentification can further identifythe user who is requesting authorization,they incur high system costs andaccess privileges cannot be transferredamong trusted users.

2013

8 ISDNS02 Cooperative MessageAuthentication in VehicularCyber-Physical Systems

In this paper, we address the issue oflarge computation overhead caused bythe safety message authentication.Specially, a cooperative messageauthentication protocol (CMAP) isdeveloped to alleviate vehicles’computation burden. With CMAP, allthe vehicles share their verificationresults with each other in a cooperativeway, so that the number of safetymessages that each vehicle needs toverify reduces significantly

2013

Page 29: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

ISDNS03 SORT: A Self-ORganizing TrustModel for Peer-to-Peer Systems

This paper presents distributedalgorithms that enable a peer to reasonabout trustworthiness of other peersbased on past interactions andrecommendations. Peers create theirown trust network in their proximity byusing local information available and donot try to learn global trust information.

2013

ISDNS04 Predicting ArchitecturalVulnerability on MultithreadedProcessors under ResourceContention and Sharing

This paper proposes a scalable two-levelpredictive mechanism capable ofpredicting a program’s AVF on aSMT/CMP architecture from easilymeasured metrics.

ISDNS05 NICE: Network IntrusionDetection and CountermeasureSelection in Virtual NetworkSystems

Cloud security is one of most importantissues that has attracted a lot of researchand development effort in past fewyears. Particularly, attackers can explorevulnerabilities of a cloud system andcompromise virtual machines to deployfurther large-scale Distributed Denial-of-Service (DDoS).

9 ISDNS06 Modeling Propagation Dynamicsof Social Network Worms

Social network worms, such as emailworms and facebook worms, pose acritical security threat to the Internet.Modeling their propagation dynamics isessential to predict their potentialdamages and develop countermeasures.Although several analytical models havebeen proposed for modeling propagationdynamics of social network worms,there are two critical problems unsolved:temporal dynamics and spatialdependence.

2013

Page 30: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

10 ISDNS07 On the Security of End-to-EndMeasurements Based on Packet-Pair Dispersions

In this paper, we explore the security ofmeasurements based on the packet-pairtechnique. We propose lightweightcountermeasures to detect attacks onbandwidth measurements; our techniquecan detect whether delays were insertedwithin t he transmission of a packet-pair(e.g., by bandwidth shapers). We furtherpropose a novel scheme for remote pathidentification using the distribution ofpacket-pair dispersions and we evaluateits accuracy, robustness, and potentialuse.

2013

11 ISDNS08 Authorization Control for aSemantic Data Repositorythrough an Inference PolicyEngine

In this paper, we design an authorizationsecurity model enforced on a semanticmodel’s entities (concepts) and alsopropagate on their individuals in theOWL database through an inferencepolicy engine. We provide TBox accesscontrol for the construction of a TBoxfamily and propagate this based on theconstruction of concept taxonomies.

2013

12 ISDNS09 A large-scale study of the timerequired to compromise acomputer system

The paper also analyzes whether time tocompromise increase for each successfulintrusion of a computer system. Theresults regarding this property suggestthat time to compromise decrease alongthe number of intrusions of a system.

2013

Page 31: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

13 ISDNS10 Secure Encounter-based MobileSocial Networks: Requirements,Designs, andTradeoffs

In this paper, we explore the functionaland security requirements for these newsystems, such as availability, security,and privacy, and present several designoptions for building secure encounter-based social networks. To highlightthese challenges we examine onerecently proposed encounter-basedsocial network design and compare it toa set of idealized security andfunctionality requirements.

2013

14 ISDNS11 Secrecy Capacity EnhancementWith Distributed Precoding inMultirelay Wiretap Systems

In this paper, where an eavesdropper ispresent. Distributed pre coding throughmultiple relay nodes can be used toenhance the received signal power a tthe destination node and to mitigate thesignal leakage to the eavesdropper,simultaneously.

2013

15 ISDNS12 Strong Secrecy in BidirectionalBroadcast Channels WithConfidential Messages

To increase the spectral efficiency offuture wireless networks, it is importantto wisely integrate multiple services atthe physical layer. Here the efficientintegration of confidential services inthethree-node bidirectional relay channel isstudied. A relay node establishesa bidirectionalcommunication betweentwo other nodes using a decode-and-

forward protocol, which is also knownas two-way relaying

2013

Page 32: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

16 ISDNS13 Entrusting Private Computationand Data to Untrusted Networks

This paper focuses specifically onNP-complete problems anddemonstrates how sTile-basedsystems can solve important real-world problems, such as proteinfolding, image recognition, andresource allocation. We present thealgorithms involved in sTile andformally prove that sTile-basedsystems preserve privacy.

2013

17 ISDNS14 Discovery and Resolution ofAnomalies in Web AccessControl Policies

In this paper, we represent aninnovative policy anomaly analysisapproach for Web access controlpolicies, focusing on XACMLpolicy.We introduce a policybasedsegmentation technique to accuratelyidentify policy anomalies and derive

effective anomaly resolutions, alongwith an intuitive visualizationrepresentation of analysis results.

2013

18 ISDNS15 Extending Attack Graph-BasedSecurity Metrics andAggregating Their Application

The attack graph is an abstraction thatreveals the ways an attacker canleverage vulnerabilities in a networkto violate a security policy. Whenused with attack graph-based securitymetrics, the attack graph may be usedto quantitatively assess securityrelevant aspects of a network.

2012

19 ISDNS16 Dynamic Authentication withSensory Information for theAccess Control Systems

Access card authentication is critical andessential for manymodern access control systems, whichhave been widely deployed in variousgovernment, commercial and residentialenvironments.

2013

Page 33: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem Page27

20 ISDNW17 AMPLE: An AdaptiveTraffic EngineeringSystem Based on VirtualRouting Topologies

In this article, we introduce AMPLE -an efficient traffic engineering andmanagement system that performsadaptive traffic control by usingmultiple virtualized routing topologies

2012

21 ISDNW18 MeasuRouting: AFramework for RoutingAssisted Traffic Monitoring

In this paper we present a theoreticalframework for MeasuRouting.Furthermore, as proofs-of-concept, wepresent synthetic and practicalmonitoring applications to showcasethe utility enhancement achieved withMeasuRouting.

2012

TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON DATAMINING

SNO P. CODE PROJECT TITLES DESCRIPTION YEAR

22 ISDDM01 Transductive MultilabelLearning via Label SetPropagation

In this paper, we study the problemof transductive multilabel learningandpropose a novel solution, calledTrasductive Multilabel Classification(TraM), to effectively assign a set ofmultiple labels to each instance.Different from supervised multilabellearningmethods, we estimatethe label sets of the unlabeled instanceseffectively by utilizing the informationfrom both labeled and unlabeled data.

2013

Page 34: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

23 ISDDM02 Maximum LikelihoodEstimation from Uncertain Datain the Belief FunctionFramework

The proposed method is based on themaximization of ageneralized likelihood criterion, whichcan be interpreted as a degree ofagreement between the statistical modeland the uncertain observations.

2013

24 ISDDM03 Mining User Queries withMarkov Chains: Application toOnline Image Retrieval

We propose a novel method forautomatic annotation, indexing andannotation-based retrievalof images.The new method, that we callMarkovian Semantic Indexing (MSI),is presented in the context ofan online image retrieval system.Geometric interpretations of theproposed distance are provided and itsrelation to a clustering in the keywordspace is investigated.

2013

25 ISDDM04 A Rough-Set-Based IncrementalApproach for UpdatingApproximations under DynamicMaintenance Environments

This paper focuses on a newincremental method for updatingapproximations of VPRS while objects

in the information system dynamicallyalter. It discusses properties ofinformation granulationand approximations under the dynamicenvironment while objects in theuniverse evolve over time.

2013

26 ISDDM05 Radio Database Compressionfor Accurate Energy-EfficientLocalizationin Fingerprinting Systems

The aim of the proposed technique is toreduce the computation cost andtransmission load in the mobile-basedimplementations. The presented methodmay be called Block-based WeightedClustering (BWC) technique, which isapplied in a concatenated location-radio signal space, and attributesdifferent weight factors to the locationand radio components.

2013

Page 35: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

27 ISDDM06 Fuzzy Web Data TablesIntegration Guided by anOntological and TerminologicalResource

In this paper, we present the design ofONDINE system which allows theloading and the querying of a datawarehouse opened on the Web,guided by an Ontological andTerminological Resource (OTR).The data warehouse, composedof data tables extracted fromWeb documents, has been built tosupplement existing local data sources

2013

28 ISDDM07 A New Algorithm for InferringUser Search Goals withFeedback Sessions

we propose a framework to discoverdifferent user search goals for a queryby clustering theproposed feedback sessions. Feedback sessions are constructed from user click-through logs and can efficiently reflectthe information needs of users.

2013

29 ISDDM08 Information-Theoretic OutlierDetection for Large-ScaleCategorical Data

In this paper, we propose a formaldefinition of outliers and an optimizationmodel of outlier detection, via a newconcept of holoentropy that takes bothentropy and total correlation intoconsideration. We propose two practical1-parameter outlier detection methods,named ITB-SS and ITB-SP, whichrequire no user-definedparameters for deciding whether anobject is an outlier.

2013

30 ISDDM09 Efficient Service SkylineComputation for CompositeService Selection

Service composition is emerging as aneffective vehicle for integrating existingweb services to create value-added andpersonalized composite services. Wepropose to exploit the dominancerelationship among service providers tofind a set of “best”possible composite services, referred toas a composite service skyline.

2013

Page 36: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

31 ISDDM10 Secure ProvenanceTransmission for StreamingData

In this paper, we propose a novelapproach to securely transmitprovenance for streaming data byembedding provenance into theinterpacket timing domain whileaddressing the above mentioned issues.As provenance is hidden in another host-medium, our solution can beconceptualized as watermarkingtechnique.

2013

32 ISDDM11 Generative Models for ItemAdoptions Using SocialCorrelation

We propose a social correlationframework that considers a socialcorrelation matrix representing thedegrees of correlation from every userto the users friends, in addition to a setof latent factors representing topics ofinterests of individual users. Based onthe framework, we develop twogenerative models, namely sequentialand unified, and the correspondingparameter estimation approaches.

2013

33

45

ISDDM12 Scalable Evaluation ofTrajectory Queries overImprecise Location Data

In this paper, we study how to efficientlyevaluate trajectory queries overimprecise objects, by proposing a novelconcept, u-bisector, which is anextension of bisector specified forimprecise data..

2013

34 ISDDM13 Optimizing Bloom FilterSettings inPeer-to-Peer Multi keywordSearching

In this paper, we address the problemof optimizing the settings of a BloomFilter (BF). We show that the optimalsetting of BF in terms of traffic costis determined by the statisticalinformation of the involved invertedlists.

2012

TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING

Page 37: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

SNO P. CODE PROJECT TITLES DESCRIPTION YEAR

35 ISDCC01 Scalable and Secure Sharing ofPersonal Health Records inCloud Computing UsingAttribute-Based Encryption

In this paper, we propose a novelpatient-centric framework and a suite ofmechanisms for data access control toPHRs stored in semitrusted servers. Toachieve fine-grained and scalable dataaccess control for PHRs, we leverageattribute-based encryption (ABE)techniques to encrypt each patient’sPHR file.

2013

36 ISDCC02 A Hierarchical Approach for theResource Management of VeryLarge Cloud Platforms

The goal of this paper is to deviseresource allocation policies forvirtualized cloud environments thatsatisfy performance and availabilityguarantees and minimize energy costs invery large cloud service centers. Wepresent a scalable distributedhierarchical framework based on amixed-integer non-linear optimization ofresource management acting at multipletime-scales.

2013

37 ISDCC03 Toward Secure MultikeywordTop-kk Retrieval overEncrypted Cloud Data

In this paper, we focus on addressingdata privacy issues using SSE. For thefirst time, we formulate the privacy issuefrom the aspect of similarity relevanceand scheme robustness. We observe thatserver-side ranking based on order-preserving encryption (OPE) inevitablyleaks data privacy.

2013

Page 38: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

38 ISDCC04 On the Performance ofByzantine Fault-TolerantMapReduce

MapReduce is often used for criticaldata processing, e.g.,in the context of scientific or financialsimulation. However, there is evidencein the literature that there are arbitrary(or Byzantine) faults that maycorrupt the results of MapReduce without being detected.

39 ISDCC05 BtrPlace: A FlexibleConsolidation Manager forHighly Available Applications

The massive amount of resources foundin datacenters makes it possible toprovide high availability to multi-tierapplications. Virtualizing theseapplications makes it possible toconsolidate them on servers, reducingruntime costs. We present BtrPlace, aflexible consolidation manager that iscustomized through configuration scriptswritten by the application and datacenteradministrators.

2013

ISDCC06 Optimal MultiserverConfiguration for ProfitMaximization in CloudComputing

In this paper, we study the problem ofoptimal multiserver configuration forprofit maximization in a cloudcomputing environment. To maximizethe profit, a service provider shouldunderstand both service charges andbusiness costs, and how they aredetermined by the characteristics of theapplications and the configuration of amultiserver system

2013

Page 39: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

40 ISDCC07 Performance Analysis of CloudComputing CentersUsing M/G/m/m+r Queuing

Systems

In this paper, we requests, we describe anovel approximate analytical model forperformance evaluation of cloud serverfarms and solve it to obtain accurateestimation of the complete probabilitydistribution of the request response timeand other important performanceindicators.

2012

TECHNOLOGY: DOTNETDOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING

SNO P.CODE TITLES DESCRIPTION YEAR

61 ISDIM01 Colorization-BasedCompression UsingOptimization

In this paper, we formulate thecolorization-based coding problem intoan optimization problem, i.e., an Lminimization problem. In colorization-based coding, the encoder chooses a fewrepresentative pixels (RP) for which thechrominance values and the positionsare sent to the decoder, whereas in thedecoder, the chrominance values for allthe pixels are reconstructed bycolorization methods.

2013

62 ISDIM02 Image Denoising WithDominant Sets by a CoalitionalGame Approach

Dominant sets are a new graph partitionmethod for pairwise data clusteringproposed by Pavan and Pelillo. Weaddress the problem of dominant setswith a coalitional game model, in whicheach data point is treated as a player andsimilar data points are encouraged togroup together for cooperation.

2013

ISDIM03 Hierarchical super-resolution-based inpainting

This paper introduces a novelframework for examplar-basedinpainting. It consists in performing first

2013

Page 40: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

the inpainting on a coarse version of theinput image. A hierarchical super-resolution algorithm is then used torecover details on the missing areas.

ISDIM04 Personal Photo Enhancementusing Internet Photo Collections

In this paper, we propose a frameworkto overcome the imperfections ofpersonal photos of tourist sites using therich information provided by large scaleInternet photo collections. Our methoddeploys state-of-the-art techniques forconstructing initial 3D models fromphoto collections. The same techniquesare then used to register personal photosto these models, allowing us to augmentpersonal 2D images with 3Dinformation.

2013

TECHNOLOGY: DOTNETDOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING

SNO P.CODE TITLES DESCRIPTION YEAR

61 ISDGC01 Evolving Smart GridInformation ManagementCloudward: A CloudOptimization Perspective

In this paper, we study an optimizationproblem of leveraging the cloud domainto reduce the cost of informationmanagement in the SG. We propose acloud-based SG informationmanagement model and present a cloudand network resource optimizationframework to solve the cost reductionproblem in cloud-based SG informationstorage and computation.

2013

62 ISDGC02 Swarm Fuzzy Systems:Knowledge Acquisition inFuzzy Systems and its

This work proposes the use of bio-inspired knowledge acquisition forFuzzy Systems founded on Swarm

2013

Page 41: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

Applications in Grid Computing Intelligence Particle SwarmOptimization (SI-PSO). Swarm-basedmodels consider knowledge entities asparticles that move in the space to reachthe higher quality..

TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

SNO P.CODE PROJECT TITLES DESCRIPTION YEAR

78 ISDSE01

Self-Organizing Roles on AgileSoftware Development Teams

79 ISDSE02The Human Element in SocialNetworking

80 ISDSE03Generating Test Cases forReal-Time Systems Basedon Symbolic Models

Page 42: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

81 ISDSE04Beyond Data Mining

82 ISDSE05A Theoretical and EmpiricalAnalysis of the Role of TestSequence Length in SoftwareTesting for Structural Coverage

In this paper, we analyze the role thatthe length plays in software testing, inparticular branch coverage. We showthat, on “difficult” software testingBench marks, longer test sequencesmake their testing trivial. Hence, weargue that the choice of the length of thetest sequences is very important insoftware testing.

2012

83 ISDSE06 Automatic Detection ofUnsafe DynamicComponent Loadings

In this paper, we present the firstautomated technique to detect vulnerableand unsafe dynamic componentloadings. Our analysis has two phases:1) apply dynamic binary instrumentationto collect runtime information oncomponent loading and2) analyze the collected information todetect vulnerable component loadings

2012

TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA

SNO P.CODE PROJECT TITLES DESCRIPTION YEAR

78 ISDMM01

Group Delay based Methods forSpeaker Segregation and itsApplication in Multi-mediInformation Retrieval

A novel method of single channel speakersegregation using the group delay crosscorrelation function is proposed in thispaper. The group delay function, which isthe negative derivative of the phasespectrum yields robust spectral estimates.

Page 43: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

79 ISDMM02

Query-Adaptive Image SearchWith Hash Codes

This paper introduces an approach thatenables query-adaptive ranking of thereturned images with equal Hammingdistances to the queries. This is achievedby firstly offline learning bitwise weightsof the hash codes for a diverse set ofpredefined semantic concept classes.

80 ISDMM03

Robust Spatial ConsistencyGraph Model for PartialDuplicate Image Retrieval

Partial duplicate images often have largenon-duplicate regions and small duplicateregions with random rotation, which leadto the following problems: 1) large numberof noisy features from the nonduplicateregions; 2) small number of representativefeatures from the duplicate regions; 3)randomly rotated or deformed duplicateregions.

DOTNET APPLICATION PROJECTS

TECHNOLOGY : DOTNETDOMAIN : NON IEEE BASED PROJECTS

SNO P.CODE PROJECT TITLE

1 ISNID01 Security Evaluation For Graphical Password

2 ISNID02 Multi Level Authentication Method For Banking Applications

3 ISNID03 Spoken Vibration To Access Personal Computer

4 ISNID04Effective Software Merging In The Presence Of Object-OrientedRefactoring

5 ISNID05 Electronic Money Market Management System

Page 44: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

6 ISNID06 Website Positioning System.

7 ISNID07 Online Financial Protection Management System

8 ISNID08The Effect Of Virtual Community Culture And Group Cohesion OnKnowledge Sharing

9 ISNID09 Knowledge-Based Integrated Financial Forecasting System

10 ISNID10 Multi Track Trading Sytem.

11 ISNID11Grid Accounting Services Architecture (Gasa) For Distributed SystemsSharing And Integration

12 ISNID12Reducing Transfer Time In Wireless Networks By SimultaneousMultiple Packet Transmission

13 ISNID13 Detecting Lost Items In Shopping Carts

14 ISNID14 Systematized Collection Of Student Using Internet And Intranet

15 ISNID15Load Balancing In Parallel Computers

16 ISNID16Supervised Neighborhood Topology Learning For Human ActionRecognition

17 ISNID17 Enhancing Download Performance In An Intranet

18 ISNID18Synthesis Of Few-Layer Gase Nanosheets For High Performance Photodetectors.

19 ISNID19 The Color Blindness Removal Technique In Image

20 ISNID20 The Color Blindness Removal Technique In Image

21 ISNID21 Enhanced Security Control System In The Online Exam

22 ISNID22 Webpage Understanding Beyond Page Level Search

Page 45: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

23 ISNID23A Novel Framework For Semantic Annotation And PersonalizedRetrieval Of Sports Video

24 ISNID24Anticipating Digitized Pictures From Cracks Based On EdgeDetection Method

25 ISNID25 Enhanced Hierarchical Multi Pattern Matching Algorithm

26 ISNID26 Characterizing Files In The Modern Gnutella Network

27 ISNID27 Semantics-Based Access Control Approach For Web Service

28 ISNID28 Web Services Such As E-Commerce Applications

29 ISNID29Detecting Traffic Anomalies Through Aggregate Analysis Of PacketHeader Data

30 ISNID30 Managing Central Monitoring In Distributed Systems

31 ISNID31 Semantic Web Technologies For E-Learning

32 ISNID32 Bridging Information Gap

33 ISNID33Downlink Performance Of Wireless Networks Using MPT [MultiplePacket Transmission]

34 ISNID34 Mobility Reduces Uncertainty In Manets

35 ISNID35 Post-Mining Of Association Rules Using Ontologies

36 ISNID36 Authentication Protocol For Wireless Sensor Networks

37 ISNID37Keyword Ranking Analysis For Orthogonal Data Embedding ForBinary Images In Morphological Transform Domain A High CapacityApproach

38 ISNID38 Identification And Removal Of Cracks In Digital Images

39 ISNID39 Proactive Data Quality Management For Data Warehouse Systems .

Page 46: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

NS2TECHNOLOGY : NS2DOMAIN : IEEE BASED PROJECTS

40 ISNID40 Path-History-Based Access Control For Mobile Agents41 ISNID41 Distributed Collaborative Distributed Editing System

42 ISNID42 Web Ranking Software43 ISNID43

Evaluating The Scalability Of P2P Based Video On Demand ServiceUsing Real Traces

44 ISNID44 Efficient Learning-Based Image Enhancement45 ISNID45 Virtual Observers In A Mobile Surveillance System46 ISNID46 Image Watermarking Systems

47 ISNID47 Content-Based Routing In Mobile Ad Hoc Networks

48 ISNID48 Human Resources Software Systems

49 ISNID49 A Path Identification Mechanism To Defend Against DDos Attacks

50 ISNID50The Effect Of Pairs In Program Design Tasks

01 ISNS01 Cluster –Based Certificate Revocation Woith Vindication Capability For MobileAd- Hoc Networks

02 ISNS02 Eaack- A Secure Intrusion –Detecion System For Manets

Page 47: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

SNO P.CODE TITLES

16 Vampire Attacks:Draining Life From Wireless Ad Hoc Sensor Networks

17 Classification And Experimental Analysis For Clone Detection Approaches InWireless Sensor Networks

03 ISNS03 Genetic Algorithm For Energy Efficient Qos Multicast Routing

04 ISNS04 Evolving Network Model With Local –Area Preference For Mobile Ad-HocNetwork

05 ISNS05 Light Weight Sybil Attack Detection In Manets

06 ISNS06 Self –Organising Seamless Multimedia Streaming In Dense Manets

07 ISNS07 A Neighbor Coverage – Based Probabilistic Rebroadcast For Reducing RoutingOverhead In Mobile Ad –Hoc Networks

08 ISNS08 Routing Protocol Based On Grover’s Searching Algorithm For Mobile Ad- HocNetworks

09 ISNS09 New Approach For Mobile Ad- Hoc Networks Unity Issue In AsuspiciousEnvironment

09 ISNS09 New Approach For Mobile Ad- Hoc Networks Unity Issue In AsuspiciousEnvironment

10 ISNS10 New Power –Aware Multicast Algorithm For Mobile Ad –Hoc Networks

11 ISNS11 Enhanced Olsr For Defense Against Dos Attack In Ad Hoc Networks

12 ISNS12 An Adaptive Hello Messaging Scheme For Neighbor Discovery In On-DemandManet Routing Protocols

13 ISNS13 Hybrid Flooding Scheme For Mobile Ad Hoc Networks –March 2013eight SybilAttack Detection In Manets

14 ISNS14 Self –Organising Seamless Multimedia Streaming In Dense Manets

15 ISNS15 A Neighbor Coverage – Based Probabilistic Rebroadcast For Reducing RoutingOverhead In Mobile Ad –Hoc Networks

Page 48: IEEE 2013 PROJECT TITLES, IEEE PROJECT TITLES FOR CSE, IEEE PROJECT TITLES FOR IT, IEEE PROJECT TITLES FOR ME, BEST PROJECT TITLES FOR MCA,

Iris Solutions

#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,

Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem

18 Channel Aware Encryption And Decision Fusion For Wireless Sensor Networks

19 Energy Efficient Transmission Scheme For Mobile Data Gathering In WirelessSensor Networks

20 .Path Planning Algorithm For Mobile Anchor –Based Localization In WirelessSensor Net Works

21 Decentralised Hypothesis Testing In Wireless Sensor Networks In The Presence OfMisbehaving Nodes

22 Tour Planning For Mobile Data- Gathering Mechanisms In Wireless SensorNetworks

23 Joint Contention And Sleep Control For Lifetime Maximization In Wireless SensorNetworks

24 Exploiting Ubiquitious Data Collection For Mobile Users In Wireless SensorNetworks

25 Clustering Algorithm For Non - Uniformly Distributed Nodes Inwireless SensorNetworks

26 Energy –Efficient Routing Protocols In Wireless Sensor Networks :A Survey

27 Load Balanced Clustering Algorithm With Distributed Self – OrganisationforWireless Sensor Networks

28 Ldts:A Light Weight And Dependable Trust System For Clustered Wireless SensorNetworks

SNO P.CODE TITLES

29 Emap:Expedite Message Authentication Protocol For Vehicular Ad Hoc Networks

30 Evaluation Of The Use Of Guard Nodes For Securing The Routing In Vanet

31 Team:Trust Extended Authentication Mechanismfor Vehicular Ad Hoc Networks

32 Discovery And Verification Of Neighbor Positions In Mobile Ad Hoc Networks

33 Investigating A Junction –Based Multipath Source Routing Algorithm For Vanet