Top Banner
IEEE / SOFTWARE PROJECTS In various Domains JAVA * J2EE * J2ME Latest Projects, 2008, 2009, 2010 Our Service Address
37

IEEE Project Titles 2010 - 2011

Nov 20, 2014

Download

Documents

brainrichtech

Contact : Mr. Sakthivel
Mobile : 09894604623
Phone:0422-4377414
Mail : [email protected]
Web : www.brainrichtech.com
Place : Coimbatore
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IEEE Project Titles 2010 - 2011

IEEE / SOFTWARE PROJECTS

In various Domains

JAVA * J2EE * J2MELatest Projects, 2008, 2009,

2010

Our Service Address

6/1, Selvanaayaki Complex1st Floor, Gokulae Street,

Ramnagar, Coimbatore- 641009.

Page 2: IEEE Project Titles 2010 - 2011

Mobile: 9894604623 Phone: 0422-4377414Mai : [email protected] Web : www.brainrichtech.com

We are offering IEEE & Non IEEE Projects

In various Domains including

IEEE Projects on Image ProcessingIEEE Projects on Knowledge and Data MiningIEEE Projects on NetworkingIEEE Projects on Artificial IntelligenceIEEE Projects on Audio and Video ProcessingIEEE Projects on Pattern Analysis & Machine IntelligenceIEEE Projects on MultimediaIEEE Projects on Parallel and Distributed SystemsIEEE Projects on Mobile ComputingIEEE Projects on Software Engineering

Page 3: IEEE Project Titles 2010 - 2011

IEEE Projects on Information Forensics and SecurityIEEE Projects on Dependable and Secure ComputingIEEE Projects on Systems, Man & CyberneticsIEEE Projects on ComputersIEEE Projects on Learning Technologies

PROJECT SUPPORTS & DELIVERABLES

Project Abstract IEEE Paper PPT / Review Details Project Report Working Procedure/Screen Shots

Page 4: IEEE Project Titles 2010 - 2011

Materials & Books in CD Project Certification

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE DIGITAL IMAGE PROCESSING

S.NO CODE PROJECT TITLE YEAR01 IP 01 Fast Image Recovery Using Variable

Splittingand Constrained Optimization

2010

02 IP 02 Sliding-Window Raptor Codes for Efficient Scalable Wireless Video Broadcasting with Unequal Loss Protection

2010

03 IP 03 Generic Lossless Visible Watermarking—A New Approach

2010

04 IP 04 Biased Discriminant Euclidean Embedding for Content-Based Image

2010

Page 5: IEEE Project Titles 2010 - 2011

Retrieval05 IP 05 Data Embedding in JPEG Bit stream

by Code Mapping2010

06 IP 06 Video Segmentation Based on Motion Coherence of Particles in a Video Sequence

2010

07 IP 07 Adaptive Non separable Wavelet Transform via Lifting and its Application to Content-Based Image Retrieval

2010

08 IP 08 Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization

2010

09 IP 09 Watermarking of Free-view Video 201010 IP 10 Ultrasound De speckling for Contrast

Enhancement2010

11 IP 11 A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding

2010

12 IP 12 Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment

2010

13 IP 13 Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks

2010

14 IP 14 A completed modeling of local binary pattern operator for texture classification

2010

15 IP 15 Soft Edge Smoothness Prior for Color Image Super-Resolution

2009

16 IP 16 A Shearlet Approach to Edge Analysis and Detection

2009

17 IP 17 Complex Wavelet Structural Similarity: A New Image Similarity Index

2009

18 IP 18 A Histogram Modification Framework 2009

Page 6: IEEE Project Titles 2010 - 2011

and Its Application for Image Contrast Enhancement

19 IP 19 Personal Authentication Using Hand Vein Triangulation and Knuckle Shape

2009

20 IP 20 Huber Fractal Image Compression 200921 IP 21 Active Mask Segmentation of

FluorescenceMicroscope Images

2009

22 IP 22 Color Texture Segmentation Based on the Modal Energy of Deformable Surfaces

2009

23 IP 23 Entropy Interpretation of the LogarithmicImage Processing Model With Application toContrast Enhancement

2009

24 IP 24 A New Look to Multichannel BlindImage Deconvolution

2009

25 IP 25 Improved Resolution Scalability forBilevel Image Data in JPEG2000

2009

26 IP 26 An Adaptable Image Retrieval System With Relevance Feedback Using Kernel Machines and Selective Sampling

2009

27 IP 27 A High-Capacity Steganography Scheme for JPEG2000 Baseline System

2009

28 IP 28 Independent Component Analysis-Based Background Subtraction for Indoor Surveillance

2008

29 IP29 Sparse Representation for Color Image Restoration

2008

30 IP30 High-Fidelity Data Embedding for Image Annotation

2008

31 IP31 A New Look to Multi channel Blind Image De-convolution

2008

Page 7: IEEE Project Titles 2010 - 2011

32 IP32 Image Segmentation Using Information Bottleneck Method

2008

33 IP33 A Fast Optimization Transfer Algorithm for Image In painting in Wavelet Domains

2008

34 IP34 Enhancement of Color Images by Scaling the DCT Coefficients

2008

35 IP35 Improved Resolution Scalability for Bilevel Image Data in JPEG2000

2008

36 IP36 A Unified Relevance Feedback Framework for Web Image Retrieval

2008

37 IP37 Optimal Spread Spectrum Watermark Embedding via a Multi step Feasibility Formulation

2008

38 IP38 Watermarking of Co lour Images in the DCT Domain Using Y Channel

2008

39 IP39 A Robust Image Encryption Scheme using State-Feedback Control

2008

40 IP40 Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature

2008

41 IP 41 A Histogram Modification Framework and Its Application for Image Contrast Enhancement

2008

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE KNOWLEDGE AND DATA MINING

Page 8: IEEE Project Titles 2010 - 2011

S.NO CODE PROJECT TITLE YEAR01 KD

01MILD: Multiple-Instance Learning via Disambiguation

2010

02 KD 02

LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs

2010

03 KD 03

An Up Down Directed Acyclic Graph Approachfor Sequential Pattern Mining

2010

04 KD 04

P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

2010

05 KD 05

Efficient Algorithm for Localized Support Vector Machine

2010

06 KD 06

Deriving Concept-Based User Profiles from Search Engine Logs

2010

07 KD 07

An Efficient Concept-Based Mining Model for Enhancing Text Clustering

2010

08 KD 08

Adaptive Subspace Symbolization for Content-Based Video Detection

2010

09 KD 09 Non-Negative Matrix

Factorization for Semisupervised Heterogeneous Data Coclustering

2010

10 KD 10

Efficient Relevance Feedback for Content-based Image Retrieval by Mining User Navigation Patterns

2010

11 KD 11

Adaptive Subspace Symbolization for Content-Based Video Detection

2010

12 KD 12

Record Matching over Query Resultsfrom Multiple Web Databases

2010

13 KD 13 Modeling Image Data for Effective

Indexing and Retrieval in Large

2009

Page 9: IEEE Project Titles 2010 - 2011

General Image Databases14 KD

14Towards Suspicious Behavior Discovery in Video Surveillance System

2009

15 KD 15

A Relation-Based Page Rank Algorithm for Semantic Web Search Engines

2009

16 KD 16

Learning Image-Text Associations 2009

17 KD 17

A Framework for ClusteringConcept-Drifting Categorical Data

2009

18 KD 18

Communication Perspective on AutomaticText Categorization

2009

19 KD 19

Predicting Missing Items in Shopping Carts

2009

20 KD 20

Exact Knowledge Hiding through Database Extension

2009

21 KD 21

Fast Query Point Movement Techniques for Large CBIR Systems

2009

22 KD 22

Evaluating the Effectiveness of Personalized Web Search

2009

23 KD 23

Similarity-Profiled Temporal Association Mining

2009

24 KD 24

Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval

2009

25 KD 25

Enhancing Learning Objects with an Ontology-Based Memory

2009

26 KD 26

Using Association Rule Mining to Improve Semantic Web Services Composition Performance

2008

27 KD 27

Biometric Authentication for Border Control Applications

2008

28 KD Desktop search in the intranet with 2008

Page 10: IEEE Project Titles 2010 - 2011

28 integrated desktop search engines29 KD

29A Least Grade Page Replacement Algorithm for Web Cache Optimization

2008

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE NETWORKING

S.NO CODE PROJECT TITLE YEAR01 NS

01Authenticated Group Key Transfer Protocol Based on Secret Sharing

2010

02 NS 02

S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks

2010

03 NS 03

Rate Control with Pair wise Intersession Network Coding

2010

04 NS 04

Equilibrium of Heterogeneous Congestion Control: Optimality and Stability

2010

05 NS 05

Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis

2010

06 NS 06

Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility

2010

07 NS 07

SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks

2010

08 NS 08

A Distributed CSMA Algorithm for 2010

Page 11: IEEE Project Titles 2010 - 2011

Throughput and Utility Maximization in Wireless Networks

09 NS 09

Upgrading Mice to Elephants: Effects and End-Point Solutions

2010

10 NS 10

Distributed Algorithms for Minimum Cost Multicast With Network Coding

2010

11 NS 11

Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints

2010

12 NS 12

Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and Approximations

2010

13 NS 13

Efficient and Dynamic Routing Topology Inference From End-to-End Measurements

2010

14 NS 14

Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications

2010

15 NS 15

Packet delay modeling of truncated multi-process arq protocols for parallelCommunications

2010

16 NS 16

Spatio-Temporal Network Anomaly Detection byAssessing Deviations of Empirical Measures

2009

17 NS 17

Monitoring the Application-Layer DDoS Attacks for Popular Websites

2009

18 NS 18

Multiple Routing Configurations for FastIP Network Recovery

2009

Page 12: IEEE Project Titles 2010 - 2011

19 NS 19

Improving Locality of Bit Torrent with ISP Cooperation

2009

20 NS 20

PRIME: Peer-to-Peer Receiver-Driven Mesh-Based Streaming

2009

21 NS 21

A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection

2009

22 NS 22

Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search

2009

23 NS 23

Capturing Router Congestion and Delay

2009

24 NS 24

Node Isolation Model and Age-Based NeighborSelection in Unstructured P2P Networks

2009

25 NS 25

Residual-Based Estimation of Peer and LinkLifetimes in P2P Networks

2009

26 NS 26

A Peer-to-Peer Resources Search Algorithm Based on Small-World Model

2009

27 NS 27

Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks

2009

28 NS 28

Multicast Capacity of Wireless Ad Hoc Networks

2009

29 NS 29

Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis

2009

30 NS 30

Novel Approach for Computation –Efficient

2009

Page 13: IEEE Project Titles 2010 - 2011

Rekeying for Multicast Key Distribution31 NS

31SIMPS: Using Sociology for Personal Mobility

2009

32 NS 32

DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks

2009

33 NS 33

Credit Card Fraud Detection Using Hidden Markov Model

2008

34 NS34 Encryption Techniques for the Security of Satellite Images

2008

35 NS35Modeling Node Capture Attacks in Wireless Sensor Networks

2008

36 NS36 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems

2008

37 NS37 The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols

2008

38 NS38 Honey pot Scheme for Distributed Denial-of-Service Attack

2008

39 NS39 Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis

2008

40 NS40 P2P File Sharing Software in IPv4/IPv6 Network

2008

41 NS41 Design and Implementation of a SIP-based Centralized Multimedia Conferencing System

2008

42 NS42 Design and Implementation of Distributed Firewall System for IPv6

2008

43 NS43 A Hypothesis Testing Approach to Semi-fragile Watermark Based Authentication

2008

44 NS44 A New RMI Framework for Outdoor 2008

Page 14: IEEE Project Titles 2010 - 2011

Objects Recognition45 NS45 Contributory group key exchange in

the presence of malicious participants2008

46 NS46 Schemes for Evaluating Signal Processing Properties of Audio Watermarking

2008

47 NS47 Double compression in JPEG images 200848 NS48 The Evaluation Report of SHA-256

Crypt Analysis Hash Function2008

49 NS49 Jig DFS: A Secure Distributed File System

2008

50 NS50 General access structures in audio cryptography

2008

51 NS51 Improving Locality of Bit Torrent with ISP Cooperation

2008

52 NS52 Minimizing File Download Time in StochasticPeer-to-Peer Networks

2008

53 NS53 Triple DES Algorithm Based Image Watermarking

2008

54 NS 54

Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks

2008

Page 15: IEEE Project Titles 2010 - 2011

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE MULTIMEDIA

S.NO CODE PROJECT TITLE YEAR01 M 01 A Stochastic Approach to Image

Retrieval Using Relevance Feedback and Particle Swarm Optimization

2010

02 M 02 An Efficient and Robust Algorithm for Shape Indexing and Retrieval

2010

03 M 03 An Adaptive Computational Model for Salient Object Detection

2010

04 M 04An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering

2010

05 M 05 A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm

2010

06 M 06 Image Annotation by Graph-Based Inference With Integrated Multiple/Single Instance Representations

2010

07 M 07 Network Awareness of P2P Live Streaming Applications: A Measurement Study

2010

08 M 08 Fine-Granularity Transmission Distortion Modeling for Video Packet Scheduling Over Mesh Networks

2010

09 M 09 Investigating the Scheduling 2009

Page 16: IEEE Project Titles 2010 - 2011

Sensitivity of P2P Video Streaming10 M 10 Coherent Phrase Model for Efficient

Image Near Duplicate Retrieval2009

11 M 11 Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor

2009

12 M 12 LayerP2P: Using Layered Video Chunks in P2P Live Streaming

2009

13 M 13Content-Based Image Retrieval Using Multi resolution Color and Texture Features

2008

14 M 14 Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques

2008

15 M 15 Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing

2008

16 M 16 Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver

2008

17 M 17 Locality-Awareness in BitTorrent-Like P2P Applications

2008

18 M 18 Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization

2008

19 M 19 Analyzing Voice Quality in Popular VoIP Applications

2008

20 M 20 Image Retrieval With Relevance Feedback Based on Graph-Theoretic Region Correspondence Estimation

2008

21 M 21 Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector

2008

22 M 22 Collision Attacks With Budget 2008

Page 17: IEEE Project Titles 2010 - 2011

Constraints on Key Management Schemes for Secure Multimedia Multicast

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE AUDIO,SPEECH & VIDEO PROCESSING

S.NO CODE PROJECT TITLE YEAR01 AV 01 Robust Multiplicative Patchwork

Method for Audio Watermarking2009

02 AV 02 Scalable Audio Compression at Low Bitrates

2008

03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based System for Large-Scale Conference Support

2008

04 AV 04 Extracting Question/Answer Pairs In Multi-Party Meeting

2008

05 AV 05 Hybrid Signal-and-Link-Parametric Speech Quality Measurement for VoIP Communications

2008

06 AV 06 Rate-Distortion Optimal Video Transport Over IP Allowing Packets With Bit Errors

2008

Page 18: IEEE Project Titles 2010 - 2011

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE ARTIFICAL INTELLIGENCE

S.NO CODE PROJECT TITLE YEAR01 AI 01 Vehicle Number Plate Recognition

Using Mathematical Morphology and Neural Networks

2008

02 AI 02 Vision-Based Eye Blink Monitoring System for Human-Computer Interfacing

2008

03 AI 03 Multi-modal Interfaces for Interaction Communication between Hearing and Visually Impaired Individuals: Problems & Issues

2008

04 AI 04 Embedded Vehicle Control System Based on Voice Processing Technologies

2008

Page 19: IEEE Project Titles 2010 - 2011

05 AI 05 A Test bed for Voice-Based Robot Control

2008

06 AI 06 Human Voice Based Wheel Chair Control

2008

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE MOBILE COMPUTING

S.NO CODE PROJECT TITLE YEAR01 MC01 Optimal Jamming Attack

Strategies and Network Defense Policies in Wireless Sensor Networks

2010

02 MC02 MABS: Multicast Authentication Based on Batch signature

2010

03 MC03 Handling Mobility in Wireless Sensor and Actor Networks

2010

04 MC04 Clustering and cluster-based routing protocol for delay-

2010

Page 20: IEEE Project Titles 2010 - 2011

tolerant mobile networks05 MC

05Efficient Load-Aware Routing Scheme for Wireless Mesh Networks

2010

06 MC 06

Distributed Multilevel Hierarchic Strategy for Broadcast Collaborative Mobile Networks

2010

07 MC 07

A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement

2010

08 MC 08

Vebek: virtual energy-based encryption and keying for wireless sensorNetworks

2010

09 MC 09

Energy-Efficient Communication Scheme forMobile Ad Hoc Networks

2009

10 MC 10

A Novel Scheduled Power Saving Mechanism for 802.11 Wireless LANs

2009

11 MC 11

MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks

2009

12 MC 12

Mitigation of Control Channel Jamming under Node Capture Attacks

2009

13 MC 13

Tabu Search Algorithm for Cluster Buildingin Wireless Sensor Networks

2009

14 MC 14

An Energy Efficient Communication Scheme for Mobile AD HOC Networks

2009

15 MC 15

Hybrid routing in clustered DTNs with message ferrying

2007

Page 21: IEEE Project Titles 2010 - 2011

16 MC 16

Transmission Power Control in Wireless Ad Hoc Networks

2007

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE INFORMATION AND FORENSICS SECURITY

S.NO CODE PROJECT TITLE YEAR01 IF 01

Edge Adaptive Image Steganography Based on LSB Matching Revisited

2010

02 IF 02Blind Authentication: A Secure Crypto-Biometric Verification Protocol

2010

03 IF 03Predictive Network Anomaly Detection and Visualization

2010

04 IF 04Lossless Data Embedding in Electronic Inks

2010

05 IF 05SVD-Based Universal Spatial Domain Image Steganalysis

2010

06 IF 06Reversible Image Watermarking Using Interpolation Technique

2010

07 IF 07MPSteg-Color: Data Hiding Through Redundant Basis Decomposition

2009

08 IF 08 Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis

2009

09 IF 09 Halftone Visual Cryptography Via Error Diffusion

2009

10 IF 10 A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication

2009

Page 22: IEEE Project Titles 2010 - 2011

11 IF 11 Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents

2009

12 IF 12 Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms

2009

13 IF 13 Spread-Spectrum Watermarking Security

2008

14 IF 14Robust Blind Watermarking of Point-Sampled Geometry

2009

15 IF 15 Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack

2008

16 IF 16 Multipurpose Watermarking Based on Multiscale Curvelet Transform

2008

17 IF 17 Cryptographic Secrecy of Steganographic Matrix Embedding

2008

18 IF 18 Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase

2008

19 IF 19 A Novel Difference Expansion Transform for Reversible Data Embedding

2008

20 IF 20 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems

2008

21 IF 21Color Image Watermarking Using Multidimensional Fourier Transforms

2008

Page 23: IEEE Project Titles 2010 - 2011

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Pattern Analysis & Machine Intelligence

S.NO CODE PROJECT TITLE YEAR01 PA 01 Using Language to Learn Structured

Appearance Models for Image Annotation

2010

02 PA 02 A Boosting Framework for Visuality-Preserving Distance Metric Learning and Its Application to Medical Image Retrieval

2010

03 PA 03 Accurate Image Search Using the Contextual Dissimilarity Measure

2010

04 PA 04 Faster and Better: A Machine LearningApproach to Corner Detection

2010

05 PA 05 In the Eye of the Beholder: A Survey of Models for Eyes and Gaze

2010

06 PA 06 Polynomial Time Algorithms for Ratio Regions and a Variant of Normalized Cut

2010

07 PA 07 Single-Image Super-Resolution Using Sparse Regression and Natural Image Prior

2010

08 PA 08 Self-Similarity and Points of Interest 201009 PA 09 Iris Recognition: On the Segmentation

of Degraded Images Acquired in the Visible Wavelength

2010

10 PA 10 Image Segmentation with a Unified Graphical Model

2010

11 PA 11Auto-Context And Its Application To High-Level Vision Tasks And 3d Brain Image Segmentation

2010

Page 24: IEEE Project Titles 2010 - 2011

12 PA 12Robust 3d Face Recognition By Local Shape Difference Boosting

2010

13 PA 13Rotation Invariant Texture Classification using LBP Variance (LBPV) with Global Matching

2010

14 PA 14 A Perceptually Inspired Variation Framework for Color Enhancement

2009

15 PA 15 Image Transformations and Blurring 200916 PA 16 Robust Wavelet-Based Super-

Resolution Reconstruction: Theory and Algorithm

2009

17 PA 17 IRGS: Image Segmentation Using Edge Penalties and Region Growing

2009

18 PA 18 Real World Image Annotation and Retrieval

2008

19 PA 19 Visual Rank: Applying Page Rank to Large-Scale Image Search

2008

20 PA 20 Localized Content-Based Image Retrieval

2008

21 PA 21 Annotating Images by Mining Image Search Results

2008

22 PA 22 A Discriminative Kernel-Based Approach to Rank Images from Text Queries

2008

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Internet Computing

S.NO CODE PROJECT TITLE YEAR01 I 01 Learning-Based Approaches for 2010

Page 25: IEEE Project Titles 2010 - 2011

Matching Web Data Entities02 I 02

Peer-to-Peer 3D Streaming2010

03 I 03Incentive Mechanisms in P2P Media Streaming Systems

2010

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Parallel And Distributed Systems

S.NO CODE PROJECT TITLE YEAR01 PD 01 An Efficient and Adaptive

Decentralized File Replication Algorithm in P2P File Sharing Systems

2010

02 PD 02 An Analytical Approach to Optimizing Parallel Image Registration/Retrieval

2010

03 PD 03 Improving Reliability for Application-Layer Multicast Overlays

2010

04 PD 04 Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems

2010

05 PD 05 Snoogle: A Search Engine for Pervasive Environments

2010

06 PD 06 A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks

2010

07 PD 07 Correlation-Based Traffic Analysis Attacks on Anonymity Networks

2010

08 PD 08 A Hypergraph Approach to Linear Network Coding in Multicast Networks

2010

Page 26: IEEE Project Titles 2010 - 2011

09 PD 09 On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic

2010

10 PD 10 SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks

2010

11 PD 11 Privacy in VoIP Networks: Flow Analysis Attacks and Defens

2010

12 PD 12 Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?

2010

13 PD 13 mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming

2010

14 PD 14 Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs

2010

15 PD 15 A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming

2010

16 PD 16 Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks

2010

17 PD 17 A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer

2010

18 PD 18 Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows

2009

19 PD 19 PEACE: A Novel Privacy-Enhanced YetAccountable Security Framework forMetropolitan Wireless Mesh Networks

2010

20 PD 20 Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming

2009

21 PD 21 Enforcing Minimum-Cost Multicast Routingagainst Selfish Information Flows

2009

22 PD 22 Scalable Routing in Cyclic Mobile Networks

2009

23 PD 23 Dynamic Search Algorithm in 2009

Page 27: IEEE Project Titles 2010 - 2011

UnstructuredPeer-to-Peer Networks

24 PD 24 Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks

2009

25 PD 25 A Faithful Distributed Mechanism for Sharingthe Cost of Multicast Transmissions

2009

26 PD 26 Multipath Dissemination in Regular Mesh Topologies

2009

27 PD 27 Detecting Malicious Packet Losses 200928 PD 28 Diverse Firewall Design 200829 PD 29 Free-Riding on BitTorrent-Like Peer-

to-Peer File Sharing Systems: Modeling Analysis and Improvement

2008

30 PD 30 Computation-Efficient Multicast Key Distribution

2008

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Dependable and Secure Computing

S.NO CODE PROJECT TITLE YEAR01 DSC

01Layered Approach Using Conditional Random Fields for Intrusion Detection

2010

02 DSC 02

In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm

2010

03 DSC 03

An Advanced Hybrid Peer-to-Peer Botnet

2010

04 DSC 04

Error Detection and Fault Tolerance in ECSM Using Input Randomization

2009

05 DSC Security Analysis of the SASI 2009

Page 28: IEEE Project Titles 2010 - 2011

05 Protocol06 DSC

06Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing

2009

07 DSC 07

The Effectiveness of Checksums for Embedded Control Networks

2009

TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE Software Engineering

S.NO CODE PROJECT TITLE YEAR01 SW 01 On Event-Based Middleware For Location-

Aware Mobile Applications2010

02 SW 02 Enhanced Modeling and Solution of Layered Queuing Networks

2009

03 SW 03 COMOM: Efficient Class Oriented Evaluation of Multiclass Performance Models

2009

04 SW 04 An Investigation Into the Functional Form of the Size-Defect Relationship For Software Modules

2009

05 SW 05 Optimized Resource Allocation for Software Release Planning

2009

06 SW 06 Automatic Extraction of Heap 2009

Page 29: IEEE Project Titles 2010 - 2011

ReferenceProperties in Object-Oriented Programs

07 SW 07 CHARMY: A Framework for Designing andVerifying Architectural Specifications

2009

08 SW 08 Synthesis of Partial Behavior Models from Properties and Scenarios

2009

09 SW 09 Identification of Move  Method Refactoring Opportunities

2009

10 SW 10 A Hierarchical Model  for Object-Oriented Design Quality Assessment

2009

11 SW 11 Variability and  Reproducibility in Software Engineering: A Study of Four Companies that  Developed the same System

2009