Top Banner
2010 new titles Dotnet 1. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing 2. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs 3. AI and Opinion Mining 4. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature 5. An economic approach for scalable and highly-available distributed applications 6. Analysis of P2P File Sharing Network’s Credit 7. Conditional Shortest Path Routing in Delay Tolerant Networks 8. Dynamic Authentication for Cross-Realm SOA-Based Business Processes 9. Efficient and Robust Detection of Duplicate Videos in a Large Database 10. Fuzzy Keyword Search over Encrypted Data in Cloud Computing 11. Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor Networks 12. MABS Multicast Authentication Based on Batch Signature 13. Privacy-Preserving Public Auditing for Data Storage 14. SigFree A Signature-free Buffer Overflow Attack Blocker 15. Data Leakage Detection 16. Inference From Aging Information 17. VEBEK__Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks 18. A Study for Important Criteria of Feature Selection in Text Categorization Java 1. Layered Approach Using Conditional Random Fields for Intrusion Detection
29

Project Titles

Nov 22, 2014

Download

Documents

Dayanand Sagar
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Project Titles

2010 new titlesDotnet

1. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing2. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs3. AI and Opinion Mining4. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature5. An economic approach for scalable and highly-available distributed applications6. Analysis of P2P File Sharing Network’s Credit7. Conditional Shortest Path Routing in Delay Tolerant Networks8. Dynamic Authentication for Cross-Realm SOA-Based Business Processes9. Efficient and Robust Detection of Duplicate Videos in a Large Database10. Fuzzy Keyword Search over Encrypted Data in Cloud Computing11. Localized Multicast Efficient and Distributed Replica Detection in Large-Scale Sensor

Networks12. MABS Multicast Authentication Based on Batch Signature13. Privacy-Preserving Public Auditing for Data Storage14. SigFree A Signature-free Buffer Overflow Attack Blocker15. Data Leakage Detection16. Inference From Aging Information17. VEBEK__Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks18. A Study for Important Criteria of Feature Selection in Text Categorization

Java1. Layered Approach Using Conditional Random Fields for Intrusion Detection2. IRM Integrated File Replication and Consistency Maintenance in P2P Systems3. A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming4. Ensuring Data Storage Security in Cloud Computing5. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation6. Always Acyclic Distributed Path Computation7. A Review of the Applications of Agent Technology In Traffic and Transportation Systems8. Host-to-Host Congestion Control for TCP9. Mesh Based Multicast Routing in MANET Stable Link Based Approach10. Random Access Transport Capacity11. BinRank Scaling Dynamic Authority-Based Search Using Materialized Subgraphs12. Closeness: A New Privacy Measure for Data Publishing13. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless

Networks14. Managing Multidimensional HistoricalAggregate Data in Unstructured P2P Networks15. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements16. Novel defense mechanism against data flooding attacks in wireless ad hoc networks17. Mitigating selective forwarding attacks with a channel-aware approach in WMNS18. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability

Page 2: Project Titles

19. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

20. PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects

21. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes22. Bandwidth recycling in IEEE 802.16 Networks23. Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems24. POPI A User-level Tool for Inferring Router Packet Forwarding Priority25. on MultiHop Distances in Wireless Sensor Networks with Random Node Locations26. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems27. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks28. on Modeling, Analysis, and Optimization of Packet Aggregation Systems

Java Project Titles

Domine: NETWORKING

S.No CodeProject title Description Type Year

1 SJNW01 Lightweight Online Performance Monitoringand Tuning with Embedded Gossip

In this project , a new performance monitoring approach called Embedded Gossip (EG) is designed to enable lightweight online performance monitoring and tuning.

IEEE 2009

2 SJNW02 Privacy-Aware Collaborative Spam Filtering In this project, we propose a privacy-aware framework for collaborative spam filtering , preserving message transformance technique that is highly resilient against the latest kinds of spam attacks.

IEEE 2009

3 SJNW03 Dynamic Search Algorithm in UnstructuredPeer-to-Peer Networks

In this project, we propose the dynamic serach(DS) algorithm which is a generalization of flooding and RW.

IEEE 2009

Page 3: Project Titles

4 SJNW04 A Decentralized Method for Scaling UpGenome Similarity Search Services

This paper tackles this problem in a novel wat, which treats sequence search requests as content requests to both genome databases and similarity detection methods.

IEEE 2009

5 SJNW05 Plexus: A Scalable Peer-to-Peer ProtocolEnabling Efficient Subset Search

In this project, Plexus a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit sequence(pattern), and discovering it using any subset of its 1-bits.

IEEE 2009

6 SJNW06 Cooperative Secondary Authorization Recycling In this project, an approach where each application server recycles previously received authorizations and shares them with other application servers to mask authorization server failures and network delays.

IEEE 2009

7 SJNW07 Robust Rate Control for HeterogeneousNetwork Access in Multihomed Environments

In this project, a novel robust flow control framework for heterogeneous network access by devices with multi-homing capabilities.

IEEE 2009

Domain: Datamining

S.No CodeProject title Description Type Year

Page 4: Project Titles

1 SJDM01 Catching the Trend: A Framework for ClusteringConcept-Drifting Categorical Data

In this project, the framework is practical for detecting drifting concepts in time-evolving categorical data.

IEEE 2009

2 SJDM02 CDNs Content Outsourcingvia Generalized Communities

We dealt with content selection problem withy content should be outsourced in CDN’s surrogate servers.

IEEE 2009

3 SJDM03 IMine: Index Support for Item Set Mining The IMine index is a novel index structure that supports efficient item set mining into a relational DBMS.

IEEE 2009

4 SJDM04 Progressive Parametric Query Optimization We propose instead to progressively explore the parameter space and build a parametric plan during several executions of the same query.

IEEE 2009

Domain: Mobile Computing

S.No Code Project title Description Type Year

1 SJMC01 A Tabu Search Algorithm for Cluster Buildingin Wireless Sensor Networks

In this project the main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes.

IEEE 2009

2 SJMC02 Efficient Broadcasting in MobileAd Hoc Networks

In our project two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based broadcasting

IEEE 2009

Page 5: Project Titles

algorithms, specifically the algorithm proposed by Liu et al.

3 SJMC03 Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments

In this project our goal is to sharing audio and video resources between Media environments.

IEEE 2009

Domain: Network Security

S.No CodeProject title Description Type Year

1 SJNS01 Mitigating Denial-of-Service Attacks onthe Chord Overlay Network:A Location Hiding Approach

In this project Location Guard—a location hiding technique for securing overlay file storage systems from targeted file attacks

IEEE 2009

2 SJNS02 A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

In this project novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other.

IEEE 2009

3 SJNS03 Dynamic Routing with Security Considerations In this project a dynamic routing algorithm that could randomize delivery paths for data transmission.

IEEE 2009

4 SJNW04 Efficient Node Admission and CertificatelessSecure Communication in Short-Lived MANETs

This project, we focus on a common type of MANETS that is formed on a temporary efficient, and a fully no interactive admission technique geared for this type of network.

IEEE 2009

Page 6: Project Titles

Domain: Grid Computing

S.No CodeProject title Description Type Year

1 SJGC01 Bi-Criteria Scheduling of Scientific Grid Workflows In this project we propose a new bi-criteria scheduling specifiucation method defining for the secondary criterion a sliding constraint as a function of the primary criterion.

IEEE 2009

2 SJGC02 TCP Performance in Flow-Based Mix Networks:Modeling and Analysis

In this project, we systematically address TCP performance issues of flow-based mix networks. A mix’s batching and reordering schemes can dramatically reduce TCP throughput due to out-of-order packet delivery

IEEE 2009

3 SJGC03 Adaptive Task Checkpointing and Replication:Toward Efficient Fault-Tolerant Grids

In this project we introduce several heuristics that dynamically adapt to various parameters based on information on grid status to provide high job throughput in the presence of failure while reducing the system overhead.

IEEE 2009

Sno Project Title -JAVA Type Year01 Flexible Rollback Recovery in Dynamic

Heterogeneous Grid ComputingIEEE 2009

02 A Divide-and-Conquer Approach for Minimum Spanning Tree-Based Clustering

IEEE 2009

03 AN OPTIMIZED SOLUTION FOR MOBILE

COMPUTING

IEEE 2009

04 Detecting Malacious Packet IEEE 2009

Page 7: Project Titles

05 Dynamic Routing with Security Considerations IEEE 200906 EnergyMaps For Mobile Wireless networks

coherence Time Versues SpredIEEE 20009

07 Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis

IEEE 2009

08 Interactive Correction and Recommendation forComputer Language Learning and Training

IEEE 2009

09 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

IEEE 2009

10 Large Connectivity for Dynamic RandomGeometric Graphs

IEEE 2009

11 Measuring Capacity Bandwidth of TargetedPath Segments

IEEE 2009

12 Mitigation of Control Channel Jamming under Node Capture Attacks

IEEE 2009

13 Mobility Management Approaches for

Mobile IP Networks

IEEE 2009

14 Monitoring the Application-Layer DDoS Attacks for Popular Websites

IEEE 2009

`15 Multiple Routing Configurations for Fast IP

Network Recovery

IEEE 2009

16 RAAM: ROUTING ALGORITHM USING ANT

AGENTS FOR MANETS

IEEE 2009

17 Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures

IEEE 2009

18 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks

IEEE 2008

19 A Geometric Approach to Improving ActivePacket Loss Measurement

IEEE 2008

Page 8: Project Titles

20 A LOSSLESS COMPRESSION SCHEME FOR BAYER COLOR FILTER ARRAY IMAGES

IEEE 2008

21 A Model-Based Approach to Evaluation of the IEEE 200822 A NEW HEURISTIC FOR MINIMIZING THE

DELAY VARIATION IN MULTICASTINGIEEE 2008

23 A PRECISE TERMINATION CONDITION OF THE PROBABIISTIC PACKET MARKING ALGORITHM

IEEE 2008

24 An Efficient Association Rule Mining Algorithm In Distributed Databases

IEEE 2008

25 An Efficient Clustering Scheme to Exploit IEEE 200826 Bandwidth Estimation for IEEE 802.11-Based Ad

Hoc NetworksIEEE 2008

27 Constructing Inter-Domain Packet Filters to

Control IP Spoofing Based on BGP Updates

IEEE 2008

28 C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data

IEEE 2008

29 Efficient and Secure Content Processing

and Distribution by Cooperative Intermediaries

IEEE 2008

30 Efficient and Secure Content Processing

and Distribution by Cooperative Intermediaries

IEEE 2008

31 Image Restoration Using Space-Variant GaussianScale Mixtures in Over complete Pyramids

IEEE 2008

32 Incremental Learning of Chunk Data for Online

Pattern Classification Systems

IEEE 2008

33 Measurement-Based Admission Control at Edge

Routers

IEEE 2008

34 Modeling and Automated containment of worms IEEE 2008

Page 9: Project Titles

35 Modeling and AutomatedContainment of Worms

IEEE 2008

36 NDT: A Model-Driven Approach

For Web Requirements

IEEE 2008

37 Performance Analysis and Optimization of

Handoff Algorithms in Heterogeneous Wireless

Networks

IEEE 2008

38 Problem Oriented Software EngineeringSolving the Package Router Control Problem

IEEE 2008

39 Sequential Object Sharing for Edge Services IEEE 2008

40 An Integrated Framework for Security and

Dependability

IEEE 2008

41 A Signature-Based Indexing Method for Efficient

Content-Based Retrieval of Relative Temporal

Patterns

IEEE 2008

42 Truth Discovery with Multiple Conflicting InformationProviders on the Web.

IEEE 2008

43 Two Techniques for Fast Computation ofConstrained Shortest Paths

IEEE 2008

44Using the Conceptual Cohesion of Classes for

Fault Prediction in Object-Oriented Systems

IEEE 2008

Page 10: Project Titles

45 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks

IEEE 2008

46 Dual Link Failure Resiliency through IEEE 200847 EFFICIENT RESOURCE ALLOCATION FOR IEEE 200848 Efficient Routing in Intermittently Connected

Mobile NetworksIEEE 2008

49 Enhancing Search Performance in IEEE 200850 Mitigating Performance Degradation in Congested

Sensor NetworksIEEE 2008

51 On the Performance Benefits of IEEE 200852 ONLINE INDEX RECOMMENDATIONS FOR

HIGHIEEE 2008

53 Optimal State Allocation for Multicast IEEE 200854 PROBABILISTIC GROUP NEAREST NEIGHBOR

QUERY IN UNCERTAIN DATABASEIEEE 2008

55 Ranked Reverse Nearest Search IEEE 200856 Securing User IEEE 200857 Strategy proof Mechanisms for Scheduling

Divisible Loads in BusIEEE 2008

58 The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems

IEEE 2008

59 USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT PREDICTION IN OBJECT

IEEE 2008

60 An Adaptive Programming Model IEEE 200761 Detecting Phishing Web Pages with Visual

Similarity Assessment Based on Earth Mover’s

Distance (EMD)

IEEE 2006

62 Detecting Internet Applications Using Neural Networks

IEEE 2006

63 Distributed Cache Updating for the Dynamic Source Routing Protocol

IEEE 2006

64 Personal Authentication Using 3-D Finger Geometry

IEEE 2006

65 Face Recognition Using Laplacianfaces IEEE 200566 Voice Based Security System IEEE 200567 Authentication of People by their typing patterns IEEE 200468 Distributed Database Architecture for Global

Roaming in Next –Generation Mobile Network

IEEE 2004

Page 11: Project Titles

69 Network Border Patrol: Preventing Congestion

Collapse

IEEE 2004

70 ODAM IEEE 200471 Noise Reduction by Fuzzy Image Filtering IEEE 2003

72 Telecom Connection System WEB -73 Automated Ballot Vote WEB -74 Corporate Help Desk WEB -75 Digital Tunes WEB -76 Easy Journey WEB -77 Elegant Trade Supervision System WEB -78 File Tracking System WEB -79 Friendz Avenue WEB -80 Grumell Cell WEB -81 High-Fi Infromary WEB -82 Insurance WEB -83 Intra Communication Software WEB -84 IT Enabled Acadamic WEB -85 James Mailing System WEB -86 Mobile Banking WEB -87 Multi Banking System WEB -88 My Mission Without Crime WEB -89 Net Auction WEB -90 Online Tele Network WEB -91 Organizational Conference WEB -92 Resorts Management WEB -93 Resource Pool WEB -94 Unified Database Interface WEB -95 Voyage Management WEB -96 Web Pharmaceuticals WEB -97 Web based Mail client WEB -98 Web Locker WEB -99 File Splitter WEB -100 SAX-XML Parser WEB -101 Virtual Class Room WEB -102 Stock Agent WEB -103 Search Engine WEB -104 Customer Support Service Operation WEB -105 Distributed Channel Management Syste1 WEB -

106 Chart Generator NET -107 Computer Resource Management System NET -

Page 12: Project Titles

108 COREBANKING NET -109 DBReport NET -110 Desk Share Introdution NET -111 DeskShare NET -112 Digital Water Marking NET -113 Distributed Channel Management System NET -114 DNSSERVER NET -115 EautoMarket NET -116 ENTERPRISE RESOURCE INFORMATION

SYSTEMNET -

117 FTPC introduction NET -118 FTPM NET -119 Image Processing NET -120 INTRANET CHATTING NET -121 Intranet Protocal NET -122 IRC-CLIENT Itroduction NET -123 Jedit NET -124 JFSecurity NET -125 JMOL NET -126 JWAVE NET -127 NetProxey introduction NET -128 PDF Parser NET -129 PTSM NET -130 SEARCH DESK NET -131 SQL Client NET -132 Stock-Agent introduction NET -133 Virtual TV NET -

Dot Net Project Titles

Domine: NETWORKING

S.No CodeProject title Description Type Year

1 SDNW01 A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service

This model proposes improving the scalability of video-on-demand service over internet by analyzing user behavior

IEEE 2009

Page 13: Project Titles

2 SDNW02 A Parameterized Approach to Spam-ResilientLink Analysis of the Web

This paper propose ranking of url based on counting total no. visitors online on the url& counting total no. visitors on the application.

IEEE 2009

3 SDNW03 Effective Collaboration with InformationSharing in Virtual Universities This paper aims to

build a new rule-based framework to identify and address issues of sharing in virtual university environments through role-based access control (RBAC) managememt for e-learning systems.

IEEE 2009

4 SDNW04 Enhancing Downlink Performance inWireless Networks by SimultaneousMultiple Packet Transmission In this paper , we

consider using simultaneous Multiple Packet Transmission(MPT) to improve the downlink performance of networks. The sender can send two compatible packets simultaneous to two distinct receivers.

IEEE 2009

5 SDNW05 Network-Coding-Based Signal Recovery forEfficient Scheduling in Wireless Networks

In this paper, we propose some practicle schemes to recover the useful signal from the collided signals for different types of wireless channels; thus, the throughput and network efficiency can greatly be increased. The proposed schemes are based on the network coding

IEEE 2009

Page 14: Project Titles

technique and performed on the physical layer.

6 SDNW06 Measuring Capacity Bandwidth of Targeted Path Segments.

In this project we are measuring the capacity of network bandwidth using1 single packet probing method.2 packet bunch probing method.3 uniform packet-pair probing method.4 non-uniform packet pair probing method.

IEEE 2009

7 SDNW07 Histogram-Based Global Load Balancingin Structured Peer-to-Peer Systems

This project explains load balancing in networks.1 Maintaining the load information.2. Redistributing the load if it exceeds the limit.

IEEE 2009

Domain: Datamining

S.No CodeProject title Description Type Year

1 SDDM01Optimal Lot Sizing Policies for Sequential Online Auctions

This project is to Reduce lots( number of items) sizes for onhline selling or buying.

IEEE 2009

2 SDDM02 Distributional Features for Text Categorization This project explains use of the semantic communities and the emerging semantic

IEEE 2009

Page 15: Project Titles

relations in a dynamic complex network of learning resources.

Domain: Network Security

S.No CodeProject title Description Type Year

1 SDNS01 Enhanced Security for Online ExamsUsing Group Cryptography

This project proposes enhanced secure online exam management environment mediated by group cryptography using remote monitoring and control of ports

IEEE 2009

2 SDNS02 A Secure Mobile Healthcare System usingTrust-Based Multicast Scheme

This project shows about the technique of trust evaluation without a centeralized trust managent authority and propose a trust evaluation model that can efficiently calculate the trustworthiness of mobile healthcare.

IEEE 2009

3 SDNS03 Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens

In this project, we explored private information-sharing Behaviour of preteen and early teen internet users by social congnitive theory and rotection motivation theory.

IEEE 2009

Domain: Image Processing

S.No Code Project title Description Type Year

1 SDIP01 Gradient Estimation Using Wide Support Operators

This project proposes Removing noise from picture by detecting edges.

IEEE 2009

2 SDIP02 Sharpening Dermatological Color ImagesIn the Wavelet Domain

This project proposes finding boundaries in the image and adaptive

IEEE 2009

Page 16: Project Titles

image demising.3 SDIP03 Continuous Glass Patterns for Painterly

RenderingIn this project, we are converting digital photograph into painting image.

IEEE 2009

Domain: Software Engineering

S.No Code Project title Description Type Year

1 SDSE01 Variability and Reproducibility in Software Engineering: A Study of Four Companiesthat Developed the Same System

This project proposes increasing reproducibility and quality in software product

IEEE 2009

2 SDSE02 Predicting Project Velocity in XP Using aLearning Dynamic Bayesian Network Model

This project, Accurate prediction and risk assessment in XP using Bayesian Network Model

IEEE 2009

Domain: Multimedia

S.No Code Project title Description Type Year

1 SDMM01 AUTOMATED BIDDING FOR MEDIA SERVICES AT THE EDGE OF A CONTENT DELIVERY NETWORK

This project downloading and transmitting data’s depending on user accounts.

IEEE 2009

Domain: Mobile Computing

S.No Code Project title Description Type Year

1 SDMC01 Overlapped Carrier-Sense Multiple Access(OCSMA) in Wireless Ad Hoc Networks

This project proposed for enchancing network throughput through transferring content to station(source to destination) is done

IEEE 2009

Page 17: Project Titles

by transferring data through nearby nodes.

2 SDMC02 Signaling for Multimedia Conferencingin Stand-Alone Mobile Ad Hoc Networks

This project, passing data through invitation of neighboring nodes and an algorithm proposed for the same.

IEEE 2009

Dot Net Project Titles

S.No Project Title Dot Net Type Year1 A Gen2-Based RFID Authentication Protocol for Security and Privacy IEEE 20092 A Tabu Search Algorithm for Cluster Building IEEE 20093 Analysis of Shortest Path Routing for Large IEEE 20094 Biased Random Walks in Uniform Wireless Networks IEEE 20095 Cell Breathing Techniques for Load Balancing in Wireless LANs IEEE 2009

6Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period IEEE 2009

7Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows IEEE 2009

8English to Spanish Translation of Signboard Images from Mobile Phone Camera IEEE 2009

9Explicit Load Balancing Technique for NGEO Satellite IP Networks with On IEEE 2009

10 Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks IEEE 2009

11Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking IEEE 2009

12Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks IEEE 2009

13On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Routing and Coverage Constraint IEEE 2009

14RandomCast An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks IEEE 2009

15Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications IEEE 2009

16Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services IEEE 2009

17 Route Stability in MANETs under the Random Direction Mobility Model IEEE 200918 Secure and Policy-Compliant Source Routing IEEE 200919 The Effectiveness of Checksums for Embedded Control Networks IEEE 2009

20Two Blocking Algorithms on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification IEEE 2009 

Page 18: Project Titles

21A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems IEEE 2008

22 A Geometric Approach to Improving Active Packet Loss Measurement IEEE 200823 A New Model For Dissemination Of XML Content IEEE 2008

24A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video IEEE 2008

25A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks IEEE 2008

26A Wavelet-Laplace Variation Technique For Image Deconvolution and Inpainting IEEE 2008

27 Active Learning Methods for Interactive Image Retrieval IEEE 2008

28An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis IEEE 2008

29An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting IEEE 2008

30 Analyzing and Managing Role-Based Access Control Policies IEEE 200831 Bandwidth-Satisfied Multicast Trees in MANETs IEEE 200832 BENEFIT-BASED DATA CACHING IN AD HOC NETWORKS IEEE 200833 Computation-Efficient Multicast Key Distribution IEEE 2008

34Continuous Delivery Message Dissemination Problems under the Multicasting IEEE 2008

35 Credit Card Fraud Detection Using Hidden Markov Model IEEE 2008

36Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE 2008

37 Distributed Mobility Management for Target Tracking in IEEE 2008

38 Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements IEEE 2008

39 Efficient Broadcasting Using Network Coding IEEE 200840 Efficient Resource Allocation for Wireless Multicast IEEE 2008

41Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case IEEE 2008

42 Estimation of Defects Based on Defect Decay Model: ED3M IEEE 200843 Grid Service Discovery with Rough Sets IEEE 200844 Hardware enhanced association rule mining with Hashing and Pipelining IEEE 2008

45HBA: Distributed Metadata Management for Large Cluster-Based Storage Systems IEEE 2008

46 High resolution Animated Scenes from Stills IEEE 2008

47Image Interpolation by Adaptive 2-D Autoregressive Modeling and Soft-Decision Estimation IEEE 2008

48 Incentive-Based Scheduling for Market-Like Computational Grids IEEE 200849 Localized Sensor Area Coverage with Low Communication Overhead IEEE 200850 Mining Weighted Association Rules without Pre-assigned Weights IEEE 200851 On Guaranteed Smooth Switching for Buffered Crossbar Switches IEEE 200852 On the Computational Complexity and Effectiveness of N IEEE 2008

53Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High- Capacity Approach IEEE 2008

54Piecewise Linear Digital Curve Representation And Compression Using Graph Theory And a Line Segment Alphabet IEEE 2008

55 Probabilistic Packet Marking for Large Scale IP Trace back IEEE 2008

Page 19: Project Titles

56Rate Allocation and Network Lifetime Problems for Wireless Sensor Networks IEEE 2008

57 Rateless Forward Error Correction for Topology-Transparent Scheduling IEEE 200858 Semantic Ideation Learning for Agent IEEE 200859 Semantics-Based Design for Secure Web Services IEEE 200860 SSL Backend Forwarding scheme in Cluster IEEE 200861 Statistical Techniques for Detecting Traffic Anomalies through Packet IEEE 2008

62Temporal Partitioning of Communication Resources in an Integrated Architecture IEEE 2008

63Trustworthy Computing under Resource Constraints with the DOWN Policy IEEE 2008

64Vision Processing for Real-time 3-D Data Acquisition Based on Coded Structured Light IEEE 2008

65Watermarking Relational Databases Using Optimization-Based Techniques IEEE 2008 

66A Coupled Statistical Model for Face Shape Recovery From Brightness Images IEEE 2007

67Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks IEEE 2007

68A Formal Framework for Automated Round-trip Software Engineering in Static Aspect Weaving and Transformations IEEE 2007

69 Adaptive Route Optimization in Hierarchical Mobile IPV6 Networks IEEE 200770 Alert Based Monitoring of Stock Trading Systems IEEE 2007

71An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows IEEE 2007

72API-Based and Information Theoretic Metrics for Measuring the Quality of Software Modularization IEEE 2007

73 Detecting Wide Lines Using Isotropic Nonlinear Filtering IEEE 200774 Detection and removal of cracks and in digitized Paintings IEEE 200775 Digital Image Tracing by Sequential Multiple Watermarking IEEE 200776 Distributed Collaborative Key Agreement for Dynamic Peer Groups IEEE 200777 EEG Automated Detection of Epilepsy Using Neural Networks IEEE 200778 Efficient Approximate Query Processing in Peer-to-Peer Networks IEEE 2007

79Efficient Broadcasting with Guaranteed Coverage in Mobile AD-HOC Networks IEEE 2007

80 High Resolution Animated Scenes from Stills IEEE 200781 Image Superresolution Using Support Vector Regression IEEE 2007

82Learning and Matching of Dynamic Shape Manifolds for Human Action Recognition IEEE 2007

83Morphological Granulometric Features of Nucleus in Automatic Bone Marrow White Blood Cell Classification IEEE 2007

84 Perceptual Color Correction Through Variational Techniques IEEE 2007

85Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols IEEE 2007

86 Vehicle detection and tracking using acoustic and video sensors IEEE 200787 Web Search and Information Retrieval using pFusion Architecture IEEE 200788 Web Server load Balancing using SSL Back-End Forwarding Method IEEE 2007

 

Page 20: Project Titles

89Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paint IEEE 2006 

90 APGENCO Web91 AQA India Web92 Back to My Village Web93 BACKUP AND RECOVERY SCHEDULER Web94 Client Server Based Live Meeting Web95 Cool cab Service Web96 Corporate Project Team Management Web97 Custoer Care Service Web98 Distributed Payroll Management System Web99 Eazy Shop Web

100 Evaluation of Employee Performance Web101 EmentoringForWomen Web102 Employee Functioning Maintenance Web103 EWebsite for Placement Consultant Portal Web104 fianance and accounting Web105 HireWebPortal Web106 Image Gallary Web107 India Mart Web108 Insurance On InternetAbstract Web109 Inventory Web110 JobOrderSystem Web111 LANMGR Web112 ManagementofProjectTrackingandEmployeeTestcenter Web113 Municipal Administration Abstract Web114 NetworkBasedStockPileAuditor_Over Web

115An Integrated and Intelligent System for Issue Tracking, Auto Routing and Lead Management Web

116 Online community for students of college with help desk facility Web117 Organizationinternalsurvey Web118 PARCEL TRACKING Web119 SayNoToAddict Web120 StudentRecordSystemAbstract Web121 VirtualClassRoomAbstract Web122 Visamanagementsystem Web123 Web Alerts Web124 WEBSITE CONTENT ADMINISTRATION TOOL Web125 Work Share Point Web126 Affable Circle Web127 ALUMINI Web128 AUTOMATED REFORMATORY Web129 Automation of Indemnity Policy Web130 Balance Sheet Supervision Web131 Buggy Engage Web132 BUNGLE HANDLING Web