SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
NCCTPromise for the Best Projects
SOFTWARE PROJECTS
JAVA * J2EE * J2ME
IEEE PROJECTS
in various Domains
Latest Projects, 2009 - 2010
#109, 2nd
Floor, Bombay Flats, Nungambakkam High Road
Nungambakkam High Road, Chennai – 600034
Above IOB, Next to ICICI
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
We are offering IEEE & Non IEEE Projects
in various Domains including
• Mobile Computing
• Networking
• Secure Computing
• Wireless Communication
• ADHOC / MANETS / Mesh Networks
• Grid Computing
• Software Engineering
• Image Processing
• Pattern Analysis
• Network Security
• Wireless Sensor Networks
• Data Mining
• Cryptography
• Learning Technologies
• Multimedia
• Knowledge and Data Engineering
• Web Applications
• Information Forensics and Security
• Communication Systems
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
PROJECT SUPPORTS &
DELIVERABLES
• Project Abstract
• IEEE Paper
• PPT / Review Details
• Project Report
• Working Procedure/Screen Shots
• Materials & Books in CD
• Project Certification
All available Project
Details in CD / DVD*
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
NETWORK SECURITY PROJECTSNETWORK SECURITY PROJECTSNETWORK SECURITY PROJECTSNETWORK SECURITY PROJECTS
• A Novel Approach for Computation-Efficient Rekeying for Multicast
Key Distribution - 2009
• A New Reliable Broadcasting in Mobile Ad Hoc Networks - 2009
• A Hybrid Reliable Routing Technique (HRR) for Wireless Sensor
Network - 2009
• Anonymity in Wireless Broadcast Networks - 2009
• Efficient Key Management in Mission-Critical Wireless Ad Hoc
Networks - 2009
• Identifying Malevolent Packet loss while Congestion Occured -
2009
• Enhanced Communal Global, Local Memory Management for
Effective Performance of Cluster Computing - 2008
• Elliptic Curve Cryptography based Threshold Cryptography
Implementation for MANETs – 2007
MOBILE COMPUTING PROJECTS
• A Flexible Privacy-Enhanced Location-Based Services System
Framework and Practice – 2009
• Contention-Aware Performance Analysis of Mobility-Assisted
Routing- 2009
• Opportunistic Scheduling with Reliability Guarantees in Cognitive
Radio Networks – 2009
• Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading
in Cognitive Radio Networks A Game-Theoretic Modeling Approach
- 2009
• Minimizing Recovery State in Geographic Ad Hoc Routing - 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• RandomCast: An Energy-Efficient Communication Scheme for
Mobile Ad Hoc Networks - 2009
• Evaluating Context Information Predictability for Autonomic
Communication - 2009
• Mobility Increases the Capacity of Ad Hoc Wireless Networks - 2009
• Design of mobile electronic commerce system based on J2ME - 2009
• Multicasting with Localized Control in Wireless Ad Hoc Networks -
2009
• A Cross-Layer Framework for Association Control in Wireless
Mesh Networks - 2009
• Cell Breathing Techniques for Load Balancing in Wireless LANs -
2009
• Wardrop Routing in Wireless Networks - 2009
• A Tabu Search Algorithm for Cluster Building in Wireless Sensor
Networks - 2009
• Intrusion Detection in Homogeneous & Heterogeneous Wireless
Sensor Networks - 2008
• Bandwidth Efficient Video Multicasting in Multiradio Muilticellular
Wireless Networks - 2008
• Bandwidth Estimation for IEEE 802.11 Based Ad Hoc Networks - 2008
• An Acknowledgment-based Approach for the Detection of Routing
Misbehavior in MANETs – 2007
• A Location-Based Routing Method for Mobile Ad Hoc Networks –
2005
• Distributed Cache Updating for the Dynamic Source Routing
Protocol – 2005
• Mobile Objects and Mobile Agents: The Future of Distributed
Computing – 2004
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
ADHOC NETWORKS PROJECTS
• A Framework for the Capacity Evaluation of Multihop Wireless
Networks - 2009
• Consistency Management Strategies for Data Replication in Mobile
Ad Hoc Networks - 2009
• A Self Repairing Tree Topology Enabling Content based Routing in
Mobile Ad Hoc Networks - 2007
• Benefit based Data Caching in Ad Hoc Networks – 2005
• A Novel Secure Communication Protocol for Ad Hoc Networks
[SCP] – 2004
• Scalable Wireless Adapt Network Simulator Using XTC - 2004
• Location-Aided Routing (LAR) in Mobile Ad Hoc Networks – 2000
PARALLEL & DISTRIBUTED COMPUTING PROJECTS
• Dynamic Routing with Security considerations - 2009
• An Architectural Framework for Accurate Characterization of
Network Traffic - 2009
• Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
- 2009
• Multipath Dissemination in Regular Mesh Topologies - 2009
• A Tree-Based Peer-to-Peer Network with Quality Guarantees – 2008
• Computation Efficient Multicast Key Distribution – 2008
• Efficient and Secure Content Processing and Distribution by
Cooperative Intermediaries – 2008
• The Server Reassignment Problem for Load Balancing in
Structured P2P Systems - 2008
• Quiver Consistent Object Sharing for Edge Services – 2008
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• Retrieving Files using Content based Searching & Displaying them
in a Carousel View - 2007
• A New Operational Transformation Framework for Real-Time Group
Editors – 2007
• A Fully Distributed Proactively Secure Threshold-Multisignature
Scheme - 2007
• ODAM: An Optimized Distributed Association Rule Mining
Algorithm – 2004
• Unified Network Monitoring For Web Technology – 2003
NETWORKING PROJECTS
• Node isolation model and age-based neighbor selection in
unstructured P2P networks – 2009
• A Multilayer Fault Localization Framework for IP over All-Optical
Multilayer Networks - 2009
• Energy–Robustness Tradeoff in Cellular Network Power Control -
2009
• Entropy Based Adaptive Flow Aggregation - 2009
• Node Isolation Model and Age-Based Neighbor Selection in
Unstructured P2P Networks - 2009
• Optimal Backpressure Routing for Wireless Networks with Multi-
Receiver Diversity - 2009
• Long Time Neighbor Selection and Avoiding Node Separation from
P2P Network – 2009
• Homogeneous and Heterogeneous Load balancing
• Distributed Subset Match in peer to Peer Network - 2009
• A Traffic Engineering Approach for Placement and Selection of
Network Services - 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• A Secure Routing against Byzantine Attacks for MANETs in
Adversarial Environments - 2009
• Monitoring the application-layer DDOS attacks for popular
websites - 2009
• NetQuest: A Flexible Framework for large-Scale Network
Measurement - 2009
• Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset
Search - 2009
• A Hybrid Network Architecture for File Transfers - 2009
• Dual-Link Failure Resiliency through Backup Link Mutual
Exclusion - 2008
• Minimizing File Download Time in Stochastic Peer-to-Peer
Networks - 2008
• Rate & Delay Guarantees Provided By Close Packet Switches with
Load Balancing - 2008
• A Geometric Approach to Improving Active Packet Loss
Measurement - 2008
• Two Techniques for Fast Computation of Constrained Shortest
Paths - 2008
• Performance of a Speculative Transmission Scheme for
Scheduling Latency Reduction - 2008
• BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad
Hoc Networks - 2008
• Securing User-Controlled Routing Infrastructures - 2008
• A near-optimal multicast scheme for mobile ad hoc networks using
a hybrid genetic algorithm – 2006
• A Distributed Database Architecture for Global Roaming in Next-
Generation Mobile Networks - 2004
• Authenticating Network Attached Storage – 2003
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• Modeling Peer-Peer File Sharing Systems – 2003
• ITP: An Image Transport Protocol for the Internet – 2002
• AI NET - A network that integrates ATM and IP - 2002
• Network Border Patrol For Congestion Collapse Preventing
• Dynamic Parallel Access to Replicated Content in the Internet -
2002
IMAGE PROCESSING PROJECTS
• Adaptive Fuzzy Filtering for Artifact Reduction in Compressed
Images and Videos - 2009
• Depth based 2D-3D combined scene images for 3D Multiview
Displays - 2009
• Hierarchical Bayesian sparse image reconstruction with
application to MRFM - 2009
• Image Enhancement for Fluid Lens Camera Based on Color
Correlation - 2009
• Facial Recognition using Multisensor Images based on Localized
Kernel Eigen Spaces - 2009
• Semi-Automatically Driven Color Demosaicking - 2009
• High-Dimensional Statistical Measure for Region-of-Interest
Tracking - 2009
• Efficient Implementation for Spherical Flux Computation and its
Application to Vascular Segmentation - 2009
• Structure & Texture Filling-In of Missing Image Blocks in Wireless
Transmission & Compress – 2003
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
SOFTWARE ENGINEERING PROJECTS
• CHARMY: A Framework for Designing and Verifying Architectural
Specifications - 2009
• Identification of Move Method Refactoring Opportunities - 2009
• Publishing and Discovering Atomicity - Equivalent Services - 2009
• A Hierarchical Model for Object-Oriented Design Quality
Assessment - 2009
• Automatic Extraction of Heap Reference Properties in Object-
Oriented Programs - 2009
• Variability and Reproducibility in Software Engineering: A Study of
Four Companies that Developed the same System - 2009
• Automated Trace Analysis of Discrete-Event System Models
• Provable Protection against Web Application Vulnerabilities
related to Session Data Dependencies – 2008
• Using the Conceptual Cohesion of Classes for Fault Prediction in
Object Oriented Systems – 2008
KNOWLEDGE & DATA ENGINEERING PROJECTS
• A Relation-Based Page Rank Algorithm for Semantic Web Search
Engines - 2009
• Clustering and Sequential Pattern Mining of Online Collaborative
Learning Data - 2009
• Online Scheduling Sequential Objects with Periodicity for Dynamic
Information Dissemination - 2009
• Simple Efficient Load Balancing Algorithms for Peer-to-Peer
Systems - 2009
• Exact Border-Based Approach for Hiding Sensitive Information - 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• Hierarchically Distributed Peer-To-Peer (HP2PC) Architecture and
Clustering Algorithm - 2009
• A Relation-Based Page Rank Algorithm for Semantic Web Search
Engines - 2009
• An Efficient Clustering Scheme to Exploit Hierarchical Data in
Network Traffic Analysis – 2008
• Distributed Suffix Tree Overlay for Peer-to-Peer Search – 2008
• Probabilistic Group Nearest Neighbor Queries in Uncertain
Databases – 2008
• A Signature Based Indexing Method for Efficient Content Based
Retrieval of Relative Temporal Patterns - 2008
• Truth Discovery with Multiple Conflicting Information Providers on
Web - 2008
COMMUNICATION ENGINEERING
• Coalition Games with Cooperative Transmission A Cure for the
Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless
Networks – 2009
• Increasing packet delivery in ad hoc on-demand distance vector
(AODV) routing protocol – 2008
CRYPTOGRAPHY
• Leveraging Identity-based Cryptography for Node ID Assignment in
Structured P2P Systems – 2009 -
• Differential Power Analysis Attacks to Precharged Busses: A
General Analysis for Symmetric-Key Cryptographic Algorithms –
2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
SECURE COMPUTING
• Flexible Rollback Recovery in Dynamic Heterogeneous Grid
Computing – 2009 -
• The Design of a Generic Intrusion-Tolerant Architecture for Web
Servers – 2009
• On the Security of an Efficient Time-Bound Hierarchical Key
Management Scheme – 2009
• Adaptive Neural Network Tracking Control of MIMO Nonlinear
Systems with Unknown Dead Zones and Control Directions – 2009 -
NEURAL NETWORKS
• Computation of Performance Bounds for Real-Time Systems using
Time Petri Nets – 2009 - INDUSTRIAL INFORMATICS
• Continuous Flow Wireless Data Broadcasting for High Speed
Environments – 2009 – BROADCASTING
• A Reference Architecture for Scientific Workflow Management
Systems and the VIEW SOA Solution – 2009 – SERVICE
COMPUTING
• A Distributed System for Consuming Web Services and Caching
their Responses in MANETs – 2009 – SERVICE COMPUTING
• E-Secure Transactions - Secure Electronic Data Interchange over
Internet – 2005 – INTERNET COMPUTING
• Noise Reduction by Fuzzy Image Filtering – 2003 - FUZZY SYSTEMS
• Generalized Sequence-Based and Reverse Sequence-Based
Models for Broadcasting Hot Videos – 2009 - MULTIMEDIA
• Segmentation-Driven Image Fusion based on Alpha-Stable
modeling of Wavelet Coefficients – 2009 - MULTIMEDIA
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
WIRELESS COMMUNICATIONS PROJECTS
• Efficient Multi-Party Digital Signature using Adaptive Secret
Sharing for Low-Power Devices in Wireless Networks - 2009
• High Performance Cooperative Transmission Protocols Based on
Multiuser Detection and Network Coding - 2009
• Multi-Service Load Sharing for Resource Management in the
Cellular WLAN Integrated Network - 2009
• Novel Packet-Level Resource Allocation with Effective QOS
Provisioning for Wireless Mesh Networks - 2009
• Single-Symbol ML Decodable Distributed STBCs for Partially-
Coherent Cooperative Networks - 2009
• SIR Analysis and Interference Cancellation in Uplink OFDMA with
Large Carrier Frequency Timing Offsets - 2009
• Study of Rough Set and Clustering Algorithm in Network Security
Management - 2009
• A Statistical Model for Indoor office Wireless Sensor Channels - 2009
• Robust Cooperative Routing Protocol in Mobile Wireless Sensor
Networks - 2009
NEURAL NETWORKS PROJECTS
• Permitted and Forbidden Sets in Discrete-Time Linear Threshold
Recurrent Neural Networks - 2009
• A New Projection-Based Neural Network for Constrained
variational Inequalities - 2009
• Analysis of Survival Data having time-Dependent Covariates - 2009
• A Multitask Learning Model for Online Pattern Recognition - 2009
• A Self-Organized, Distributed and Adaptive Rule-Based Induction
System - 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
DATAMING PROJECTS
• Agent Mining: The Synergy of Agents and Data Mining - 2009
• Analysis Methods of Workflow Execution Data Based on Data
Mining - 2009
• Data Mining in Hospital Information System for Hospital
Management - 2009
• Application of Genetic Algorithm in Data Mining - 2009
• Subontology based Resource Management for Web based e-
Learning - 2009
• Mining Electronic Medical Records for Patient Care Patterns - 2009
• Ranking and Suggesting Popular Items - 2009
• Predicting Missing Items in Shopping Carts - 2009
• Open Smart Classroom: Extensible and Scalable Learning System
in Smart Space using Web Service Technology - 2009
• Approximate Distributed K-Means Clustering Over a Peer-to-Peer
Network - 2009
• An Efficient Association Rule Mining Algorithm In Distributed
Databases – 2008
• Distributed Data Mining in Credit Card Fraud Detection
SIGNAL PROCESSING PROJECTS
• A Novel Subspace Approach for Cooperative Localization in Wireless
Sensor Networks Using Range Measurements - 2009
• Efficient Design of Cosine-Modulated Filter Banks via Convex
Optimization - 2009
• Frequency-Selective KYP Lemma, IIR Filter, and Filter Bank Design
- 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
DEPENDABLE & SECURE COMPUTING
• Mimicry Attacks on Host-Based Intrusion Detection Systems
• Attacking DDOS at the Source - 2009
• A Precise Termination Condition of the Probabilistic Packet Marking
Algorithm - 2008
• Controlling IP Spoofing Through Inter Domain Packet Filters - 2008
• Modeling & Automated Containment of Worms - 2008
• An Adaptive Programming Model for Fault Tolerant Distributed
Computing – 2007
• Hybrid Intrusion Detection with Weighted Signature Generation over
Anomalous Internet Episodes – 2007
GRID COMPUTING PROJECTS
• Cooperative Secondary Authorization Recycling - 2009
• Dynamic Load Balancing and Job Replication in a Global-Scale
Grid Environment - A Comparison - 2009
• Enhancing privacy and Authorization Control Scalability in the
Grid through Ontologies - 2009
• Efficient Software-Based Encoding and Decoding of BCH Codes -
2009
• Grid Computing Platform for Secure Multi-Job operation - 2009
• On the Design of fault-Tolerent Scheduling Strategies using
Primary-backup Approach for Computational Grids with Low
Replication Costs - 2009
• PEACE: A Sophisticated Privacy-Enhanced yet Accountable
Security Framework for Wireless Mesh Networks – 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
WIRELESS SENSOR NETWORKS PROJECTS
• Model-Based Techniques for Data Reliability in Wireless Sensor
Networks – 2009
• Modeling Detection Latency with Collaborative Mobile Sensing
Architecture – 2009
• Effects of Deniel-of-Sleep Attacks on Wireless Sensor Network
MAC Protocols - 2009
• EARQ: Energy Aware Routing for Real-Time and Reliable
Communication in Wireless Industrial Sensor Networks – 2009
PATTERN ANALYSIS & MACHINE INTELLIGENCE PROJECTS
• Offline Loop Investigation for Handwriting Analysis - 2009
• Semisupervised Learning of Hidden Markov Models via a
Homotopy Method - 2009
• Framework for Performance Evaluation of Face, Text & Vehicle
Detection and Tracking in Video: Data, Metrics & Protocol - 2009
• Face Recognition using Laplacian Faces – 2005
• Online Handwritten Script Recognition – 2004
INFORMATION FORENSICS AND SECURITY PROJECT
• Network Topology against Distributed Denial of Service Attacks
DDOS – 2006
• On the Implementation of the Discrete Fourier Transform in the
Encrypted Domain - 2009
• SMOCK: A Scalable Method of Cryptographic Key Management for
Mission-Critical Wireless Ad-Hoc Networks – 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
WEB APPLICATION PROJECTS
• Fast Algorithms for Mining Association Rules - 2009
• Modeling and using imperfect Context Information - 2009
• Two Factor Authentication using Mobile Phones - 2009
IEEE TRANSACTIONS ON COMPUTERS
• Collusive piracy prevention in P2P content delivery network –
2009
• Dynamic and Auto Responsive Solution for Distributed Denial-of-
Service Attacks Detection in ISP Network - 2009
• SOBIEA Novel Super-node P2P Overlay Based on Information
Exchange - 2009
• Development and Design of a new Logistics Information
Management System - 2009
• An Authenticated Paradigm for Mobile Agent System in Online
Examination – 2009
• A Concatenated Model for Video Frame Interpolation - 2009
• An Adaptive Extension of Combined 2D and 1D-Directional Filter
Banks - 2009
• An Efficient Authentication Scheme for Digital Credentials - 2009
• An XML-Based ADL Framework for Automatic Generation of
Multithreaded Computer Architecture Simulators - 2009
• Clone Detection and Removal for ErlangOTP within a Refactoring
Environment - 2009
• Combined Image Plus Depth Seam Carving for Multiview 3D
Images – 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• Cross-layer Based Anomaly Detection in Wireless Mesh Networks -
2009
• Data Pruning-Based Compression using High Order Edge-Directed
Interpolation - 2009
• Efficient Scheduling Algorithm for QOS Support in High Speed
Downlink Packet Access Networks - 2009
• Enhancing the Scalability of IMS-based Presence Service for LBS
Applications – 2009
• Guaranteed delivery for Geographical any Casting in wireless Multi-
sink sensor and Sensor-Actor Networks - 2009
• Improving Partial Cover of Random Walks in Large-Scale Wireless
Sensor Networks - 2009
• Introduction of First Passage Time (FPT) Analysis for Software
Reliability and Network Security - 2009
• Method and Architecture Design for Motion Compensated Frame
Interpolation in High-Definition Video Processing - 2009
• Model-Free Interval-Based Localization in Manets - 2009
• NNexus: An Automatic Linker for Collaborative Web-Based Corpora
- 2009
• Node Presence Detection with Reduced Overhead - 2009
• Polyphase Interpretation of Empirical Image Interpolation - 2009
• Rate-Distortion Optimized Bitstream Extractor for Motion Scalability
in Scalable Video Coding - 2009
• Resilient Multi-core Systems A Hierarchical Formal Model for N-
variant Executions - 2009
• Stochastic Analysis of Spatial and Opportunistic Aloha - 2009
• The Digital Wallet Opportunities and Prototype - 2009
• Tree-on-DAG for Data Aggregation in Sensor Networks - 2009
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• Differentiated Bandwidth Allocation with TCP Protection in Core
Routers - 2009
• A Survey of Learning-Based Techniques of Email Spam Filtering -
2008
• BotMiner Clustering Analysis of Network Traffic for Protocol- and
Structure-Independent Botnet Detection - 2008
• High Multiplicity Scheduling of File Transfers with Divisible Sizes of
Multiple Classes of Paths – 2008
• Location-based Spatial Queries with Data Sharing in Wireless
Broadcast Environments - 2008
• Packet caches on Routers the Implications of Universal Redundant
Traffic Elimination – 2008
• Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System – 2008
• Protection of Database Security via Collaborative Inference
Detection - 2008
• Active Queue Management for Fair Resource Allocation in Wireless
Networks - 2008
• COACS: Co - Operative and adaptive caching system for MANETs
- 2008
• Designing Less - Structured P2p Systems for the Expected High
Churn - 2008
• Interaction of IPSS: Distributed Resource Allocation and Revenue
Maximization - 2008
• Online Index Recommendations for High-Dimensional Databases
Using Query Workloads - 2008
• Scalable & Efficient End-To-End Network Topology Inference – 2008
• A Software Defect Report and Tracking System in an Intranet
• Security in Large Networks Using Mediator Protocols – 2008
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• An Agent based Intrusion Detection, Response and Blocking using
signature Method in Active Net - 2007
• Predictive Job Scheduling in a Connection using Parallel Genetic
Algorithm - 2007
• Benefit Based Data Caching In Ad Hoc Networks - 2006
• Image Transformation using Grid – 2006
• Building Intelligent Shopping Assistants Using Individual
Consumer Models – 2005
• Application of BPCS Steganography to Wavelet Compressed Video
– 2004
• Slow Start Algorithm Improvement of TCP Performance – 2004
• Towards Multimodal Interfaces for Intrusion Detection
• Incremental deployment service of Hop by hop multicast routing
protocol – 2004
• Packet caches on Routers the Implications of Universal Redundant
Traffic Elimination – 2008
• Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System – 2008
• Protection of Database Security via Collaborative Inference
Detection - 2008
• Active Queue Management for Fair Resource Allocation in Wireless
Networks - 2008
• COACS: Co - Operative and adaptive caching system for MANETs
- 2008
• Designing Less - Structured P2p Systems for the Expected High
Churn - 2008
• Interaction of IPSS: Distributed Resource Allocation and Revenue
Maximization - 2008
• Online Index Recommendations for High-Dimensional Databases
Using Query Workloads - 2008
NCCTPromise for the best Projects
044-28235816, 9841193224
ncctchennai@gmail.com
www.ncct.in
NCCT, 109, 2nd
Floor, Bombay Flats, Nungambakkam
High Road, Nungambakkam, Chennai - 34
• Scalable & Efficient End-To-End Network Topology Inference – 2008
• A Software Defect Report and Tracking System in an Intranet
• Security in Large Networks Using Mediator Protocols - 2008
• An Agent based Intrusion Detection, Response and Blocking using
signature Method in Active Net - 2007
• Predictive Job Scheduling in a Connection using Parallel Genetic
Algorithm - 2007
• Benefit Based Data Caching In Ad Hoc Networks - 2006
• Image Transformation using Grid – 2006
• Building Intelligent Shopping Assistants Using Individual
Consumer Models – 2005
• Application of BPCS Steganography to Wavelet Compressed Video
– 2004
• Slow Start Algorithm Improvement of TCP Performance – 2004
• Towards Multimodal Interfaces for Intrusion Detection
• Incremental deployment service of Hop by hop multicast routing
protocol – 2004
• A wireless distributed intrusion detection system and a new attack
model – 2006
• Distributed Collaborative Key Agreement Protocols for Dynamic Peer
Groups

Más contenido relacionado

Similar a Final Year Projects Ncct.In

Software Projects Java Projects Ieee Knowledge And Data Engineering
Software Projects Java Projects Ieee Knowledge And Data EngineeringSoftware Projects Java Projects Ieee Knowledge And Data Engineering
Software Projects Java Projects Ieee Knowledge And Data Engineeringncct
 
J2 Ee Projects, Final Year Projects
J2 Ee Projects, Final Year ProjectsJ2 Ee Projects, Final Year Projects
J2 Ee Projects, Final Year Projectsncct
 
Me Projects
Me ProjectsMe Projects
Me Projectsncct
 
Software Projects Java Projects Networking, Network Security, Wireless Sensor...
Software Projects Java Projects Networking, Network Security, Wireless Sensor...Software Projects Java Projects Networking, Network Security, Wireless Sensor...
Software Projects Java Projects Networking, Network Security, Wireless Sensor...ncct
 
Software Projects Ieee Java Asp.Net
Software Projects Ieee Java Asp.NetSoftware Projects Ieee Java Asp.Net
Software Projects Ieee Java Asp.Netncct
 
Java Projects, Asp.Net Projects, Vb.Net Projects, C# Projects
Java Projects, Asp.Net Projects, Vb.Net Projects, C# ProjectsJava Projects, Asp.Net Projects, Vb.Net Projects, C# Projects
Java Projects, Asp.Net Projects, Vb.Net Projects, C# Projectsncct
 
Ieee 2009 J2 Ee Projects, Ieee 2009 J2 Me Projects
Ieee 2009 J2 Ee Projects, Ieee 2009 J2 Me ProjectsIeee 2009 J2 Ee Projects, Ieee 2009 J2 Me Projects
Ieee 2009 J2 Ee Projects, Ieee 2009 J2 Me Projectsncct
 
Software Projects Java Projects Grid Computing, Software Engineering, Image P...
Software Projects Java Projects Grid Computing, Software Engineering, Image P...Software Projects Java Projects Grid Computing, Software Engineering, Image P...
Software Projects Java Projects Grid Computing, Software Engineering, Image P...ncct
 
Software Projects Java Projects Data Mining
Software Projects Java Projects Data MiningSoftware Projects Java Projects Data Mining
Software Projects Java Projects Data Miningncct
 
Software Projects Java Projects Multimedia
Software Projects Java Projects MultimediaSoftware Projects Java Projects Multimedia
Software Projects Java Projects Multimediancct
 
Software Projects Java Projects Wireless Communication
Software Projects Java Projects Wireless CommunicationSoftware Projects Java Projects Wireless Communication
Software Projects Java Projects Wireless Communicationncct
 
Software Projects Java Projects Network Security
Software Projects Java Projects Network SecuritySoftware Projects Java Projects Network Security
Software Projects Java Projects Network Securityncct
 
Software Projects Java Projects Cryptography
Software Projects Java Projects CryptographySoftware Projects Java Projects Cryptography
Software Projects Java Projects Cryptographyncct
 
Software Projects Java Projects Pattern Analysis, Information Forensics And S...
Software Projects Java Projects Pattern Analysis, Information Forensics And S...Software Projects Java Projects Pattern Analysis, Information Forensics And S...
Software Projects Java Projects Pattern Analysis, Information Forensics And S...ncct
 
Software Projects Java Projects Web Applications, Communication Systems
Software Projects Java Projects Web Applications, Communication SystemsSoftware Projects Java Projects Web Applications, Communication Systems
Software Projects Java Projects Web Applications, Communication Systemsncct
 
Software Projects Java Projects Secure Computing
Software Projects Java Projects Secure ComputingSoftware Projects Java Projects Secure Computing
Software Projects Java Projects Secure Computingncct
 
Software Projects Java Projects Wireless Sensor Networks
Software Projects Java Projects Wireless Sensor NetworksSoftware Projects Java Projects Wireless Sensor Networks
Software Projects Java Projects Wireless Sensor Networksncct
 
Ieee Projects Software Ieee Projects Ieee 2009 Java .Net
Ieee Projects Software Ieee Projects Ieee 2009 Java .NetIeee Projects Software Ieee Projects Ieee 2009 Java .Net
Ieee Projects Software Ieee Projects Ieee 2009 Java .Netncct
 
Software Projects Java Projects Pattern Analysis
Software Projects Java Projects Pattern AnalysisSoftware Projects Java Projects Pattern Analysis
Software Projects Java Projects Pattern Analysisncct
 
Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...
Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...
Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...ncct
 

Similar a Final Year Projects Ncct.In (20)

Software Projects Java Projects Ieee Knowledge And Data Engineering
Software Projects Java Projects Ieee Knowledge And Data EngineeringSoftware Projects Java Projects Ieee Knowledge And Data Engineering
Software Projects Java Projects Ieee Knowledge And Data Engineering
 
J2 Ee Projects, Final Year Projects
J2 Ee Projects, Final Year ProjectsJ2 Ee Projects, Final Year Projects
J2 Ee Projects, Final Year Projects
 
Me Projects
Me ProjectsMe Projects
Me Projects
 
Software Projects Java Projects Networking, Network Security, Wireless Sensor...
Software Projects Java Projects Networking, Network Security, Wireless Sensor...Software Projects Java Projects Networking, Network Security, Wireless Sensor...
Software Projects Java Projects Networking, Network Security, Wireless Sensor...
 
Software Projects Ieee Java Asp.Net
Software Projects Ieee Java Asp.NetSoftware Projects Ieee Java Asp.Net
Software Projects Ieee Java Asp.Net
 
Java Projects, Asp.Net Projects, Vb.Net Projects, C# Projects
Java Projects, Asp.Net Projects, Vb.Net Projects, C# ProjectsJava Projects, Asp.Net Projects, Vb.Net Projects, C# Projects
Java Projects, Asp.Net Projects, Vb.Net Projects, C# Projects
 
Ieee 2009 J2 Ee Projects, Ieee 2009 J2 Me Projects
Ieee 2009 J2 Ee Projects, Ieee 2009 J2 Me ProjectsIeee 2009 J2 Ee Projects, Ieee 2009 J2 Me Projects
Ieee 2009 J2 Ee Projects, Ieee 2009 J2 Me Projects
 
Software Projects Java Projects Grid Computing, Software Engineering, Image P...
Software Projects Java Projects Grid Computing, Software Engineering, Image P...Software Projects Java Projects Grid Computing, Software Engineering, Image P...
Software Projects Java Projects Grid Computing, Software Engineering, Image P...
 
Software Projects Java Projects Data Mining
Software Projects Java Projects Data MiningSoftware Projects Java Projects Data Mining
Software Projects Java Projects Data Mining
 
Software Projects Java Projects Multimedia
Software Projects Java Projects MultimediaSoftware Projects Java Projects Multimedia
Software Projects Java Projects Multimedia
 
Software Projects Java Projects Wireless Communication
Software Projects Java Projects Wireless CommunicationSoftware Projects Java Projects Wireless Communication
Software Projects Java Projects Wireless Communication
 
Software Projects Java Projects Network Security
Software Projects Java Projects Network SecuritySoftware Projects Java Projects Network Security
Software Projects Java Projects Network Security
 
Software Projects Java Projects Cryptography
Software Projects Java Projects CryptographySoftware Projects Java Projects Cryptography
Software Projects Java Projects Cryptography
 
Software Projects Java Projects Pattern Analysis, Information Forensics And S...
Software Projects Java Projects Pattern Analysis, Information Forensics And S...Software Projects Java Projects Pattern Analysis, Information Forensics And S...
Software Projects Java Projects Pattern Analysis, Information Forensics And S...
 
Software Projects Java Projects Web Applications, Communication Systems
Software Projects Java Projects Web Applications, Communication SystemsSoftware Projects Java Projects Web Applications, Communication Systems
Software Projects Java Projects Web Applications, Communication Systems
 
Software Projects Java Projects Secure Computing
Software Projects Java Projects Secure ComputingSoftware Projects Java Projects Secure Computing
Software Projects Java Projects Secure Computing
 
Software Projects Java Projects Wireless Sensor Networks
Software Projects Java Projects Wireless Sensor NetworksSoftware Projects Java Projects Wireless Sensor Networks
Software Projects Java Projects Wireless Sensor Networks
 
Ieee Projects Software Ieee Projects Ieee 2009 Java .Net
Ieee Projects Software Ieee Projects Ieee 2009 Java .NetIeee Projects Software Ieee Projects Ieee 2009 Java .Net
Ieee Projects Software Ieee Projects Ieee 2009 Java .Net
 
Software Projects Java Projects Pattern Analysis
Software Projects Java Projects Pattern AnalysisSoftware Projects Java Projects Pattern Analysis
Software Projects Java Projects Pattern Analysis
 
Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...
Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...
Software Projects Java Projects Ieee Pattern Analysis, Information Forensics ...
 

Más de ncct

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signalsncct
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...ncct
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Boxncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 

Más de ncct (20)

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 

Último

OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 

Último (20)

OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 

Final Year Projects Ncct.In

  • 1. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 NCCTPromise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS in various Domains Latest Projects, 2009 - 2010 #109, 2nd Floor, Bombay Flats, Nungambakkam High Road Nungambakkam High Road, Chennai – 600034 Above IOB, Next to ICICI 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in
  • 2. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 We are offering IEEE & Non IEEE Projects in various Domains including • Mobile Computing • Networking • Secure Computing • Wireless Communication • ADHOC / MANETS / Mesh Networks • Grid Computing • Software Engineering • Image Processing • Pattern Analysis • Network Security • Wireless Sensor Networks • Data Mining • Cryptography • Learning Technologies • Multimedia • Knowledge and Data Engineering • Web Applications • Information Forensics and Security • Communication Systems
  • 3. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 PROJECT SUPPORTS & DELIVERABLES • Project Abstract • IEEE Paper • PPT / Review Details • Project Report • Working Procedure/Screen Shots • Materials & Books in CD • Project Certification All available Project Details in CD / DVD*
  • 4. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 NETWORK SECURITY PROJECTSNETWORK SECURITY PROJECTSNETWORK SECURITY PROJECTSNETWORK SECURITY PROJECTS • A Novel Approach for Computation-Efficient Rekeying for Multicast Key Distribution - 2009 • A New Reliable Broadcasting in Mobile Ad Hoc Networks - 2009 • A Hybrid Reliable Routing Technique (HRR) for Wireless Sensor Network - 2009 • Anonymity in Wireless Broadcast Networks - 2009 • Efficient Key Management in Mission-Critical Wireless Ad Hoc Networks - 2009 • Identifying Malevolent Packet loss while Congestion Occured - 2009 • Enhanced Communal Global, Local Memory Management for Effective Performance of Cluster Computing - 2008 • Elliptic Curve Cryptography based Threshold Cryptography Implementation for MANETs – 2007 MOBILE COMPUTING PROJECTS • A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice – 2009 • Contention-Aware Performance Analysis of Mobility-Assisted Routing- 2009 • Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks – 2009 • Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks A Game-Theoretic Modeling Approach - 2009 • Minimizing Recovery State in Geographic Ad Hoc Routing - 2009
  • 5. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks - 2009 • Evaluating Context Information Predictability for Autonomic Communication - 2009 • Mobility Increases the Capacity of Ad Hoc Wireless Networks - 2009 • Design of mobile electronic commerce system based on J2ME - 2009 • Multicasting with Localized Control in Wireless Ad Hoc Networks - 2009 • A Cross-Layer Framework for Association Control in Wireless Mesh Networks - 2009 • Cell Breathing Techniques for Load Balancing in Wireless LANs - 2009 • Wardrop Routing in Wireless Networks - 2009 • A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks - 2009 • Intrusion Detection in Homogeneous & Heterogeneous Wireless Sensor Networks - 2008 • Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Networks - 2008 • Bandwidth Estimation for IEEE 802.11 Based Ad Hoc Networks - 2008 • An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs – 2007 • A Location-Based Routing Method for Mobile Ad Hoc Networks – 2005 • Distributed Cache Updating for the Dynamic Source Routing Protocol – 2005 • Mobile Objects and Mobile Agents: The Future of Distributed Computing – 2004
  • 6. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 ADHOC NETWORKS PROJECTS • A Framework for the Capacity Evaluation of Multihop Wireless Networks - 2009 • Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks - 2009 • A Self Repairing Tree Topology Enabling Content based Routing in Mobile Ad Hoc Networks - 2007 • Benefit based Data Caching in Ad Hoc Networks – 2005 • A Novel Secure Communication Protocol for Ad Hoc Networks [SCP] – 2004 • Scalable Wireless Adapt Network Simulator Using XTC - 2004 • Location-Aided Routing (LAR) in Mobile Ad Hoc Networks – 2000 PARALLEL & DISTRIBUTED COMPUTING PROJECTS • Dynamic Routing with Security considerations - 2009 • An Architectural Framework for Accurate Characterization of Network Traffic - 2009 • Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks - 2009 • Multipath Dissemination in Regular Mesh Topologies - 2009 • A Tree-Based Peer-to-Peer Network with Quality Guarantees – 2008 • Computation Efficient Multicast Key Distribution – 2008 • Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries – 2008 • The Server Reassignment Problem for Load Balancing in Structured P2P Systems - 2008 • Quiver Consistent Object Sharing for Edge Services – 2008
  • 7. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • Retrieving Files using Content based Searching & Displaying them in a Carousel View - 2007 • A New Operational Transformation Framework for Real-Time Group Editors – 2007 • A Fully Distributed Proactively Secure Threshold-Multisignature Scheme - 2007 • ODAM: An Optimized Distributed Association Rule Mining Algorithm – 2004 • Unified Network Monitoring For Web Technology – 2003 NETWORKING PROJECTS • Node isolation model and age-based neighbor selection in unstructured P2P networks – 2009 • A Multilayer Fault Localization Framework for IP over All-Optical Multilayer Networks - 2009 • Energy–Robustness Tradeoff in Cellular Network Power Control - 2009 • Entropy Based Adaptive Flow Aggregation - 2009 • Node Isolation Model and Age-Based Neighbor Selection in Unstructured P2P Networks - 2009 • Optimal Backpressure Routing for Wireless Networks with Multi- Receiver Diversity - 2009 • Long Time Neighbor Selection and Avoiding Node Separation from P2P Network – 2009 • Homogeneous and Heterogeneous Load balancing • Distributed Subset Match in peer to Peer Network - 2009 • A Traffic Engineering Approach for Placement and Selection of Network Services - 2009
  • 8. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • A Secure Routing against Byzantine Attacks for MANETs in Adversarial Environments - 2009 • Monitoring the application-layer DDOS attacks for popular websites - 2009 • NetQuest: A Flexible Framework for large-Scale Network Measurement - 2009 • Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search - 2009 • A Hybrid Network Architecture for File Transfers - 2009 • Dual-Link Failure Resiliency through Backup Link Mutual Exclusion - 2008 • Minimizing File Download Time in Stochastic Peer-to-Peer Networks - 2008 • Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing - 2008 • A Geometric Approach to Improving Active Packet Loss Measurement - 2008 • Two Techniques for Fast Computation of Constrained Shortest Paths - 2008 • Performance of a Speculative Transmission Scheme for Scheduling Latency Reduction - 2008 • BRA Bi-directional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks - 2008 • Securing User-Controlled Routing Infrastructures - 2008 • A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm – 2006 • A Distributed Database Architecture for Global Roaming in Next- Generation Mobile Networks - 2004 • Authenticating Network Attached Storage – 2003
  • 9. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • Modeling Peer-Peer File Sharing Systems – 2003 • ITP: An Image Transport Protocol for the Internet – 2002 • AI NET - A network that integrates ATM and IP - 2002 • Network Border Patrol For Congestion Collapse Preventing • Dynamic Parallel Access to Replicated Content in the Internet - 2002 IMAGE PROCESSING PROJECTS • Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos - 2009 • Depth based 2D-3D combined scene images for 3D Multiview Displays - 2009 • Hierarchical Bayesian sparse image reconstruction with application to MRFM - 2009 • Image Enhancement for Fluid Lens Camera Based on Color Correlation - 2009 • Facial Recognition using Multisensor Images based on Localized Kernel Eigen Spaces - 2009 • Semi-Automatically Driven Color Demosaicking - 2009 • High-Dimensional Statistical Measure for Region-of-Interest Tracking - 2009 • Efficient Implementation for Spherical Flux Computation and its Application to Vascular Segmentation - 2009 • Structure & Texture Filling-In of Missing Image Blocks in Wireless Transmission & Compress – 2003
  • 10. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 SOFTWARE ENGINEERING PROJECTS • CHARMY: A Framework for Designing and Verifying Architectural Specifications - 2009 • Identification of Move Method Refactoring Opportunities - 2009 • Publishing and Discovering Atomicity - Equivalent Services - 2009 • A Hierarchical Model for Object-Oriented Design Quality Assessment - 2009 • Automatic Extraction of Heap Reference Properties in Object- Oriented Programs - 2009 • Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the same System - 2009 • Automated Trace Analysis of Discrete-Event System Models • Provable Protection against Web Application Vulnerabilities related to Session Data Dependencies – 2008 • Using the Conceptual Cohesion of Classes for Fault Prediction in Object Oriented Systems – 2008 KNOWLEDGE & DATA ENGINEERING PROJECTS • A Relation-Based Page Rank Algorithm for Semantic Web Search Engines - 2009 • Clustering and Sequential Pattern Mining of Online Collaborative Learning Data - 2009 • Online Scheduling Sequential Objects with Periodicity for Dynamic Information Dissemination - 2009 • Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems - 2009 • Exact Border-Based Approach for Hiding Sensitive Information - 2009
  • 11. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • Hierarchically Distributed Peer-To-Peer (HP2PC) Architecture and Clustering Algorithm - 2009 • A Relation-Based Page Rank Algorithm for Semantic Web Search Engines - 2009 • An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis – 2008 • Distributed Suffix Tree Overlay for Peer-to-Peer Search – 2008 • Probabilistic Group Nearest Neighbor Queries in Uncertain Databases – 2008 • A Signature Based Indexing Method for Efficient Content Based Retrieval of Relative Temporal Patterns - 2008 • Truth Discovery with Multiple Conflicting Information Providers on Web - 2008 COMMUNICATION ENGINEERING • Coalition Games with Cooperative Transmission A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks – 2009 • Increasing packet delivery in ad hoc on-demand distance vector (AODV) routing protocol – 2008 CRYPTOGRAPHY • Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems – 2009 - • Differential Power Analysis Attacks to Precharged Busses: A General Analysis for Symmetric-Key Cryptographic Algorithms – 2009
  • 12. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 SECURE COMPUTING • Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing – 2009 - • The Design of a Generic Intrusion-Tolerant Architecture for Web Servers – 2009 • On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme – 2009 • Adaptive Neural Network Tracking Control of MIMO Nonlinear Systems with Unknown Dead Zones and Control Directions – 2009 - NEURAL NETWORKS • Computation of Performance Bounds for Real-Time Systems using Time Petri Nets – 2009 - INDUSTRIAL INFORMATICS • Continuous Flow Wireless Data Broadcasting for High Speed Environments – 2009 – BROADCASTING • A Reference Architecture for Scientific Workflow Management Systems and the VIEW SOA Solution – 2009 – SERVICE COMPUTING • A Distributed System for Consuming Web Services and Caching their Responses in MANETs – 2009 – SERVICE COMPUTING • E-Secure Transactions - Secure Electronic Data Interchange over Internet – 2005 – INTERNET COMPUTING • Noise Reduction by Fuzzy Image Filtering – 2003 - FUZZY SYSTEMS • Generalized Sequence-Based and Reverse Sequence-Based Models for Broadcasting Hot Videos – 2009 - MULTIMEDIA • Segmentation-Driven Image Fusion based on Alpha-Stable modeling of Wavelet Coefficients – 2009 - MULTIMEDIA
  • 13. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 WIRELESS COMMUNICATIONS PROJECTS • Efficient Multi-Party Digital Signature using Adaptive Secret Sharing for Low-Power Devices in Wireless Networks - 2009 • High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding - 2009 • Multi-Service Load Sharing for Resource Management in the Cellular WLAN Integrated Network - 2009 • Novel Packet-Level Resource Allocation with Effective QOS Provisioning for Wireless Mesh Networks - 2009 • Single-Symbol ML Decodable Distributed STBCs for Partially- Coherent Cooperative Networks - 2009 • SIR Analysis and Interference Cancellation in Uplink OFDMA with Large Carrier Frequency Timing Offsets - 2009 • Study of Rough Set and Clustering Algorithm in Network Security Management - 2009 • A Statistical Model for Indoor office Wireless Sensor Channels - 2009 • Robust Cooperative Routing Protocol in Mobile Wireless Sensor Networks - 2009 NEURAL NETWORKS PROJECTS • Permitted and Forbidden Sets in Discrete-Time Linear Threshold Recurrent Neural Networks - 2009 • A New Projection-Based Neural Network for Constrained variational Inequalities - 2009 • Analysis of Survival Data having time-Dependent Covariates - 2009 • A Multitask Learning Model for Online Pattern Recognition - 2009 • A Self-Organized, Distributed and Adaptive Rule-Based Induction System - 2009
  • 14. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 DATAMING PROJECTS • Agent Mining: The Synergy of Agents and Data Mining - 2009 • Analysis Methods of Workflow Execution Data Based on Data Mining - 2009 • Data Mining in Hospital Information System for Hospital Management - 2009 • Application of Genetic Algorithm in Data Mining - 2009 • Subontology based Resource Management for Web based e- Learning - 2009 • Mining Electronic Medical Records for Patient Care Patterns - 2009 • Ranking and Suggesting Popular Items - 2009 • Predicting Missing Items in Shopping Carts - 2009 • Open Smart Classroom: Extensible and Scalable Learning System in Smart Space using Web Service Technology - 2009 • Approximate Distributed K-Means Clustering Over a Peer-to-Peer Network - 2009 • An Efficient Association Rule Mining Algorithm In Distributed Databases – 2008 • Distributed Data Mining in Credit Card Fraud Detection SIGNAL PROCESSING PROJECTS • A Novel Subspace Approach for Cooperative Localization in Wireless Sensor Networks Using Range Measurements - 2009 • Efficient Design of Cosine-Modulated Filter Banks via Convex Optimization - 2009 • Frequency-Selective KYP Lemma, IIR Filter, and Filter Bank Design - 2009
  • 15. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 DEPENDABLE & SECURE COMPUTING • Mimicry Attacks on Host-Based Intrusion Detection Systems • Attacking DDOS at the Source - 2009 • A Precise Termination Condition of the Probabilistic Packet Marking Algorithm - 2008 • Controlling IP Spoofing Through Inter Domain Packet Filters - 2008 • Modeling & Automated Containment of Worms - 2008 • An Adaptive Programming Model for Fault Tolerant Distributed Computing – 2007 • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes – 2007 GRID COMPUTING PROJECTS • Cooperative Secondary Authorization Recycling - 2009 • Dynamic Load Balancing and Job Replication in a Global-Scale Grid Environment - A Comparison - 2009 • Enhancing privacy and Authorization Control Scalability in the Grid through Ontologies - 2009 • Efficient Software-Based Encoding and Decoding of BCH Codes - 2009 • Grid Computing Platform for Secure Multi-Job operation - 2009 • On the Design of fault-Tolerent Scheduling Strategies using Primary-backup Approach for Computational Grids with Low Replication Costs - 2009 • PEACE: A Sophisticated Privacy-Enhanced yet Accountable Security Framework for Wireless Mesh Networks – 2009
  • 16. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 WIRELESS SENSOR NETWORKS PROJECTS • Model-Based Techniques for Data Reliability in Wireless Sensor Networks – 2009 • Modeling Detection Latency with Collaborative Mobile Sensing Architecture – 2009 • Effects of Deniel-of-Sleep Attacks on Wireless Sensor Network MAC Protocols - 2009 • EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks – 2009 PATTERN ANALYSIS & MACHINE INTELLIGENCE PROJECTS • Offline Loop Investigation for Handwriting Analysis - 2009 • Semisupervised Learning of Hidden Markov Models via a Homotopy Method - 2009 • Framework for Performance Evaluation of Face, Text & Vehicle Detection and Tracking in Video: Data, Metrics & Protocol - 2009 • Face Recognition using Laplacian Faces – 2005 • Online Handwritten Script Recognition – 2004 INFORMATION FORENSICS AND SECURITY PROJECT • Network Topology against Distributed Denial of Service Attacks DDOS – 2006 • On the Implementation of the Discrete Fourier Transform in the Encrypted Domain - 2009 • SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks – 2009
  • 17. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 WEB APPLICATION PROJECTS • Fast Algorithms for Mining Association Rules - 2009 • Modeling and using imperfect Context Information - 2009 • Two Factor Authentication using Mobile Phones - 2009 IEEE TRANSACTIONS ON COMPUTERS • Collusive piracy prevention in P2P content delivery network – 2009 • Dynamic and Auto Responsive Solution for Distributed Denial-of- Service Attacks Detection in ISP Network - 2009 • SOBIEA Novel Super-node P2P Overlay Based on Information Exchange - 2009 • Development and Design of a new Logistics Information Management System - 2009 • An Authenticated Paradigm for Mobile Agent System in Online Examination – 2009 • A Concatenated Model for Video Frame Interpolation - 2009 • An Adaptive Extension of Combined 2D and 1D-Directional Filter Banks - 2009 • An Efficient Authentication Scheme for Digital Credentials - 2009 • An XML-Based ADL Framework for Automatic Generation of Multithreaded Computer Architecture Simulators - 2009 • Clone Detection and Removal for ErlangOTP within a Refactoring Environment - 2009 • Combined Image Plus Depth Seam Carving for Multiview 3D Images – 2009
  • 18. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • Cross-layer Based Anomaly Detection in Wireless Mesh Networks - 2009 • Data Pruning-Based Compression using High Order Edge-Directed Interpolation - 2009 • Efficient Scheduling Algorithm for QOS Support in High Speed Downlink Packet Access Networks - 2009 • Enhancing the Scalability of IMS-based Presence Service for LBS Applications – 2009 • Guaranteed delivery for Geographical any Casting in wireless Multi- sink sensor and Sensor-Actor Networks - 2009 • Improving Partial Cover of Random Walks in Large-Scale Wireless Sensor Networks - 2009 • Introduction of First Passage Time (FPT) Analysis for Software Reliability and Network Security - 2009 • Method and Architecture Design for Motion Compensated Frame Interpolation in High-Definition Video Processing - 2009 • Model-Free Interval-Based Localization in Manets - 2009 • NNexus: An Automatic Linker for Collaborative Web-Based Corpora - 2009 • Node Presence Detection with Reduced Overhead - 2009 • Polyphase Interpretation of Empirical Image Interpolation - 2009 • Rate-Distortion Optimized Bitstream Extractor for Motion Scalability in Scalable Video Coding - 2009 • Resilient Multi-core Systems A Hierarchical Formal Model for N- variant Executions - 2009 • Stochastic Analysis of Spatial and Opportunistic Aloha - 2009 • The Digital Wallet Opportunities and Prototype - 2009 • Tree-on-DAG for Data Aggregation in Sensor Networks - 2009
  • 19. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • Differentiated Bandwidth Allocation with TCP Protection in Core Routers - 2009 • A Survey of Learning-Based Techniques of Email Spam Filtering - 2008 • BotMiner Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection - 2008 • High Multiplicity Scheduling of File Transfers with Divisible Sizes of Multiple Classes of Paths – 2008 • Location-based Spatial Queries with Data Sharing in Wireless Broadcast Environments - 2008 • Packet caches on Routers the Implications of Universal Redundant Traffic Elimination – 2008 • Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System – 2008 • Protection of Database Security via Collaborative Inference Detection - 2008 • Active Queue Management for Fair Resource Allocation in Wireless Networks - 2008 • COACS: Co - Operative and adaptive caching system for MANETs - 2008 • Designing Less - Structured P2p Systems for the Expected High Churn - 2008 • Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization - 2008 • Online Index Recommendations for High-Dimensional Databases Using Query Workloads - 2008 • Scalable & Efficient End-To-End Network Topology Inference – 2008 • A Software Defect Report and Tracking System in an Intranet • Security in Large Networks Using Mediator Protocols – 2008
  • 20. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net - 2007 • Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm - 2007 • Benefit Based Data Caching In Ad Hoc Networks - 2006 • Image Transformation using Grid – 2006 • Building Intelligent Shopping Assistants Using Individual Consumer Models – 2005 • Application of BPCS Steganography to Wavelet Compressed Video – 2004 • Slow Start Algorithm Improvement of TCP Performance – 2004 • Towards Multimodal Interfaces for Intrusion Detection • Incremental deployment service of Hop by hop multicast routing protocol – 2004 • Packet caches on Routers the Implications of Universal Redundant Traffic Elimination – 2008 • Peertalk a Peer-to-Peer Multi-Party Voice-Over-IP System – 2008 • Protection of Database Security via Collaborative Inference Detection - 2008 • Active Queue Management for Fair Resource Allocation in Wireless Networks - 2008 • COACS: Co - Operative and adaptive caching system for MANETs - 2008 • Designing Less - Structured P2p Systems for the Expected High Churn - 2008 • Interaction of IPSS: Distributed Resource Allocation and Revenue Maximization - 2008 • Online Index Recommendations for High-Dimensional Databases Using Query Workloads - 2008
  • 21. NCCTPromise for the best Projects 044-28235816, 9841193224 ncctchennai@gmail.com www.ncct.in NCCT, 109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 34 • Scalable & Efficient End-To-End Network Topology Inference – 2008 • A Software Defect Report and Tracking System in an Intranet • Security in Large Networks Using Mediator Protocols - 2008 • An Agent based Intrusion Detection, Response and Blocking using signature Method in Active Net - 2007 • Predictive Job Scheduling in a Connection using Parallel Genetic Algorithm - 2007 • Benefit Based Data Caching In Ad Hoc Networks - 2006 • Image Transformation using Grid – 2006 • Building Intelligent Shopping Assistants Using Individual Consumer Models – 2005 • Application of BPCS Steganography to Wavelet Compressed Video – 2004 • Slow Start Algorithm Improvement of TCP Performance – 2004 • Towards Multimodal Interfaces for Intrusion Detection • Incremental deployment service of Hop by hop multicast routing protocol – 2004 • A wireless distributed intrusion detection system and a new attack model – 2006 • Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups