SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Academic Projects for
         EEE (2012-2013)

We will develop your ideas and your papers also,

 For any Further information call-9603150547

      e-mail visionsolutions.9@gmail.com
Project
S.No                          Project Title                    Domain        Year
        Code
                                                               Service
 1      J1201    Bootstrapping Ontologies for Web Services    Computing      2012
                                                             (Web service)

                 Cooperative Provable Data Possession for                    2012
 2      J1202      Integrity Verification in Multi-Cloud     Data Mining
                                  Storage

                   Packet-Hiding Methods for Preventing                      2012
 3      J1203           Selective Jamming Attacks            Net Working


                   Learn to Personalized Image Search from                   2012
 4      J1204            the Photo Sharing Websites          Data Mining


                    Risk-Aware Mitigation for MANET                          2012
 5      J1205               Routing Attacks                  Net Working


                       Slicing: A New Approach to Privacy                    2012
 6      J1206               Preserving Data Publishing       Data Mining


                       *MULTIPARTY ACCESS CONTROL FOR                        2012
 7      J1207           ONLINE SOCIAL NETWORKS: MODEL        Net Working
                                AND MECHANISMS


                                                                Cloud        2012
 8      J1208      Cloud Data Protection for the Masses
                                                              Computing

                                                                             2012
 9      J1209    Cut Detection in Wireless Sensor Networks   Networking
2012
                 Game-Theoretic Pricing for Video
10   J1210               Streaming in                     Networking
                       Mobile Networks
                                                                        2012
11   J1211       Organizing User Search Histories         Data Mining

                                                                        2012
12   J1212    Ranking Model Adaptation for Domain-        Data Mining
                        Specific Search

                                                                        2012
13   J1213
             Online Modeling of Proactive Moderation
                                                          Data Mining
               System for Auction Fraud Detection

                                                                        2012
             Automatic Discovery of Association Orders
14   J1214    between Name and Aliases from the Web       Data Mining
             using Anchor Texts-based Co-occurrences
                                                                        2012
                An Efficient Caching Scheme and
15   J1215    Consistency Maintenance in Hybrid P2P
                                                             Data
                                                          Engineering
                             System
                                                                        2012
16   J1216
             In Tags We Trust: Trust modeling in social
                                                          Data Mining
                   tagging of multimedia content

                                                                        2012
17   J1217
               Protecting Location Privacy in Sensor       Mobile
              Networks against a Global Eavesdropper      Computing

                                                                        2012
18   J1218
              Packet Loss Control Using Tokens at the
                                                          Networking
                          Network Edge

                                                                        2012
19   J1219
              Ensuring Distributed Accountability for       Cloud
                    Data Sharing in the Cloud             Computing

                                                                        2012
20   J1220
                 Fast Data Collection in Tree-Based
                                                          Net Working
                     Wireless Sensor Networks

                                                                        2012
                A Secure Erasure Code-Based Cloud
21   J1221       Storage System with Secure Data
                                                            Cloud
                                                          Computing
                           Forwarding
2012
22   J1222
             Cloud Computing Security: From Single to        Cloud
                         Multi-Clouds                      Computing

                                                                          2012
             HASBE: A Hierarchical Attribute-Based
23   J1223   Solution for Flexible and Scalable Access
                                                             Cloud
                                                           Computing
                   Control in Cloud Computing
                                                                          2012
24   J1224
              Outsourced Similarity Search on Metric         Cloud
                           Data Assets                     Computing

                                                                          2012
              Scalable and Secure Sharing of Personal
25   J1225   Health Records in Cloud Computing using
                                                             Cloud
                                                           Computing
                    Attribute-based Encryption
                                                                          2012
26   J1226
              Toward Secure and Dependable Storage           Cloud
                  Services in Cloud Computing              Computing

                                                                          2012
                                                          Knowledge and
27   J1227
              Clustering with Multi-viewpoint-Based
                                                              Data
                        Similarity Measure
                                                           Engineering
                                                                          2012
28   J1228     Scalable Coding of Encrypted Images
                                                              Image
                                                            Processing

                                                           Parallel and   2012
              BloomCast: Efficient and Effective Full-
29   J1229      Text Retrieval in Unstructured P2P
                                                           Distributed
                                                             systems
                            Networks
                                                           Parallel and   2012
30   J1230    Payments for Outsourced Computations
                                                           Distributed
                                                             systems

                                                                          2012
31   J1231
                Adaptive Opportunistic Routing for
                                                           Networking
                   Wireless Ad Hoc Networks

                                                                          2012
32   J1232
             Design, Implementation, and Performance
                                                           Networking
             of a Load Balancer for SIP Server Clusters
2012
33   J1233
              Independent Directed Acyclic Graphs for
                                                        Networking
                    Resilient Multipath Routing

                                                                     2012
34   J1234
             MeasuRouting: A Framework for Routing
                                                        Networking
                  Assisted Traffic Monitoring

                                                                     2012
35   J1235
              Privacy- and Integrity-Preserving Range
                                                        Networking
                    Queries in Sensor Networks

                                                                     2012
36   J1236
                RIHT: A Novel Hybrid IP Traceback
                                                        Networking
                            Scheme

                                                                     2012
37   J1237
              Router Support for Fine-Grained Latency
                                                        Networking
                          Measurements

                                                                     2012
38   J1238
                 A Stochastic Model of Multi-virus       Secure
                             Dynamics                   Computing

                                                                     2012
39   J1239
              Design and Implementation of TARF: A       Secure
             Trust-Aware Routing Framework for WSNs     Computing

                                                                     2012
40   J1240
              Detecting and Resolving Firewall Policy    Secure
                            Anomalies                   Computing

                                                                     2012
41   J1241
              Detecting Spam Zombies by Monitoring       Secure
                        Outgoing Messages               Computing

                                                                     2012
                 On the Security of a Ticket-Based
42   J1242      Anonymity System with Traceability
                                                         Secure
                                                        Computing
                Property in Wireless Mesh Networks
                                                                     2012
43   J1243
              A Novel Data Embedding Method Using         Image
                  Adaptive Pixel Pair Matching          Processing

                                                                     2012
             Improving Various Reversible Data Hiding
44   J1244     Schemes Via Optimal Codes for Binary
                                                          Image
                                                        Processing
                             Covers
A SECURE INTRUSION DETECTION                                    2012
45   J1245        SYSTEM AGAINST DDOS                         Wireless
              ATTACK IN WIRELESS MOBILE AD-                   Network
                      HOC NETWORK
                                                                              2012
46   J1246
             Optimizing Cloud Resources for Delivering
                                                             Networking
               IPTV Services through Virtualization

                                                                              2012
                FESCIM: Fair, Efficient, and Secure
47   J1247       Cooperation Incentive Mechanism
                                                              Mobile
                                                             Computing
                  for Multihop Cellular Networks
                                                                              2012
48   J1248
             Energy-Efficient Strategies for Cooperative      Mobile
                   Multichannel MAC Protocols                Computing

                                                                              2012
                 A Trigger Identification Service for
49   J1249                   Defending
                                                              Mobile
                                                             Computing
                    Reactive Jammers in WSN
                                                                              2012
                FireCol: A Collaborative Protection
50   J1250     Network for the Detection of Flooding         Networking
                          DDoS Attacks
                                                                              2012
51   J1251
                 Fast Matrix Embedding by Matrix           Network Security
                             Extending

              A Network Coding Equivalent Content           Parallel And      2012
52   J1252                                                  Distributed
             Distribution Scheme for Efficient Peer-to-
                  Peer Interactive VoD Streaming              Systems

                                                            Parallel And      2012
53   J1253
               Distributed Packet Buffers for High-         Distributed
                Bandwidth Switches and Routers                Systems

               Efficient Fuzzy Type-Ahead Search in        Knowledge And      2012
54   J1254                   XML Data                          Data
                                                            Engineering

               Footprint: Detecting Sybil Attacks in        Parallel And      2012
55   J1255         Urban Vehicular Networks                 Distributed
                                                              Systems
Handwritten Chinese Text Recognition by      Pattern       2012
56               Integrating Multiple Contexts          Analysis And
     J1256                                                Machine
                                                        Intelligence
              On Optimizing Overlay Topologies for      Parallel And    2012
57   J1257    Search in Unstructured Peer-to-Peer       Distributed
                           Networks                       Systems

             Holistic Top-k Simple Shortest Path Join   Knowledge &     2012
58   J1258                  in Graphs                       Data
                                                         Engineering
                 Confucius: A Tool Supporting             Service       2012
59   J1259      Collaborative Scientific Workflow        Computing
                          Composition                   (Web Service)
PROJECT
S.No                            Project Title                   Domain          Year
        CODE

                          AMPLE: An Adaptive Traffic                          2012
                                   Engineering
 1     D1201                                                  Net Working
                                 System Based on
                        Virtual Routing Topologies
                                                                              2012
                    Compressed-Sensing-Enabled Video
 2     D1202                  Streaming for                   Net Working
                   Wireless Multimedia Sensor Networks.
                                                                              2012
                  Design and Implementation of TARF: A
 3     D1203                                                  Net Working
                 Trust-Aware Routing Framework for WSNs

                                                                              2012
                                                                 Mobile
                 Network Assisted Mobile Computing with
 4     D1204                                                    Computing
                    Optimal Uplink Query Processing
                                                              (Net Working)
                  Optimal Power Allocation in Multi-Relay                     2012
                                 MIMO
 5     D1205                                                  Net Working
                    Cooperative Networks: Theory and
                               Algorithms
                                                                              2012
                        Robust Face-Name Graph Matching
                                                              Digital Image
 6     D1206                        for Movie
                                                               Processing
                          Character Identification

                         Scalable and Secure Sharing of                       2012
                                 Personal Health
 7     D1207                                                  Data Mining
                        Records in Cloud Computing using
                        Attribute-based Encryption
                    Securing Node Capture Attacks for                         2012
 8     D1208     Hierarchical Data Aggregation in Wireless    Data Mining
                              Sensor Networks

                  SPOC: A Secure and Privacy-preserving          Mobile       2012
 9     D1209      Opportunistic Computing Framework for         Computing
                      Mobile-Healthcare Emergency             (Net Working)
                                                                              2012
                 Topology control in mobile ad hoc networks
 10    D1210                                                  Net Working
                     with cooperative communications
The world in a nutshell concise range         Cloud          2012
11   D1211   queries. Heuristics Based Query Processing     computing
                for Large RDF Graphs Using Cloud
                             Computing.                                      2012
             Automatic Reconfiguration for Large-Scale
12   D1212                                                  Networking
                      Reliable Storage Systems

                                                                             2012
             A Novel Anti phishing framework based on     Image Processing
13   D1213
                       visual cryptography

                                                                             2012
             Semi supervised Biased Maximum Margin            Image
14   D1214
              Analysis for Interactive Image Retrieval      Processing

                                                                             2012
              Revisiting Defenses against Large-Scale        Secure
15   D1215
                Online Password Guessing Attacks            Computing

                                                                             2012
                                                              Cloud
               Efficient Audit Service Outsourcing for
16   D1216                                                  computing
                       Data Integrity in Clouds.

                                                                             2012
             Toward Reliable Data Delivery for Highly        Mobile
17   D1217
               Dynamic Mobile AdHoc Networks                Computing

                                                                             2012
             A New Cell Counting Based Attack Against
18   D1218                                                  Networking
                               Tor.

                  BECAN: A Bandwidth-Efficient                               2012
                                                            Networking
              Cooperative Authentication Scheme for
19   D1219
              Filtering Injected False Data in Wireless
                          Sensor Networks.
                                                                             2012
              Towards Secure and Dependable Storage           Cloud
20   D1220
                  Services in Cloud Computing.              Computing

                                                                             2012
                A Secure Erasure Code-Based Cloud
                                                          Cloud Computing
21   D1221       Storage System with Secure Data
                           Forwarding
2012
              Cloud Computing Security From Single to Multi-        Cloud Computing
22   D1222
                                Clouds                             (IEEE Conference)

                                                                                       2012
             Enhanced Data Security Model for Cloud Computing       Cloud Computing
23   D1223                                                         (IEEE Conference)

                                                                                       2012
                Ensuring Distributed Accountability for Data       Cloud Computing
24   D1224
                           Sharing in the Cloud.

             HASBE: A Hierarchical Attribute-Based Solution for                        2012
               Flexible and Scalable Access Control in Cloud       Cloud Computing
25   D1225
                                Computing

                                                                                       2012
                                                                   Cloud Computing
26   D1226   Outsourced Similarity Search on Metric Data Assets

                                                                                       2012
                                                                   Cloud Computing
27           Privacy-Preserving Public Auditing for Secure Cloud
     D1227
                                  Storage

                                                                                       2012
28                                                                  Knowledge and
     D1228     A Query Formulation Language for the data web
                                                                   Data Engineering

                                                                                       2012
29                Creating Evolving User Behavior Profiles          Knowledge and
     D1229
                               Automatically                       Data Engineering


              A D-Cache: Universal Distance Cache for Metric                           2012
30                          Access Methods                          Knowledge and
     D1230                                                         Data Engineering
                                      -
                                                                                       2012
             DDD: A New Ensemble Approach for Dealing with
31                                                                  Knowledge and
     D1231                  Concept Drift                          Data Engineering

                                                                                       2012
32           Efficient Computation of Range Aggregates against      Knowledge and
     D1232
                      Uncertain Location-Based Queries             Data Engineering
2012
33                                                                  Knowledge and
     D1233    Efficient Fuzzy Type-Ahead Search in XML Data
                                                                   Data Engineering

                                                                                        2012
34             Horizontal Aggregations in SQL to Prepare Data       Knowledge and
     D1234
                       Sets for Data Mining Analysis               Data Engineering

                                                                                        2012
35            Improving Aggregate Recommendation Diversity          Knowledge and
     D1235
                     Using Ranking-Based Techniques                Data Engineering

                                                                                        2012
36            Measuring the Sky: On Computing Data Cubes via        Knowledge and
     D1236
                          Skylining the Measures                   Data Engineering

                                                                                        2012
37                                                                  Knowledge and
     D1237       Mining Web Graphs for Recommendations
                                                                   Data Engineering

                                                                                        2012
38                                                                  Knowledge and
     D1238            Organizing User Search Histories
                                                                   Data Engineering
                                                                                        2012
39            Publishing Search Logs—A Comparative Study of         Knowledge and
     D1239
                             Privacy Guarantees                    Data Engineering
                                                                                        2012
40           Query Planning for Continuous Aggregation Queries      Knowledge and
     D1240
                    over a Network of Data Aggregators             Data Engineering

                                                                                        2012
41           ROAD: A New Spatial Object Search Framework for        Knowledge and
     D1241
                           Road Networks                           Data Engineering

                                                                                        2012
42                                                                  Knowledge and
     D1242        Scalable Learning of Collective Behavior
                                                                   Data Engineering
                                                                                        2012
43            Slicing: A New Approach for Privacy Preserving        Knowledge and
     D1243
                             Data Publishing                       Data Engineering

                                                                                        2012
44             Tree-Based Mining for Discovering Patterns of        Knowledge and
     D1244
                      Human Interaction in Meetings                Data Engineering

                                                                                        2012
45             Bounding the Impact of Unbounded Attacks in            Parallel and
     D1245
                              Stabilization                       Distributed Systems

                                                                                        2012
46           Catching Packet Droppers and Modifiers in Wireless       Parallel and
     D1246
                              Sensor Networks                     Distributed Systems
2012
47           The Three-Tier Security Scheme in Wireless Sensor           Parallel and
     D1247
                       Networks with Mobile Sinks                    Distributed Systems

48                                                                                         2012
     D1248    ` A New Cell-Counting-Based Attack Against Tor            Net Working

49                                                                                         2012
     D1249   Optimal Source-Based Filtering of Malicious Traffic        Net Working

             A Secure Intrusion detection system against DDOS                              2012
50                                                                   Secure Computing
     D1250
                attack in Wireless Mobile Ad-hoc Network                  (IJCA)

51             ES-MPICH2: A Message Passing Interface with                                 2012
     D1251                                                           Secure Computing
                          Enhanced Security

                  On the Security and Efficiency of Content                                2012
52   D1252                                                           Secure Computing
                      Distribution via Network Coding
                                                                                           2012
53            A Novel Data Embedding Method Using Adaptive
     D1253                                                            Image Processing
                            Pixel Pair Matching

                                                                                           2012
54              A Probabilistic Model of Visual Cryptography
     D1254                                                            Image Processing
                       Scheme With Dynamic Group

                                                                                           2012
55   D1255               Active Visual Segmentation                   Image Processing

                                                                                           2012
56             Image Segmentation Based on the Poincaré Map
     D1256                                                            Image Processing
                                 Method

                                                                                           2012
                   K-N SECRET SHARING VISUAL                          Image Processing
57   D1257      CRYPTOGRAPHY SCHEME FOR COLOR
                  IMAGE USING RANDOM NUMBER                               (IJEST)

                                                                      Image Processing     2012
58           Multiple Exposure Fusion for High Dynamic Range
     D1258
                            Image Acquisition
                                                                      Image Processing     2012
59   D1259      Smile Detection by Boosting Pixel Differences

                                                                                           2012
                                                                      Image Processing
60           View-invariant action recognition based on Artificial
     D1260
                              Neural Networks
2012
61   D1261   Cooperative Download in Vehicular Environments    Mobile Computing


                                                                                  2012
62           Distributed Throughput Maximization in Wireless
     D1262                                                     Mobile Computing
                 Networks Via Random Power Allocation

                                                                                  2012
63            Protecting Location Privacy in Sensor Networks
     D1263                                                     Mobile Computing
                       against a Global Eavesdropper

                                                                                  2012
64             Efficient Multi-dimensional Fuzzy Search for     Knowledge and
     D1264
                Personal Information Management Systems        Data Engineering

                    An Online Learning Approach to                IMAGE
65                                                              PROCESSING
     D1265           Occlusion Boundary Detection                                   2012


               Automatic Image Equalization and Contrast          IMAGE           2012
66                                                              PROCESSING
     D1266   Enhancement Using Gaussian Mixture Modeling

                     Automatic Reconfiguration for              DEPENDABLE        2012
67                                                              AND SECURE
     D1267        Large-Scale Reliable Storage Systems
                                                                COMPUTING

                  Cashing in on the Cache in the Cloud            CLOUD           2012
68                                                              COMPUTING
     D1268


               Efficient audit service outsourcing for data       CLOUD           2012
69                          integrity in clouds                 COMPUTING
     D1269


             Enabling Secure and Efficient Ranked Keyword         CLOUD           2012
70                                                              COMPUTING
     D1270         Search over Outsourced Cloud Data
Expert Discovery and Interactions           CLOUD        2012
71                                                           COMPUTING
     D1271         in Mixed Service-Oriented Systems

                 Publishing Search Logs—A Comparative        KNOWLEDGE      2012
72                                                            AND DATA
     D1272            Study of Privacy Guarantees
                                                             ENGINEERING

                 Revisiting Defenses against Large-Scale     DEPENDABLE     2012
73                                                           AND SECURE
     D1273         Online Password Guessing Attacks
                                                             COMPUTING

                                                                Image       2012
74           Nonlinear Approach for Enhancement of Image      Processing
     D1274
                  Focus Volume in Shape From Focus

                                                              Parallel &    2012
75            BloomCast: Efficient and Effective Full-Text    Distributed
     D1275
               Retrieval in Unstructured P2P Networks          Systems

               An Extensible Framework for Improving a                      2012
76             Distributed Software System's Deployment       Software
     D1276
                              Architecture                   Engineering

                Semantic-Aware Metadata Organization          Parallel &    2012
77             Paradigm in Next-Generation File Systems       Distributed
     D1277
                                                               Systems

             Improving End-to-End Routing Performance of      Parallel &    2012
78              Greedy Forwarding in Sensor Networks          Distributed
     D1278
                                                               Systems

               Model Checking Semantically Annotated          Software      2012
79                           Services                        Engineering
     D1279
S.No   Project
                              Project Title                 Domain       Year
       Code

 1     J1101      Effective Navigation of Query Results    Data Mining   2011
                      Based on Concept Hierarchies


 2     J1102         Ranking Spatial Data by Quality       Data Mining   2011
                              Preferences

                   Discovering Conditional Functional
 3     J1103                 Dependencies                  Data Mining   2011


                  Extended XML Tree Pattern Matching:      Data Mining
 4     J1104            Theories and Algorithms              Cloud       2011
                                                           Computing
                                                           Data Mining
 5     J1105     The CoQUOS Approach to Continuous                       2011
                                                            On grid
                   Queries in Unstructured Overlays
                                                           computing

                 Modeling and Detection of Camouflaging     Network
 6     J1106                                                             2011
                                Worm                        Security

                 SAT: A Security Architecture Achieving     Network
 7     J1107     Anonymity and Traceability in Wireless                  2011
                                                            Security
                           Mesh Networks
                    Delay Analysis and Optimality of
 8     J1108        Scheduling Policies for Multi-Hop      Networking    2011
                           Wireless Networks

 9     J1109     Nymble: Blocking Misbehaving Users in     Networking    2011
                       Anonymizing Networks


 10    J1110     Buffer Sizing for 802.11 Based Networks   Networking    2011
A Privacy-Preserving Location            Mobile
11    J1111     Monitoring System for Wireless Sensor                    2011
                                                           Computing
                             Networks
                 Secure and Practical Outsourcing of         Cloud
12    J1112        Linear Programming in Cloud                           2011
                                                           Computing
                             Computing

                A New Approach For Fec Decoding
13                                                          Network
     JIE1101   Based On The Bp Algorithm In Lte And
                                                            Security     2011
                         Wimax Systems

14              Clustering With Multi-Viewpoint Based         Data
     JIE1104                                                             2011
                           Similarity Measure              Engineering


15                                                            Data
     JIE1105      Decision Trees For Uncertain Data                      2011
                                                           Engineering


16              Sketch4match – Content-Based Image           Image
     JIE1115                                                             2011
                   Retrieval System Using Sketches         Processing


17              A Competitive Study Of Cryptography          Secure
     JIE1117                                                             2011
                   Techniques Over Block Cipher            Computing


18             Ritas: Services For Randomized Intrusion      Secure
     JIE1118                                                             2011
                                Tolerance                  Computing

                                                            Wireless
19               Utility-Optimal Multi-Pattern Reuse
     JIE1119                                              Communicatio   2011
                         Inmulti-Cell Networks
                                                               n

20              Selfish Overlay Network Creation And
     JIE1120                                               Networking    2011
                             Maintenance


21               Cloud Computing For Agent-Based           Intelligent
     JIE1121                                                             2011
                   Urban Transportation Systems             Systems

                  Supporting Efficient And Scalable
22                                                          Mobile
     JIE1122      Multicasting Over Mobile Ad Hoc                        2011
                                                           Computing
                              Networks
23               Throughput Optimization in Mobile         Mobile
     JIE1123                                                           2011
                       Backbone Networks.                 Computing

                                                          Network &
24              Locating Equivalent Servants Over P2p
     JIE1124                                                Service    2011
                              Networks
                                                          Management

25              Improving Utilization Of Infrastructure     Cloud
     JIE1125                                                           2011
                                Clouds                    Computing


26                 Dynamics of Malware Spread in            Secure
     JIE1126                                                           2011
                 Decentralized Peer-to-Peer Networks      Computing


27             Wireless Sensor Network Security Model      Mobile
     JIE1127                                                           2011
                  Using Zero Knowledge Protocol           Computing

                  Going Back And Forth: Efficient
28                                                          Cloud
     JIE1128   Multideployment And Multisnapshotting                   2011
                                                          Computing
                            On Clouds

29                 Progme: Towards Programmable
     JIE1129                                              Networking   2011
                       Network Measurement


30             Live Streaming With Receiver-Based Peer-   Networking
     JIE1130                                                           2011
                         Division Multiplexing
S.No   PROJECT
                               Project Title                    Domain       Year
        CODE


                 Efficient computation of range aggregates
 1      D1101                                                  Data Mining
                  against uncertain location based queries                   2011


                 Exploring application-level semantics for
 2      D1102                                                  Data Mining   2011
                            data compression.


                   Improving aggregate recommendation
 3      D1103                                                  Data Mining   2011
                  diversity using ranking-based techniques

                 One size does not fit all towards user- and
 4      D1104       query-dependent ranking for web            Data Mining   2011
                                databases.


 5      D1105    Optimal service pricing for a cloud cache     Data Mining   2011


                  A personalized ontology model for web
 6      D1106             information gathering                Data Mining   2011


                  Publishing search logs – a comparative
 7      D1107           study of privacy guarantees            Data Mining   2011



 8      D1108     Scalable learning of collective behavior.    Data Mining   2011

                 The awareness network, to whom should i
 9      D1109     display my actions? And, whose actions       Data Mining   2011
                             should i monitor?

                    Monitoring service systems from a
 10     D1110                                                  Data Mining   2011
                      language-action perspective
The world in a nutshell concise range
11   D1111                                                   Data Mining   2011
                             queries.

             A query formulation language for the data
12   D1112                                                   Data Mining   2011
                               web


             Horizontal aggregations in sql to prepare                     2011
13   D1113                                                   Data Mining
                data sets for data mining analysis

              Exploiting dynamic resource allocation
14   D1114   for efficient parallel data processing in the   Data Mining   2011
                                 cloud

             Adaptive provisioning of human expertise
15   D1115          in service-oriented systems              Data Mining   2011


                 Bridging socially-enhanced virtual
16   D1116                 communities                       Data Mining   2011


                 Continuous neighbor discovery in
7    D1117        asynchronous Sensor networks               Data Mining   2011

               Jamming-aware traffic allocation for
18   D1118     multiple-path routing using portfolio         Data Mining   2011
                             selection

                                                             Knowledge &
19   D1119     Data integrity proofs in cloud storage           Data       2011
                                                             Engineering

                 The geometric efficient matching             Network
20   D1120                                                                 2011
                      algorithm for firewalls                 Security

                 Adaptive fault tolerant qos control
             algorithms for maximizing system lifetime        Network
21   D1121                                                                 2011
              of query-based wireless sensor networks         Security

Más contenido relacionado

Similar a ieee CSE & IT M.tech\BTECH project list

Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
Soundar Msr
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
Musthafa Tema
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
tema_solution
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech
JPINFOTECH JAYAPRAKASH
 
2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech
JPINFOTECH JAYAPRAKASH
 

Similar a ieee CSE & IT M.tech\BTECH project list (20)

Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech
 
2012 - 2013 bulk ieee projects for sale
2012 - 2013 bulk ieee projects for sale2012 - 2013 bulk ieee projects for sale
2012 - 2013 bulk ieee projects for sale
 
2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES
 
2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES2012 - 2013 DOTNET IEEE PROJECT TITLES
2012 - 2013 DOTNET IEEE PROJECT TITLES
 
2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech2012 13 ieee java titles - jp infotech
2012 13 ieee java titles - jp infotech
 

Más de Vision Solutions

IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
Vision Solutions
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
Vision Solutions
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
Vision Solutions
 
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTIEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LIST
Vision Solutions
 
IEEE 2013 MATLAB EEE PROJECT LIST
IEEE 2013 MATLAB EEE PROJECT LISTIEEE 2013 MATLAB EEE PROJECT LIST
IEEE 2013 MATLAB EEE PROJECT LIST
Vision Solutions
 
IEEE EMBDDED EEE PROJECT LIST
IEEE EMBDDED EEE PROJECT LISTIEEE EMBDDED EEE PROJECT LIST
IEEE EMBDDED EEE PROJECT LIST
Vision Solutions
 

Más de Vision Solutions (20)

Cse python titles 2020
Cse python titles 2020Cse python titles 2020
Cse python titles 2020
 
Civil project tittles 2020
Civil project tittles 2020Civil project tittles 2020
Civil project tittles 2020
 
Civil project tittles 2019
Civil project tittles 2019Civil project tittles 2019
Civil project tittles 2019
 
Mechnical project list 2020
Mechnical project list 2020Mechnical project list 2020
Mechnical project list 2020
 
Cse titles 2020
Cse titles 2020Cse titles 2020
Cse titles 2020
 
Ieee 2020 matlab project list
Ieee 2020 matlab project listIeee 2020 matlab project list
Ieee 2020 matlab project list
 
Eee hardware list
Eee hardware listEee hardware list
Eee hardware list
 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
 
Ieee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project listIeee m.tech embedded 2018 project list
Ieee m.tech embedded 2018 project list
 
Ieee eee embedded 2018 project list
Ieee eee embedded 2018 project listIeee eee embedded 2018 project list
Ieee eee embedded 2018 project list
 
Ieee ece embedded 2018 project list
Ieee ece embedded 2018 project listIeee ece embedded 2018 project list
Ieee ece embedded 2018 project list
 
Ieee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives listIeee m.tech 2018 power systems & power electronics & drives list
Ieee m.tech 2018 power systems & power electronics & drives list
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
 
IEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projectsIEEE 2017 EEE matlab projects
IEEE 2017 EEE matlab projects
 
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LISTIEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
 
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
 
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LISTIEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LIST
 
IEEE 2013 MATLAB EEE PROJECT LIST
IEEE 2013 MATLAB EEE PROJECT LISTIEEE 2013 MATLAB EEE PROJECT LIST
IEEE 2013 MATLAB EEE PROJECT LIST
 
IEEE EMBDDED EEE PROJECT LIST
IEEE EMBDDED EEE PROJECT LISTIEEE EMBDDED EEE PROJECT LIST
IEEE EMBDDED EEE PROJECT LIST
 

ieee CSE & IT M.tech\BTECH project list

  • 1. Academic Projects for EEE (2012-2013) We will develop your ideas and your papers also, For any Further information call-9603150547 e-mail visionsolutions.9@gmail.com
  • 2. Project S.No Project Title Domain Year Code Service 1 J1201 Bootstrapping Ontologies for Web Services Computing 2012 (Web service) Cooperative Provable Data Possession for 2012 2 J1202 Integrity Verification in Multi-Cloud Data Mining Storage Packet-Hiding Methods for Preventing 2012 3 J1203 Selective Jamming Attacks Net Working Learn to Personalized Image Search from 2012 4 J1204 the Photo Sharing Websites Data Mining Risk-Aware Mitigation for MANET 2012 5 J1205 Routing Attacks Net Working Slicing: A New Approach to Privacy 2012 6 J1206 Preserving Data Publishing Data Mining *MULTIPARTY ACCESS CONTROL FOR 2012 7 J1207 ONLINE SOCIAL NETWORKS: MODEL Net Working AND MECHANISMS Cloud 2012 8 J1208 Cloud Data Protection for the Masses Computing 2012 9 J1209 Cut Detection in Wireless Sensor Networks Networking
  • 3. 2012 Game-Theoretic Pricing for Video 10 J1210 Streaming in Networking Mobile Networks 2012 11 J1211 Organizing User Search Histories Data Mining 2012 12 J1212 Ranking Model Adaptation for Domain- Data Mining Specific Search 2012 13 J1213 Online Modeling of Proactive Moderation Data Mining System for Auction Fraud Detection 2012 Automatic Discovery of Association Orders 14 J1214 between Name and Aliases from the Web Data Mining using Anchor Texts-based Co-occurrences 2012 An Efficient Caching Scheme and 15 J1215 Consistency Maintenance in Hybrid P2P Data Engineering System 2012 16 J1216 In Tags We Trust: Trust modeling in social Data Mining tagging of multimedia content 2012 17 J1217 Protecting Location Privacy in Sensor Mobile Networks against a Global Eavesdropper Computing 2012 18 J1218 Packet Loss Control Using Tokens at the Networking Network Edge 2012 19 J1219 Ensuring Distributed Accountability for Cloud Data Sharing in the Cloud Computing 2012 20 J1220 Fast Data Collection in Tree-Based Net Working Wireless Sensor Networks 2012 A Secure Erasure Code-Based Cloud 21 J1221 Storage System with Secure Data Cloud Computing Forwarding
  • 4. 2012 22 J1222 Cloud Computing Security: From Single to Cloud Multi-Clouds Computing 2012 HASBE: A Hierarchical Attribute-Based 23 J1223 Solution for Flexible and Scalable Access Cloud Computing Control in Cloud Computing 2012 24 J1224 Outsourced Similarity Search on Metric Cloud Data Assets Computing 2012 Scalable and Secure Sharing of Personal 25 J1225 Health Records in Cloud Computing using Cloud Computing Attribute-based Encryption 2012 26 J1226 Toward Secure and Dependable Storage Cloud Services in Cloud Computing Computing 2012 Knowledge and 27 J1227 Clustering with Multi-viewpoint-Based Data Similarity Measure Engineering 2012 28 J1228 Scalable Coding of Encrypted Images Image Processing Parallel and 2012 BloomCast: Efficient and Effective Full- 29 J1229 Text Retrieval in Unstructured P2P Distributed systems Networks Parallel and 2012 30 J1230 Payments for Outsourced Computations Distributed systems 2012 31 J1231 Adaptive Opportunistic Routing for Networking Wireless Ad Hoc Networks 2012 32 J1232 Design, Implementation, and Performance Networking of a Load Balancer for SIP Server Clusters
  • 5. 2012 33 J1233 Independent Directed Acyclic Graphs for Networking Resilient Multipath Routing 2012 34 J1234 MeasuRouting: A Framework for Routing Networking Assisted Traffic Monitoring 2012 35 J1235 Privacy- and Integrity-Preserving Range Networking Queries in Sensor Networks 2012 36 J1236 RIHT: A Novel Hybrid IP Traceback Networking Scheme 2012 37 J1237 Router Support for Fine-Grained Latency Networking Measurements 2012 38 J1238 A Stochastic Model of Multi-virus Secure Dynamics Computing 2012 39 J1239 Design and Implementation of TARF: A Secure Trust-Aware Routing Framework for WSNs Computing 2012 40 J1240 Detecting and Resolving Firewall Policy Secure Anomalies Computing 2012 41 J1241 Detecting Spam Zombies by Monitoring Secure Outgoing Messages Computing 2012 On the Security of a Ticket-Based 42 J1242 Anonymity System with Traceability Secure Computing Property in Wireless Mesh Networks 2012 43 J1243 A Novel Data Embedding Method Using Image Adaptive Pixel Pair Matching Processing 2012 Improving Various Reversible Data Hiding 44 J1244 Schemes Via Optimal Codes for Binary Image Processing Covers
  • 6. A SECURE INTRUSION DETECTION 2012 45 J1245 SYSTEM AGAINST DDOS Wireless ATTACK IN WIRELESS MOBILE AD- Network HOC NETWORK 2012 46 J1246 Optimizing Cloud Resources for Delivering Networking IPTV Services through Virtualization 2012 FESCIM: Fair, Efficient, and Secure 47 J1247 Cooperation Incentive Mechanism Mobile Computing for Multihop Cellular Networks 2012 48 J1248 Energy-Efficient Strategies for Cooperative Mobile Multichannel MAC Protocols Computing 2012 A Trigger Identification Service for 49 J1249 Defending Mobile Computing Reactive Jammers in WSN 2012 FireCol: A Collaborative Protection 50 J1250 Network for the Detection of Flooding Networking DDoS Attacks 2012 51 J1251 Fast Matrix Embedding by Matrix Network Security Extending A Network Coding Equivalent Content Parallel And 2012 52 J1252 Distributed Distribution Scheme for Efficient Peer-to- Peer Interactive VoD Streaming Systems Parallel And 2012 53 J1253 Distributed Packet Buffers for High- Distributed Bandwidth Switches and Routers Systems Efficient Fuzzy Type-Ahead Search in Knowledge And 2012 54 J1254 XML Data Data Engineering Footprint: Detecting Sybil Attacks in Parallel And 2012 55 J1255 Urban Vehicular Networks Distributed Systems
  • 7. Handwritten Chinese Text Recognition by Pattern 2012 56 Integrating Multiple Contexts Analysis And J1256 Machine Intelligence On Optimizing Overlay Topologies for Parallel And 2012 57 J1257 Search in Unstructured Peer-to-Peer Distributed Networks Systems Holistic Top-k Simple Shortest Path Join Knowledge & 2012 58 J1258 in Graphs Data Engineering Confucius: A Tool Supporting Service 2012 59 J1259 Collaborative Scientific Workflow Computing Composition (Web Service)
  • 8. PROJECT S.No Project Title Domain Year CODE AMPLE: An Adaptive Traffic 2012 Engineering 1 D1201 Net Working System Based on Virtual Routing Topologies 2012 Compressed-Sensing-Enabled Video 2 D1202 Streaming for Net Working Wireless Multimedia Sensor Networks. 2012 Design and Implementation of TARF: A 3 D1203 Net Working Trust-Aware Routing Framework for WSNs 2012 Mobile Network Assisted Mobile Computing with 4 D1204 Computing Optimal Uplink Query Processing (Net Working) Optimal Power Allocation in Multi-Relay 2012 MIMO 5 D1205 Net Working Cooperative Networks: Theory and Algorithms 2012 Robust Face-Name Graph Matching Digital Image 6 D1206 for Movie Processing Character Identification Scalable and Secure Sharing of 2012 Personal Health 7 D1207 Data Mining Records in Cloud Computing using Attribute-based Encryption Securing Node Capture Attacks for 2012 8 D1208 Hierarchical Data Aggregation in Wireless Data Mining Sensor Networks SPOC: A Secure and Privacy-preserving Mobile 2012 9 D1209 Opportunistic Computing Framework for Computing Mobile-Healthcare Emergency (Net Working) 2012 Topology control in mobile ad hoc networks 10 D1210 Net Working with cooperative communications
  • 9. The world in a nutshell concise range Cloud 2012 11 D1211 queries. Heuristics Based Query Processing computing for Large RDF Graphs Using Cloud Computing. 2012 Automatic Reconfiguration for Large-Scale 12 D1212 Networking Reliable Storage Systems 2012 A Novel Anti phishing framework based on Image Processing 13 D1213 visual cryptography 2012 Semi supervised Biased Maximum Margin Image 14 D1214 Analysis for Interactive Image Retrieval Processing 2012 Revisiting Defenses against Large-Scale Secure 15 D1215 Online Password Guessing Attacks Computing 2012 Cloud Efficient Audit Service Outsourcing for 16 D1216 computing Data Integrity in Clouds. 2012 Toward Reliable Data Delivery for Highly Mobile 17 D1217 Dynamic Mobile AdHoc Networks Computing 2012 A New Cell Counting Based Attack Against 18 D1218 Networking Tor. BECAN: A Bandwidth-Efficient 2012 Networking Cooperative Authentication Scheme for 19 D1219 Filtering Injected False Data in Wireless Sensor Networks. 2012 Towards Secure and Dependable Storage Cloud 20 D1220 Services in Cloud Computing. Computing 2012 A Secure Erasure Code-Based Cloud Cloud Computing 21 D1221 Storage System with Secure Data Forwarding
  • 10. 2012 Cloud Computing Security From Single to Multi- Cloud Computing 22 D1222 Clouds (IEEE Conference) 2012 Enhanced Data Security Model for Cloud Computing Cloud Computing 23 D1223 (IEEE Conference) 2012 Ensuring Distributed Accountability for Data Cloud Computing 24 D1224 Sharing in the Cloud. HASBE: A Hierarchical Attribute-Based Solution for 2012 Flexible and Scalable Access Control in Cloud Cloud Computing 25 D1225 Computing 2012 Cloud Computing 26 D1226 Outsourced Similarity Search on Metric Data Assets 2012 Cloud Computing 27 Privacy-Preserving Public Auditing for Secure Cloud D1227 Storage 2012 28 Knowledge and D1228 A Query Formulation Language for the data web Data Engineering 2012 29 Creating Evolving User Behavior Profiles Knowledge and D1229 Automatically Data Engineering A D-Cache: Universal Distance Cache for Metric 2012 30 Access Methods Knowledge and D1230 Data Engineering - 2012 DDD: A New Ensemble Approach for Dealing with 31 Knowledge and D1231 Concept Drift Data Engineering 2012 32 Efficient Computation of Range Aggregates against Knowledge and D1232 Uncertain Location-Based Queries Data Engineering
  • 11. 2012 33 Knowledge and D1233 Efficient Fuzzy Type-Ahead Search in XML Data Data Engineering 2012 34 Horizontal Aggregations in SQL to Prepare Data Knowledge and D1234 Sets for Data Mining Analysis Data Engineering 2012 35 Improving Aggregate Recommendation Diversity Knowledge and D1235 Using Ranking-Based Techniques Data Engineering 2012 36 Measuring the Sky: On Computing Data Cubes via Knowledge and D1236 Skylining the Measures Data Engineering 2012 37 Knowledge and D1237 Mining Web Graphs for Recommendations Data Engineering 2012 38 Knowledge and D1238 Organizing User Search Histories Data Engineering 2012 39 Publishing Search Logs—A Comparative Study of Knowledge and D1239 Privacy Guarantees Data Engineering 2012 40 Query Planning for Continuous Aggregation Queries Knowledge and D1240 over a Network of Data Aggregators Data Engineering 2012 41 ROAD: A New Spatial Object Search Framework for Knowledge and D1241 Road Networks Data Engineering 2012 42 Knowledge and D1242 Scalable Learning of Collective Behavior Data Engineering 2012 43 Slicing: A New Approach for Privacy Preserving Knowledge and D1243 Data Publishing Data Engineering 2012 44 Tree-Based Mining for Discovering Patterns of Knowledge and D1244 Human Interaction in Meetings Data Engineering 2012 45 Bounding the Impact of Unbounded Attacks in Parallel and D1245 Stabilization Distributed Systems 2012 46 Catching Packet Droppers and Modifiers in Wireless Parallel and D1246 Sensor Networks Distributed Systems
  • 12. 2012 47 The Three-Tier Security Scheme in Wireless Sensor Parallel and D1247 Networks with Mobile Sinks Distributed Systems 48 2012 D1248 ` A New Cell-Counting-Based Attack Against Tor Net Working 49 2012 D1249 Optimal Source-Based Filtering of Malicious Traffic Net Working A Secure Intrusion detection system against DDOS 2012 50 Secure Computing D1250 attack in Wireless Mobile Ad-hoc Network (IJCA) 51 ES-MPICH2: A Message Passing Interface with 2012 D1251 Secure Computing Enhanced Security On the Security and Efficiency of Content 2012 52 D1252 Secure Computing Distribution via Network Coding 2012 53 A Novel Data Embedding Method Using Adaptive D1253 Image Processing Pixel Pair Matching 2012 54 A Probabilistic Model of Visual Cryptography D1254 Image Processing Scheme With Dynamic Group 2012 55 D1255 Active Visual Segmentation Image Processing 2012 56 Image Segmentation Based on the Poincaré Map D1256 Image Processing Method 2012 K-N SECRET SHARING VISUAL Image Processing 57 D1257 CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER (IJEST) Image Processing 2012 58 Multiple Exposure Fusion for High Dynamic Range D1258 Image Acquisition Image Processing 2012 59 D1259 Smile Detection by Boosting Pixel Differences 2012 Image Processing 60 View-invariant action recognition based on Artificial D1260 Neural Networks
  • 13. 2012 61 D1261 Cooperative Download in Vehicular Environments Mobile Computing 2012 62 Distributed Throughput Maximization in Wireless D1262 Mobile Computing Networks Via Random Power Allocation 2012 63 Protecting Location Privacy in Sensor Networks D1263 Mobile Computing against a Global Eavesdropper 2012 64 Efficient Multi-dimensional Fuzzy Search for Knowledge and D1264 Personal Information Management Systems Data Engineering An Online Learning Approach to IMAGE 65 PROCESSING D1265 Occlusion Boundary Detection 2012 Automatic Image Equalization and Contrast IMAGE 2012 66 PROCESSING D1266 Enhancement Using Gaussian Mixture Modeling Automatic Reconfiguration for DEPENDABLE 2012 67 AND SECURE D1267 Large-Scale Reliable Storage Systems COMPUTING Cashing in on the Cache in the Cloud CLOUD 2012 68 COMPUTING D1268 Efficient audit service outsourcing for data CLOUD 2012 69 integrity in clouds COMPUTING D1269 Enabling Secure and Efficient Ranked Keyword CLOUD 2012 70 COMPUTING D1270 Search over Outsourced Cloud Data
  • 14. Expert Discovery and Interactions CLOUD 2012 71 COMPUTING D1271 in Mixed Service-Oriented Systems Publishing Search Logs—A Comparative KNOWLEDGE 2012 72 AND DATA D1272 Study of Privacy Guarantees ENGINEERING Revisiting Defenses against Large-Scale DEPENDABLE 2012 73 AND SECURE D1273 Online Password Guessing Attacks COMPUTING Image 2012 74 Nonlinear Approach for Enhancement of Image Processing D1274 Focus Volume in Shape From Focus Parallel & 2012 75 BloomCast: Efficient and Effective Full-Text Distributed D1275 Retrieval in Unstructured P2P Networks Systems An Extensible Framework for Improving a 2012 76 Distributed Software System's Deployment Software D1276 Architecture Engineering Semantic-Aware Metadata Organization Parallel & 2012 77 Paradigm in Next-Generation File Systems Distributed D1277 Systems Improving End-to-End Routing Performance of Parallel & 2012 78 Greedy Forwarding in Sensor Networks Distributed D1278 Systems Model Checking Semantically Annotated Software 2012 79 Services Engineering D1279
  • 15. S.No Project Project Title Domain Year Code 1 J1101 Effective Navigation of Query Results Data Mining 2011 Based on Concept Hierarchies 2 J1102 Ranking Spatial Data by Quality Data Mining 2011 Preferences Discovering Conditional Functional 3 J1103 Dependencies Data Mining 2011 Extended XML Tree Pattern Matching: Data Mining 4 J1104 Theories and Algorithms Cloud 2011 Computing Data Mining 5 J1105 The CoQUOS Approach to Continuous 2011 On grid Queries in Unstructured Overlays computing Modeling and Detection of Camouflaging Network 6 J1106 2011 Worm Security SAT: A Security Architecture Achieving Network 7 J1107 Anonymity and Traceability in Wireless 2011 Security Mesh Networks Delay Analysis and Optimality of 8 J1108 Scheduling Policies for Multi-Hop Networking 2011 Wireless Networks 9 J1109 Nymble: Blocking Misbehaving Users in Networking 2011 Anonymizing Networks 10 J1110 Buffer Sizing for 802.11 Based Networks Networking 2011
  • 16. A Privacy-Preserving Location Mobile 11 J1111 Monitoring System for Wireless Sensor 2011 Computing Networks Secure and Practical Outsourcing of Cloud 12 J1112 Linear Programming in Cloud 2011 Computing Computing A New Approach For Fec Decoding 13 Network JIE1101 Based On The Bp Algorithm In Lte And Security 2011 Wimax Systems 14 Clustering With Multi-Viewpoint Based Data JIE1104 2011 Similarity Measure Engineering 15 Data JIE1105 Decision Trees For Uncertain Data 2011 Engineering 16 Sketch4match – Content-Based Image Image JIE1115 2011 Retrieval System Using Sketches Processing 17 A Competitive Study Of Cryptography Secure JIE1117 2011 Techniques Over Block Cipher Computing 18 Ritas: Services For Randomized Intrusion Secure JIE1118 2011 Tolerance Computing Wireless 19 Utility-Optimal Multi-Pattern Reuse JIE1119 Communicatio 2011 Inmulti-Cell Networks n 20 Selfish Overlay Network Creation And JIE1120 Networking 2011 Maintenance 21 Cloud Computing For Agent-Based Intelligent JIE1121 2011 Urban Transportation Systems Systems Supporting Efficient And Scalable 22 Mobile JIE1122 Multicasting Over Mobile Ad Hoc 2011 Computing Networks
  • 17. 23 Throughput Optimization in Mobile Mobile JIE1123 2011 Backbone Networks. Computing Network & 24 Locating Equivalent Servants Over P2p JIE1124 Service 2011 Networks Management 25 Improving Utilization Of Infrastructure Cloud JIE1125 2011 Clouds Computing 26 Dynamics of Malware Spread in Secure JIE1126 2011 Decentralized Peer-to-Peer Networks Computing 27 Wireless Sensor Network Security Model Mobile JIE1127 2011 Using Zero Knowledge Protocol Computing Going Back And Forth: Efficient 28 Cloud JIE1128 Multideployment And Multisnapshotting 2011 Computing On Clouds 29 Progme: Towards Programmable JIE1129 Networking 2011 Network Measurement 30 Live Streaming With Receiver-Based Peer- Networking JIE1130 2011 Division Multiplexing
  • 18. S.No PROJECT Project Title Domain Year CODE Efficient computation of range aggregates 1 D1101 Data Mining against uncertain location based queries 2011 Exploring application-level semantics for 2 D1102 Data Mining 2011 data compression. Improving aggregate recommendation 3 D1103 Data Mining 2011 diversity using ranking-based techniques One size does not fit all towards user- and 4 D1104 query-dependent ranking for web Data Mining 2011 databases. 5 D1105 Optimal service pricing for a cloud cache Data Mining 2011 A personalized ontology model for web 6 D1106 information gathering Data Mining 2011 Publishing search logs – a comparative 7 D1107 study of privacy guarantees Data Mining 2011 8 D1108 Scalable learning of collective behavior. Data Mining 2011 The awareness network, to whom should i 9 D1109 display my actions? And, whose actions Data Mining 2011 should i monitor? Monitoring service systems from a 10 D1110 Data Mining 2011 language-action perspective
  • 19. The world in a nutshell concise range 11 D1111 Data Mining 2011 queries. A query formulation language for the data 12 D1112 Data Mining 2011 web Horizontal aggregations in sql to prepare 2011 13 D1113 Data Mining data sets for data mining analysis Exploiting dynamic resource allocation 14 D1114 for efficient parallel data processing in the Data Mining 2011 cloud Adaptive provisioning of human expertise 15 D1115 in service-oriented systems Data Mining 2011 Bridging socially-enhanced virtual 16 D1116 communities Data Mining 2011 Continuous neighbor discovery in 7 D1117 asynchronous Sensor networks Data Mining 2011 Jamming-aware traffic allocation for 18 D1118 multiple-path routing using portfolio Data Mining 2011 selection Knowledge & 19 D1119 Data integrity proofs in cloud storage Data 2011 Engineering The geometric efficient matching Network 20 D1120 2011 algorithm for firewalls Security Adaptive fault tolerant qos control algorithms for maximizing system lifetime Network 21 D1121 2011 of query-based wireless sensor networks Security