1. Academic Projects for
EEE (2012-2013)
We will develop your ideas and your papers also,
For any Further information call-9603150547
e-mail visionsolutions.9@gmail.com
2. Project
S.No Project Title Domain Year
Code
Service
1 J1201 Bootstrapping Ontologies for Web Services Computing 2012
(Web service)
Cooperative Provable Data Possession for 2012
2 J1202 Integrity Verification in Multi-Cloud Data Mining
Storage
Packet-Hiding Methods for Preventing 2012
3 J1203 Selective Jamming Attacks Net Working
Learn to Personalized Image Search from 2012
4 J1204 the Photo Sharing Websites Data Mining
Risk-Aware Mitigation for MANET 2012
5 J1205 Routing Attacks Net Working
Slicing: A New Approach to Privacy 2012
6 J1206 Preserving Data Publishing Data Mining
*MULTIPARTY ACCESS CONTROL FOR 2012
7 J1207 ONLINE SOCIAL NETWORKS: MODEL Net Working
AND MECHANISMS
Cloud 2012
8 J1208 Cloud Data Protection for the Masses
Computing
2012
9 J1209 Cut Detection in Wireless Sensor Networks Networking
3. 2012
Game-Theoretic Pricing for Video
10 J1210 Streaming in Networking
Mobile Networks
2012
11 J1211 Organizing User Search Histories Data Mining
2012
12 J1212 Ranking Model Adaptation for Domain- Data Mining
Specific Search
2012
13 J1213
Online Modeling of Proactive Moderation
Data Mining
System for Auction Fraud Detection
2012
Automatic Discovery of Association Orders
14 J1214 between Name and Aliases from the Web Data Mining
using Anchor Texts-based Co-occurrences
2012
An Efficient Caching Scheme and
15 J1215 Consistency Maintenance in Hybrid P2P
Data
Engineering
System
2012
16 J1216
In Tags We Trust: Trust modeling in social
Data Mining
tagging of multimedia content
2012
17 J1217
Protecting Location Privacy in Sensor Mobile
Networks against a Global Eavesdropper Computing
2012
18 J1218
Packet Loss Control Using Tokens at the
Networking
Network Edge
2012
19 J1219
Ensuring Distributed Accountability for Cloud
Data Sharing in the Cloud Computing
2012
20 J1220
Fast Data Collection in Tree-Based
Net Working
Wireless Sensor Networks
2012
A Secure Erasure Code-Based Cloud
21 J1221 Storage System with Secure Data
Cloud
Computing
Forwarding
4. 2012
22 J1222
Cloud Computing Security: From Single to Cloud
Multi-Clouds Computing
2012
HASBE: A Hierarchical Attribute-Based
23 J1223 Solution for Flexible and Scalable Access
Cloud
Computing
Control in Cloud Computing
2012
24 J1224
Outsourced Similarity Search on Metric Cloud
Data Assets Computing
2012
Scalable and Secure Sharing of Personal
25 J1225 Health Records in Cloud Computing using
Cloud
Computing
Attribute-based Encryption
2012
26 J1226
Toward Secure and Dependable Storage Cloud
Services in Cloud Computing Computing
2012
Knowledge and
27 J1227
Clustering with Multi-viewpoint-Based
Data
Similarity Measure
Engineering
2012
28 J1228 Scalable Coding of Encrypted Images
Image
Processing
Parallel and 2012
BloomCast: Efficient and Effective Full-
29 J1229 Text Retrieval in Unstructured P2P
Distributed
systems
Networks
Parallel and 2012
30 J1230 Payments for Outsourced Computations
Distributed
systems
2012
31 J1231
Adaptive Opportunistic Routing for
Networking
Wireless Ad Hoc Networks
2012
32 J1232
Design, Implementation, and Performance
Networking
of a Load Balancer for SIP Server Clusters
5. 2012
33 J1233
Independent Directed Acyclic Graphs for
Networking
Resilient Multipath Routing
2012
34 J1234
MeasuRouting: A Framework for Routing
Networking
Assisted Traffic Monitoring
2012
35 J1235
Privacy- and Integrity-Preserving Range
Networking
Queries in Sensor Networks
2012
36 J1236
RIHT: A Novel Hybrid IP Traceback
Networking
Scheme
2012
37 J1237
Router Support for Fine-Grained Latency
Networking
Measurements
2012
38 J1238
A Stochastic Model of Multi-virus Secure
Dynamics Computing
2012
39 J1239
Design and Implementation of TARF: A Secure
Trust-Aware Routing Framework for WSNs Computing
2012
40 J1240
Detecting and Resolving Firewall Policy Secure
Anomalies Computing
2012
41 J1241
Detecting Spam Zombies by Monitoring Secure
Outgoing Messages Computing
2012
On the Security of a Ticket-Based
42 J1242 Anonymity System with Traceability
Secure
Computing
Property in Wireless Mesh Networks
2012
43 J1243
A Novel Data Embedding Method Using Image
Adaptive Pixel Pair Matching Processing
2012
Improving Various Reversible Data Hiding
44 J1244 Schemes Via Optimal Codes for Binary
Image
Processing
Covers
6. A SECURE INTRUSION DETECTION 2012
45 J1245 SYSTEM AGAINST DDOS Wireless
ATTACK IN WIRELESS MOBILE AD- Network
HOC NETWORK
2012
46 J1246
Optimizing Cloud Resources for Delivering
Networking
IPTV Services through Virtualization
2012
FESCIM: Fair, Efficient, and Secure
47 J1247 Cooperation Incentive Mechanism
Mobile
Computing
for Multihop Cellular Networks
2012
48 J1248
Energy-Efficient Strategies for Cooperative Mobile
Multichannel MAC Protocols Computing
2012
A Trigger Identification Service for
49 J1249 Defending
Mobile
Computing
Reactive Jammers in WSN
2012
FireCol: A Collaborative Protection
50 J1250 Network for the Detection of Flooding Networking
DDoS Attacks
2012
51 J1251
Fast Matrix Embedding by Matrix Network Security
Extending
A Network Coding Equivalent Content Parallel And 2012
52 J1252 Distributed
Distribution Scheme for Efficient Peer-to-
Peer Interactive VoD Streaming Systems
Parallel And 2012
53 J1253
Distributed Packet Buffers for High- Distributed
Bandwidth Switches and Routers Systems
Efficient Fuzzy Type-Ahead Search in Knowledge And 2012
54 J1254 XML Data Data
Engineering
Footprint: Detecting Sybil Attacks in Parallel And 2012
55 J1255 Urban Vehicular Networks Distributed
Systems
7. Handwritten Chinese Text Recognition by Pattern 2012
56 Integrating Multiple Contexts Analysis And
J1256 Machine
Intelligence
On Optimizing Overlay Topologies for Parallel And 2012
57 J1257 Search in Unstructured Peer-to-Peer Distributed
Networks Systems
Holistic Top-k Simple Shortest Path Join Knowledge & 2012
58 J1258 in Graphs Data
Engineering
Confucius: A Tool Supporting Service 2012
59 J1259 Collaborative Scientific Workflow Computing
Composition (Web Service)
8. PROJECT
S.No Project Title Domain Year
CODE
AMPLE: An Adaptive Traffic 2012
Engineering
1 D1201 Net Working
System Based on
Virtual Routing Topologies
2012
Compressed-Sensing-Enabled Video
2 D1202 Streaming for Net Working
Wireless Multimedia Sensor Networks.
2012
Design and Implementation of TARF: A
3 D1203 Net Working
Trust-Aware Routing Framework for WSNs
2012
Mobile
Network Assisted Mobile Computing with
4 D1204 Computing
Optimal Uplink Query Processing
(Net Working)
Optimal Power Allocation in Multi-Relay 2012
MIMO
5 D1205 Net Working
Cooperative Networks: Theory and
Algorithms
2012
Robust Face-Name Graph Matching
Digital Image
6 D1206 for Movie
Processing
Character Identification
Scalable and Secure Sharing of 2012
Personal Health
7 D1207 Data Mining
Records in Cloud Computing using
Attribute-based Encryption
Securing Node Capture Attacks for 2012
8 D1208 Hierarchical Data Aggregation in Wireless Data Mining
Sensor Networks
SPOC: A Secure and Privacy-preserving Mobile 2012
9 D1209 Opportunistic Computing Framework for Computing
Mobile-Healthcare Emergency (Net Working)
2012
Topology control in mobile ad hoc networks
10 D1210 Net Working
with cooperative communications
9. The world in a nutshell concise range Cloud 2012
11 D1211 queries. Heuristics Based Query Processing computing
for Large RDF Graphs Using Cloud
Computing. 2012
Automatic Reconfiguration for Large-Scale
12 D1212 Networking
Reliable Storage Systems
2012
A Novel Anti phishing framework based on Image Processing
13 D1213
visual cryptography
2012
Semi supervised Biased Maximum Margin Image
14 D1214
Analysis for Interactive Image Retrieval Processing
2012
Revisiting Defenses against Large-Scale Secure
15 D1215
Online Password Guessing Attacks Computing
2012
Cloud
Efficient Audit Service Outsourcing for
16 D1216 computing
Data Integrity in Clouds.
2012
Toward Reliable Data Delivery for Highly Mobile
17 D1217
Dynamic Mobile AdHoc Networks Computing
2012
A New Cell Counting Based Attack Against
18 D1218 Networking
Tor.
BECAN: A Bandwidth-Efficient 2012
Networking
Cooperative Authentication Scheme for
19 D1219
Filtering Injected False Data in Wireless
Sensor Networks.
2012
Towards Secure and Dependable Storage Cloud
20 D1220
Services in Cloud Computing. Computing
2012
A Secure Erasure Code-Based Cloud
Cloud Computing
21 D1221 Storage System with Secure Data
Forwarding
10. 2012
Cloud Computing Security From Single to Multi- Cloud Computing
22 D1222
Clouds (IEEE Conference)
2012
Enhanced Data Security Model for Cloud Computing Cloud Computing
23 D1223 (IEEE Conference)
2012
Ensuring Distributed Accountability for Data Cloud Computing
24 D1224
Sharing in the Cloud.
HASBE: A Hierarchical Attribute-Based Solution for 2012
Flexible and Scalable Access Control in Cloud Cloud Computing
25 D1225
Computing
2012
Cloud Computing
26 D1226 Outsourced Similarity Search on Metric Data Assets
2012
Cloud Computing
27 Privacy-Preserving Public Auditing for Secure Cloud
D1227
Storage
2012
28 Knowledge and
D1228 A Query Formulation Language for the data web
Data Engineering
2012
29 Creating Evolving User Behavior Profiles Knowledge and
D1229
Automatically Data Engineering
A D-Cache: Universal Distance Cache for Metric 2012
30 Access Methods Knowledge and
D1230 Data Engineering
-
2012
DDD: A New Ensemble Approach for Dealing with
31 Knowledge and
D1231 Concept Drift Data Engineering
2012
32 Efficient Computation of Range Aggregates against Knowledge and
D1232
Uncertain Location-Based Queries Data Engineering
11. 2012
33 Knowledge and
D1233 Efficient Fuzzy Type-Ahead Search in XML Data
Data Engineering
2012
34 Horizontal Aggregations in SQL to Prepare Data Knowledge and
D1234
Sets for Data Mining Analysis Data Engineering
2012
35 Improving Aggregate Recommendation Diversity Knowledge and
D1235
Using Ranking-Based Techniques Data Engineering
2012
36 Measuring the Sky: On Computing Data Cubes via Knowledge and
D1236
Skylining the Measures Data Engineering
2012
37 Knowledge and
D1237 Mining Web Graphs for Recommendations
Data Engineering
2012
38 Knowledge and
D1238 Organizing User Search Histories
Data Engineering
2012
39 Publishing Search Logs—A Comparative Study of Knowledge and
D1239
Privacy Guarantees Data Engineering
2012
40 Query Planning for Continuous Aggregation Queries Knowledge and
D1240
over a Network of Data Aggregators Data Engineering
2012
41 ROAD: A New Spatial Object Search Framework for Knowledge and
D1241
Road Networks Data Engineering
2012
42 Knowledge and
D1242 Scalable Learning of Collective Behavior
Data Engineering
2012
43 Slicing: A New Approach for Privacy Preserving Knowledge and
D1243
Data Publishing Data Engineering
2012
44 Tree-Based Mining for Discovering Patterns of Knowledge and
D1244
Human Interaction in Meetings Data Engineering
2012
45 Bounding the Impact of Unbounded Attacks in Parallel and
D1245
Stabilization Distributed Systems
2012
46 Catching Packet Droppers and Modifiers in Wireless Parallel and
D1246
Sensor Networks Distributed Systems
12. 2012
47 The Three-Tier Security Scheme in Wireless Sensor Parallel and
D1247
Networks with Mobile Sinks Distributed Systems
48 2012
D1248 ` A New Cell-Counting-Based Attack Against Tor Net Working
49 2012
D1249 Optimal Source-Based Filtering of Malicious Traffic Net Working
A Secure Intrusion detection system against DDOS 2012
50 Secure Computing
D1250
attack in Wireless Mobile Ad-hoc Network (IJCA)
51 ES-MPICH2: A Message Passing Interface with 2012
D1251 Secure Computing
Enhanced Security
On the Security and Efficiency of Content 2012
52 D1252 Secure Computing
Distribution via Network Coding
2012
53 A Novel Data Embedding Method Using Adaptive
D1253 Image Processing
Pixel Pair Matching
2012
54 A Probabilistic Model of Visual Cryptography
D1254 Image Processing
Scheme With Dynamic Group
2012
55 D1255 Active Visual Segmentation Image Processing
2012
56 Image Segmentation Based on the Poincaré Map
D1256 Image Processing
Method
2012
K-N SECRET SHARING VISUAL Image Processing
57 D1257 CRYPTOGRAPHY SCHEME FOR COLOR
IMAGE USING RANDOM NUMBER (IJEST)
Image Processing 2012
58 Multiple Exposure Fusion for High Dynamic Range
D1258
Image Acquisition
Image Processing 2012
59 D1259 Smile Detection by Boosting Pixel Differences
2012
Image Processing
60 View-invariant action recognition based on Artificial
D1260
Neural Networks
13. 2012
61 D1261 Cooperative Download in Vehicular Environments Mobile Computing
2012
62 Distributed Throughput Maximization in Wireless
D1262 Mobile Computing
Networks Via Random Power Allocation
2012
63 Protecting Location Privacy in Sensor Networks
D1263 Mobile Computing
against a Global Eavesdropper
2012
64 Efficient Multi-dimensional Fuzzy Search for Knowledge and
D1264
Personal Information Management Systems Data Engineering
An Online Learning Approach to IMAGE
65 PROCESSING
D1265 Occlusion Boundary Detection 2012
Automatic Image Equalization and Contrast IMAGE 2012
66 PROCESSING
D1266 Enhancement Using Gaussian Mixture Modeling
Automatic Reconfiguration for DEPENDABLE 2012
67 AND SECURE
D1267 Large-Scale Reliable Storage Systems
COMPUTING
Cashing in on the Cache in the Cloud CLOUD 2012
68 COMPUTING
D1268
Efficient audit service outsourcing for data CLOUD 2012
69 integrity in clouds COMPUTING
D1269
Enabling Secure and Efficient Ranked Keyword CLOUD 2012
70 COMPUTING
D1270 Search over Outsourced Cloud Data
14. Expert Discovery and Interactions CLOUD 2012
71 COMPUTING
D1271 in Mixed Service-Oriented Systems
Publishing Search Logs—A Comparative KNOWLEDGE 2012
72 AND DATA
D1272 Study of Privacy Guarantees
ENGINEERING
Revisiting Defenses against Large-Scale DEPENDABLE 2012
73 AND SECURE
D1273 Online Password Guessing Attacks
COMPUTING
Image 2012
74 Nonlinear Approach for Enhancement of Image Processing
D1274
Focus Volume in Shape From Focus
Parallel & 2012
75 BloomCast: Efficient and Effective Full-Text Distributed
D1275
Retrieval in Unstructured P2P Networks Systems
An Extensible Framework for Improving a 2012
76 Distributed Software System's Deployment Software
D1276
Architecture Engineering
Semantic-Aware Metadata Organization Parallel & 2012
77 Paradigm in Next-Generation File Systems Distributed
D1277
Systems
Improving End-to-End Routing Performance of Parallel & 2012
78 Greedy Forwarding in Sensor Networks Distributed
D1278
Systems
Model Checking Semantically Annotated Software 2012
79 Services Engineering
D1279
15. S.No Project
Project Title Domain Year
Code
1 J1101 Effective Navigation of Query Results Data Mining 2011
Based on Concept Hierarchies
2 J1102 Ranking Spatial Data by Quality Data Mining 2011
Preferences
Discovering Conditional Functional
3 J1103 Dependencies Data Mining 2011
Extended XML Tree Pattern Matching: Data Mining
4 J1104 Theories and Algorithms Cloud 2011
Computing
Data Mining
5 J1105 The CoQUOS Approach to Continuous 2011
On grid
Queries in Unstructured Overlays
computing
Modeling and Detection of Camouflaging Network
6 J1106 2011
Worm Security
SAT: A Security Architecture Achieving Network
7 J1107 Anonymity and Traceability in Wireless 2011
Security
Mesh Networks
Delay Analysis and Optimality of
8 J1108 Scheduling Policies for Multi-Hop Networking 2011
Wireless Networks
9 J1109 Nymble: Blocking Misbehaving Users in Networking 2011
Anonymizing Networks
10 J1110 Buffer Sizing for 802.11 Based Networks Networking 2011
16. A Privacy-Preserving Location Mobile
11 J1111 Monitoring System for Wireless Sensor 2011
Computing
Networks
Secure and Practical Outsourcing of Cloud
12 J1112 Linear Programming in Cloud 2011
Computing
Computing
A New Approach For Fec Decoding
13 Network
JIE1101 Based On The Bp Algorithm In Lte And
Security 2011
Wimax Systems
14 Clustering With Multi-Viewpoint Based Data
JIE1104 2011
Similarity Measure Engineering
15 Data
JIE1105 Decision Trees For Uncertain Data 2011
Engineering
16 Sketch4match – Content-Based Image Image
JIE1115 2011
Retrieval System Using Sketches Processing
17 A Competitive Study Of Cryptography Secure
JIE1117 2011
Techniques Over Block Cipher Computing
18 Ritas: Services For Randomized Intrusion Secure
JIE1118 2011
Tolerance Computing
Wireless
19 Utility-Optimal Multi-Pattern Reuse
JIE1119 Communicatio 2011
Inmulti-Cell Networks
n
20 Selfish Overlay Network Creation And
JIE1120 Networking 2011
Maintenance
21 Cloud Computing For Agent-Based Intelligent
JIE1121 2011
Urban Transportation Systems Systems
Supporting Efficient And Scalable
22 Mobile
JIE1122 Multicasting Over Mobile Ad Hoc 2011
Computing
Networks
17. 23 Throughput Optimization in Mobile Mobile
JIE1123 2011
Backbone Networks. Computing
Network &
24 Locating Equivalent Servants Over P2p
JIE1124 Service 2011
Networks
Management
25 Improving Utilization Of Infrastructure Cloud
JIE1125 2011
Clouds Computing
26 Dynamics of Malware Spread in Secure
JIE1126 2011
Decentralized Peer-to-Peer Networks Computing
27 Wireless Sensor Network Security Model Mobile
JIE1127 2011
Using Zero Knowledge Protocol Computing
Going Back And Forth: Efficient
28 Cloud
JIE1128 Multideployment And Multisnapshotting 2011
Computing
On Clouds
29 Progme: Towards Programmable
JIE1129 Networking 2011
Network Measurement
30 Live Streaming With Receiver-Based Peer- Networking
JIE1130 2011
Division Multiplexing
18. S.No PROJECT
Project Title Domain Year
CODE
Efficient computation of range aggregates
1 D1101 Data Mining
against uncertain location based queries 2011
Exploring application-level semantics for
2 D1102 Data Mining 2011
data compression.
Improving aggregate recommendation
3 D1103 Data Mining 2011
diversity using ranking-based techniques
One size does not fit all towards user- and
4 D1104 query-dependent ranking for web Data Mining 2011
databases.
5 D1105 Optimal service pricing for a cloud cache Data Mining 2011
A personalized ontology model for web
6 D1106 information gathering Data Mining 2011
Publishing search logs – a comparative
7 D1107 study of privacy guarantees Data Mining 2011
8 D1108 Scalable learning of collective behavior. Data Mining 2011
The awareness network, to whom should i
9 D1109 display my actions? And, whose actions Data Mining 2011
should i monitor?
Monitoring service systems from a
10 D1110 Data Mining 2011
language-action perspective
19. The world in a nutshell concise range
11 D1111 Data Mining 2011
queries.
A query formulation language for the data
12 D1112 Data Mining 2011
web
Horizontal aggregations in sql to prepare 2011
13 D1113 Data Mining
data sets for data mining analysis
Exploiting dynamic resource allocation
14 D1114 for efficient parallel data processing in the Data Mining 2011
cloud
Adaptive provisioning of human expertise
15 D1115 in service-oriented systems Data Mining 2011
Bridging socially-enhanced virtual
16 D1116 communities Data Mining 2011
Continuous neighbor discovery in
7 D1117 asynchronous Sensor networks Data Mining 2011
Jamming-aware traffic allocation for
18 D1118 multiple-path routing using portfolio Data Mining 2011
selection
Knowledge &
19 D1119 Data integrity proofs in cloud storage Data 2011
Engineering
The geometric efficient matching Network
20 D1120 2011
algorithm for firewalls Security
Adaptive fault tolerant qos control
algorithms for maximizing system lifetime Network
21 D1121 2011
of query-based wireless sensor networks Security