ieee CSE & IT M.tech\BTECH project list
-
Upload
bharath-chandra-nagalla -
Category
Documents
-
view
4.426 -
download
1
description
Transcript of ieee CSE & IT M.tech\BTECH project list
Academic Projects for
EEE (2012-2013)
We will develop your ideas and your papers also,
For any Further information call-9603150547
e-mail [email protected]
S.No Project
Code
Project Title Domain Year
1 J1201 Bootstrapping Ontologies for Web Services
Service
Computing
(Web service) 2012
2 J1202 Cooperative Provable Data Possession for
Integrity Verification in Multi-Cloud
Storage
Data Mining
2012
3 J1203 Packet-Hiding Methods for Preventing
Selective Jamming Attacks
Net Working
2012
4 J1204 Learn to Personalized Image Search from
the Photo Sharing Websites
Data Mining
2012
5 J1205 Risk-Aware Mitigation for MANET
Routing Attacks
Net Working
2012
6 J1206 Slicing: A New Approach to Privacy
Preserving Data Publishing
Data Mining
2012
7 J1207 *MULTIPARTY ACCESS CONTROL FOR
ONLINE SOCIAL NETWORKS: MODEL
AND MECHANISMS
Net Working
2012
8 J1208 Cloud Data Protection for the Masses Cloud
Computing
2012
9 J1209 Cut Detection in Wireless Sensor Networks Networking
2012
10 J1210 Game-Theoretic Pricing for Video
Streaming in
Mobile Networks
Networking
2012
11 J1211 Organizing User Search Histories Data Mining 2012
12 J1212 Ranking Model Adaptation for Domain-
Specific Search Data Mining
2012
13 J1213
Online Modeling of Proactive Moderation
System for Auction Fraud Detection Data Mining
2012
14 J1214
Automatic Discovery of Association Orders
between Name and Aliases from the Web
using Anchor Texts-based Co-occurrences
Data Mining
2012
15 J1215 An Efficient Caching Scheme and
Consistency Maintenance in Hybrid P2P
System
Data
Engineering
2012
16 J1216 In Tags We Trust: Trust modeling in social
tagging of multimedia content Data Mining
2012
17 J1217
Protecting Location Privacy in Sensor
Networks against a Global Eavesdropper
Mobile
Computing
2012
18 J1218
Packet Loss Control Using Tokens at the
Network Edge Networking
2012
19 J1219
Ensuring Distributed Accountability for
Data Sharing in the Cloud
Cloud
Computing
2012
20 J1220
Fast Data Collection in Tree-Based
Wireless Sensor Networks Net Working
2012
21 J1221 A Secure Erasure Code-Based Cloud
Storage System with Secure Data
Forwarding
Cloud
Computing
2012
22 J1222
Cloud Computing Security: From Single to
Multi-Clouds
Cloud
Computing
2012
23 J1223 HASBE: A Hierarchical Attribute-Based
Solution for Flexible and Scalable Access
Control in Cloud Computing
Cloud
Computing
2012
24 J1224
Outsourced Similarity Search on Metric
Data Assets
Cloud
Computing
2012
25 J1225
Scalable and Secure Sharing of Personal
Health Records in Cloud Computing using
Attribute-based Encryption
Cloud
Computing
2012
26 J1226
Toward Secure and Dependable Storage
Services in Cloud Computing
Cloud
Computing
2012
27 J1227
Clustering with Multi-viewpoint-Based
Similarity Measure
Knowledge and
Data
Engineering
2012
28 J1228 Scalable Coding of Encrypted Images
Image
Processing
2012
29 J1229 BloomCast: Efficient and Effective Full-
Text Retrieval in Unstructured P2P
Networks
Parallel and
Distributed
systems
2012
30 J1230 Payments for Outsourced Computations
Parallel and
Distributed
systems
2012
31 J1231
Adaptive Opportunistic Routing for
Wireless Ad Hoc Networks Networking
2012
32 J1232
Design, Implementation, and Performance
of a Load Balancer for SIP Server Clusters Networking
2012
33 J1233 Independent Directed Acyclic Graphs for
Resilient Multipath Routing Networking
2012
34 J1234
MeasuRouting: A Framework for Routing
Assisted Traffic Monitoring Networking
2012
35 J1235
Privacy- and Integrity-Preserving Range
Queries in Sensor Networks Networking
2012
36 J1236
RIHT: A Novel Hybrid IP Traceback
Scheme Networking
2012
37 J1237
Router Support for Fine-Grained Latency
Measurements Networking
2012
38 J1238 A Stochastic Model of Multi-virus
Dynamics
Secure
Computing
2012
39 J1239 Design and Implementation of TARF: A
Trust-Aware Routing Framework for WSNs
Secure
Computing
2012
40 J1240
Detecting and Resolving Firewall Policy
Anomalies
Secure
Computing
2012
41 J1241
Detecting Spam Zombies by Monitoring
Outgoing Messages
Secure
Computing
2012
42 J1242
On the Security of a Ticket-Based
Anonymity System with Traceability
Property in Wireless Mesh Networks
Secure
Computing
2012
43 J1243
A Novel Data Embedding Method Using
Adaptive Pixel Pair Matching
Image
Processing
2012
44 J1244 Improving Various Reversible Data Hiding
Schemes Via Optimal Codes for Binary
Covers
Image
Processing
2012
45 J1245
A SECURE INTRUSION DETECTION
SYSTEM AGAINST DDOS
ATTACK IN WIRELESS MOBILE AD-
HOC NETWORK
Wireless
Network
2012
46 J1246 Optimizing Cloud Resources for Delivering
IPTV Services through Virtualization Networking
2012
47 J1247
FESCIM: Fair, Efficient, and Secure
Cooperation Incentive Mechanism
for Multihop Cellular Networks
Mobile
Computing
2012
48 J1248
Energy-Efficient Strategies for Cooperative
Multichannel MAC Protocols
Mobile
Computing
2012
49 J1249
A Trigger Identification Service for
Defending
Reactive Jammers in WSN
Mobile
Computing
2012
50 J1250
FireCol: A Collaborative Protection
Network for the Detection of Flooding
DDoS Attacks
Networking
2012
51 J1251
Fast Matrix Embedding by Matrix
Extending
Network Security 2012
52 J1252 A Network Coding Equivalent Content
Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
Parallel And Distributed
Systems
2012
53 J1253
Distributed Packet Buffers for High-Bandwidth Switches and Routers
Parallel And Distributed
Systems
2012
54 J1254
Efficient Fuzzy Type-Ahead Search in
XML Data
Knowledge And Data
Engineering
2012
55 J1255
Footprint: Detecting Sybil Attacks in
Urban Vehicular Networks
Parallel And Distributed
Systems
2012
56 J1256
Handwritten Chinese Text Recognition by
Integrating Multiple Contexts
Pattern Analysis And
Machine Intelligence
2012
57 J1257
On Optimizing Overlay Topologies for
Search in Unstructured Peer-to-Peer
Networks
Parallel And Distributed
Systems
2012
58 J1258
Holistic Top-k Simple Shortest Path Join in Graphs
Knowledge & Data
Engineering
2012
59 J1259
Confucius: A Tool Supporting Collaborative Scientific Workflow
Composition
Service Computing
(Web Service)
2012
S.No PROJECT
CODE
Project Title Domain Year
1 D1201
AMPLE: An Adaptive Traffic
Engineering
System Based on
Virtual Routing Topologies
Net Working
2012
2 D1202
Compressed-Sensing-Enabled Video
Streaming for
Wireless Multimedia Sensor Networks.
Net Working
2012
3 D1203 Design and Implementation of TARF: A
Trust-Aware Routing Framework for WSNs Net Working
2012
4 D1204 Network Assisted Mobile Computing with
Optimal Uplink Query Processing
Mobile
Computing
(Net Working)
2012
5 D1205
Optimal Power Allocation in Multi-Relay
MIMO
Cooperative Networks: Theory and
Algorithms
Net Working
2012
6 D1206
Robust Face-Name Graph Matching
for Movie
Character Identification
Digital Image
Processing
2012
7 D1207
Scalable and Secure Sharing of
Personal Health
Records in Cloud Computing using
Attribute-based Encryption
Data Mining
2012
8 D1208
Securing Node Capture Attacks for
Hierarchical Data Aggregation in Wireless
Sensor Networks
Data Mining
2012
9 D1209
SPOC: A Secure and Privacy-preserving
Opportunistic Computing Framework for
Mobile-Healthcare Emergency
Mobile
Computing
(Net Working)
2012
10 D1210 Topology control in mobile ad hoc networks
with cooperative communications Net Working
2012
11 D1211
The world in a nutshell concise range
queries. Heuristics Based Query Processing
for Large RDF Graphs Using Cloud
Computing.
Cloud
computing
2012
12 D1212 Automatic Reconfiguration for Large-Scale
Reliable Storage Systems Networking
2012
13 D1213 A Novel Anti phishing framework based on
visual cryptography
Image Processing
2012
14 D1214 Semi supervised Biased Maximum Margin
Analysis for Interactive Image Retrieval
Image
Processing
2012
15 D1215 Revisiting Defenses against Large-Scale
Online Password Guessing Attacks Secure
Computing
2012
16 D1216 Efficient Audit Service Outsourcing for
Data Integrity in Clouds.
Cloud
computing
2012
17 D1217 Toward Reliable Data Delivery for Highly
Dynamic Mobile AdHoc Networks Mobile
Computing
2012
18 D1218 A New Cell Counting Based Attack Against
Tor. Networking
2012
19 D1219
BECAN: A Bandwidth-Efficient
Cooperative Authentication Scheme for
Filtering Injected False Data in Wireless
Sensor Networks.
Networking
2012
20 D1220 Towards Secure and Dependable Storage
Services in Cloud Computing.
Cloud
Computing
2012
21 D1221
A Secure Erasure Code-Based Cloud
Storage System with Secure Data
Forwarding
Cloud Computing
2012
22 D1222 Cloud Computing Security From Single to Multi-
Clouds Cloud Computing
(IEEE Conference)
2012
23 D1223
Enhanced Data Security Model for Cloud Computing Cloud Computing
(IEEE Conference)
2012
24 D1224
Ensuring Distributed Accountability for Data
Sharing in the Cloud.
Cloud Computing
2012
25 D1225
HASBE: A Hierarchical Attribute-Based Solution for
Flexible and Scalable Access Control in Cloud
Computing
Cloud Computing
2012
26 D1226 Outsourced Similarity Search on Metric Data Assets
Cloud Computing
2012
27 D1227
Privacy-Preserving Public Auditing for Secure Cloud
Storage
Cloud Computing
2012
28 D1228 A Query Formulation Language for the data web
Knowledge and
Data Engineering
2012
29 D1229
Creating Evolving User Behavior Profiles
Automatically Knowledge and
Data Engineering
2012
30 D1230
A D-Cache: Universal Distance Cache for Metric
Access Methods
-
Knowledge and
Data Engineering
2012
31 D1231
DDD: A New Ensemble Approach for Dealing with
Concept Drift
Knowledge and
Data Engineering
2012
32 D1232
Efficient Computation of Range Aggregates against
Uncertain Location-Based Queries Knowledge and
Data Engineering
2012
33 D1233 Efficient Fuzzy Type-Ahead Search in XML Data
Knowledge and
Data Engineering
2012
34 D1234
Horizontal Aggregations in SQL to Prepare Data
Sets for Data Mining Analysis Knowledge and
Data Engineering
2012
35 D1235
Improving Aggregate Recommendation Diversity
Using Ranking-Based Techniques Knowledge and
Data Engineering
2012
36 D1236
Measuring the Sky: On Computing Data Cubes via
Skylining the Measures Knowledge and
Data Engineering
2012
37 D1237 Mining Web Graphs for Recommendations
Knowledge and
Data Engineering
2012
38 D1238 Organizing User Search Histories
Knowledge and
Data Engineering
2012
39 D1239
Publishing Search Logs—A Comparative Study of
Privacy Guarantees Knowledge and
Data Engineering
2012
40 D1240
Query Planning for Continuous Aggregation Queries
over a Network of Data Aggregators Knowledge and
Data Engineering
2012
41 D1241
ROAD: A New Spatial Object Search Framework for
Road Networks Knowledge and
Data Engineering
2012
42 D1242 Scalable Learning of Collective Behavior
Knowledge and
Data Engineering
2012
43 D1243
Slicing: A New Approach for Privacy Preserving
Data Publishing Knowledge and
Data Engineering
2012
44 D1244
Tree-Based Mining for Discovering Patterns of
Human Interaction in Meetings Knowledge and
Data Engineering
2012
45 D1245
Bounding the Impact of Unbounded Attacks in
Stabilization Parallel and
Distributed Systems
2012
46 D1246
Catching Packet Droppers and Modifiers in Wireless
Sensor Networks Parallel and
Distributed Systems
2012
47 D1247
The Three-Tier Security Scheme in Wireless Sensor
Networks with Mobile Sinks Parallel and
Distributed Systems
2012
48 D1248 ` A New Cell-Counting-Based Attack Against Tor Net Working
2012
49 D1249 Optimal Source-Based Filtering of Malicious Traffic Net Working
2012
50 D1250
A Secure Intrusion detection system against DDOS
attack in Wireless Mobile Ad-hoc Network Secure Computing
(IJCA)
2012
51 D1251
ES-MPICH2: A Message Passing Interface with
Enhanced Security Secure Computing
2012
52 D1252
On the Security and Efficiency of Content
Distribution via Network Coding Secure Computing
2012
53 D1253
A Novel Data Embedding Method Using Adaptive
Pixel Pair Matching Image Processing
2012
54 D1254
A Probabilistic Model of Visual Cryptography
Scheme With Dynamic Group Image Processing
2012
55 D1255 Active Visual Segmentation Image Processing
2012
56 D1256
Image Segmentation Based on the Poincaré Map
Method Image Processing
2012
57 D1257
K-N SECRET SHARING VISUAL
CRYPTOGRAPHY SCHEME FOR COLOR
IMAGE USING RANDOM NUMBER
Image Processing
(IJEST)
2012
58 D1258
Multiple Exposure Fusion for High Dynamic Range
Image Acquisition
Image Processing
2012
59 D1259 Smile Detection by Boosting Pixel Differences
Image Processing
2012
60 D1260
View-invariant action recognition based on Artificial
Neural Networks
Image Processing
2012
61 D1261 Cooperative Download in Vehicular Environments Mobile Computing
2012
62 D1262
Distributed Throughput Maximization in Wireless
Networks Via Random Power Allocation Mobile Computing
2012
63 D1263
Protecting Location Privacy in Sensor Networks
against a Global Eavesdropper Mobile Computing
2012
64 D1264
Efficient Multi-dimensional Fuzzy Search for
Personal Information Management Systems Knowledge and
Data Engineering
2012
65 D1265
An Online Learning Approach to
Occlusion Boundary Detection
IMAGE
PROCESSING 2012
66 D1266
Automatic Image Equalization and Contrast
Enhancement Using Gaussian Mixture Modeling
IMAGE
PROCESSING
2012
67 D1267
Automatic Reconfiguration for
Large-Scale Reliable Storage Systems
DEPENDABLE
AND SECURE
COMPUTING
2012
68 D1268
Cashing in on the Cache in the Cloud CLOUD
COMPUTING
2012
69 D1269
Efficient audit service outsourcing for data
integrity in clouds
CLOUD
COMPUTING
2012
70 D1270
Enabling Secure and Efficient Ranked Keyword
Search over Outsourced Cloud Data
CLOUD
COMPUTING
2012
71 D1271
Expert Discovery and Interactions
in Mixed Service-Oriented Systems
CLOUD
COMPUTING
2012
72 D1272
Publishing Search Logs—A Comparative
Study of Privacy Guarantees
KNOWLEDGE
AND DATA
ENGINEERING
2012
73 D1273
Revisiting Defenses against Large-Scale
Online Password Guessing Attacks
DEPENDABLE
AND SECURE
COMPUTING
2012
74 D1274
Nonlinear Approach for Enhancement of Image
Focus Volume in Shape From Focus
Image Processing
2012
75 D1275
BloomCast: Efficient and Effective Full-Text
Retrieval in Unstructured P2P Networks
Parallel & Distributed
Systems
2012
76 D1276
An Extensible Framework for Improving a Distributed Software System's Deployment
Architecture
Software
Engineering
2012
77 D1277
Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems
Parallel & Distributed
Systems
2012
78 D1278
Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks
Parallel & Distributed
Systems
2012
79 D1279
Model Checking Semantically Annotated Services
Software Engineering
2012
S.No Project
Code Project Title Domain Year
1 J1101 Effective Navigation of Query Results
Based on Concept Hierarchies Data Mining 2011
2 J1102 Ranking Spatial Data by Quality
Preferences Data Mining 2011
3 J1103 Discovering Conditional Functional
Dependencies
Data Mining 2011
4 J1104 Extended XML Tree Pattern Matching:
Theories and Algorithms
Data Mining
Cloud
Computing
2011
5 J1105 The CoQUOS Approach to Continuous Queries in Unstructured Overlays
Data Mining On grid
computing
2011
6 J1106 Modeling and Detection of Camouflaging
Worm
Network
Security 2011
7 J1107 SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless
Mesh Networks
Network
Security 2011
8 J1108 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
Wireless Networks
Networking 2011
9 J1109 Nymble: Blocking Misbehaving Users in
Anonymizing Networks Networking 2011
10 J1110 Buffer Sizing for 802.11 Based Networks Networking 2011
11 J1111 A Privacy-Preserving Location
Monitoring System for Wireless Sensor Networks
Mobile
Computing 2011
12 J1112 Secure and Practical Outsourcing of
Linear Programming in Cloud Computing
Cloud
Computing 2011
13 JIE1101
A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And
Wimax Systems
Network Security
2011
14 JIE1104
Clustering With Multi-Viewpoint Based Similarity Measure
Data Engineering
2011
15 JIE1105 Decision Trees For Uncertain Data
Data Engineering
2011
16 JIE1115 Sketch4match – Content-Based Image
Retrieval System Using Sketches Image
Processing 2011
17 JIE1117 A Competitive Study Of Cryptography
Techniques Over Block Cipher Secure
Computing 2011
18 JIE1118
Ritas: Services For Randomized Intrusion Tolerance
Secure Computing
2011
19 JIE1119
Utility-Optimal Multi-Pattern Reuse Inmulti-Cell Networks
Wireless Communicatio
n 2011
20 JIE1120
Selfish Overlay Network Creation And Maintenance
Networking 2011
21 JIE1121
Cloud Computing For Agent-Based Urban Transportation Systems
Intelligent Systems
2011
22 JIE1122 Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc
Networks
Mobile Computing
2011
23 JIE1123
Throughput Optimization in Mobile Backbone Networks.
Mobile Computing
2011
24 JIE1124 Locating Equivalent Servants Over P2p
Networks
Network & Service
Management 2011
25 JIE1125
Improving Utilization Of Infrastructure Clouds
Cloud Computing
2011
26 JIE1126
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
Secure Computing
2011
27 JIE1127
Wireless Sensor Network Security Model Using Zero Knowledge Protocol
Mobile Computing
2011
28 JIE1128
Going Back And Forth: Efficient Multideployment And Multisnapshotting
On Clouds
Cloud Computing
2011
29 JIE1129
Progme: Towards Programmable Network Measurement
Networking 2011
30 JIE1130 Live Streaming With Receiver-Based Peer-
Division Multiplexing Networking
2011
S.No PROJECT
CODE
Project Title Domain Year
1 D1101 Efficient computation of range aggregates against uncertain location based queries
Data Mining
2011
2 D1102 Exploring application-level semantics for
data compression. Data Mining 2011
3 D1103 Improving aggregate recommendation
diversity using ranking-based techniques Data Mining 2011
4 D1104 One size does not fit all towards user- and
query-dependent ranking for web databases.
Data Mining 2011
5 D1105 Optimal service pricing for a cloud cache Data Mining 2011
6 D1106 A personalized ontology model for web
information gathering
Data Mining 2011
7 D1107 Publishing search logs – a comparative
study of privacy guarantees
Data Mining 2011
8 D1108 Scalable learning of collective behavior. Data Mining 2011
9 D1109
The awareness network, to whom should i display my actions? And, whose actions
should i monitor?
Data Mining 2011
10 D1110 Monitoring service systems from a
language-action perspective Data Mining 2011
11 D1111 The world in a nutshell concise range
queries. Data Mining 2011
12 D1112 A query formulation language for the data
web Data Mining 2011
13 D1113 Horizontal aggregations in sql to prepare
data sets for data mining analysis Data Mining
2011
14 D1114
Exploiting dynamic resource allocation for efficient parallel data processing in the
cloud
Data Mining 2011
15 D1115 Adaptive provisioning of human expertise
in service-oriented systems
Data Mining 2011
16 D1116 Bridging socially-enhanced virtual
communities
Data Mining 2011
7 D1117 Continuous neighbor discovery in
asynchronous Sensor networks
Data Mining 2011
18 D1118
Jamming-aware traffic allocation for multiple-path routing using portfolio
selection
Data Mining 2011
19 D1119 Data integrity proofs in cloud storage Knowledge &
Data Engineering
2011
20 D1120 The geometric efficient matching
algorithm for firewalls Network Security
2011
21 D1121
Adaptive fault tolerant qos control algorithms for maximizing system lifetime of query-based wireless sensor networks
Network Security
2011