ieee cse & it m.tech\btech project list

19
Academic Projects for EEE (2012-2013) We will develop your ideas and your papers also, For any Further information call-9603150547 e-mail [email protected]

Upload: bharath-chandra-nagalla

Post on 06-May-2015

4.426 views

Category:

Documents


1 download

DESCRIPTION

CALL:9603150547

TRANSCRIPT

Page 1: ieee CSE & IT M.tech\BTECH project list

Academic Projects for

EEE (2012-2013)

We will develop your ideas and your papers also,

For any Further information call-9603150547

e-mail [email protected]

Page 2: ieee CSE & IT M.tech\BTECH project list

S.No Project

Code

Project Title Domain Year

1 J1201 Bootstrapping Ontologies for Web Services

Service

Computing

(Web service) 2012

2 J1202 Cooperative Provable Data Possession for

Integrity Verification in Multi-Cloud

Storage

Data Mining

2012

3 J1203 Packet-Hiding Methods for Preventing

Selective Jamming Attacks

Net Working

2012

4 J1204 Learn to Personalized Image Search from

the Photo Sharing Websites

Data Mining

2012

5 J1205 Risk-Aware Mitigation for MANET

Routing Attacks

Net Working

2012

6 J1206 Slicing: A New Approach to Privacy

Preserving Data Publishing

Data Mining

2012

7 J1207 *MULTIPARTY ACCESS CONTROL FOR

ONLINE SOCIAL NETWORKS: MODEL

AND MECHANISMS

Net Working

2012

8 J1208 Cloud Data Protection for the Masses Cloud

Computing

2012

9 J1209 Cut Detection in Wireless Sensor Networks Networking

2012

Page 3: ieee CSE & IT M.tech\BTECH project list

10 J1210 Game-Theoretic Pricing for Video

Streaming in

Mobile Networks

Networking

2012

11 J1211 Organizing User Search Histories Data Mining 2012

12 J1212 Ranking Model Adaptation for Domain-

Specific Search Data Mining

2012

13 J1213

Online Modeling of Proactive Moderation

System for Auction Fraud Detection Data Mining

2012

14 J1214

Automatic Discovery of Association Orders

between Name and Aliases from the Web

using Anchor Texts-based Co-occurrences

Data Mining

2012

15 J1215 An Efficient Caching Scheme and

Consistency Maintenance in Hybrid P2P

System

Data

Engineering

2012

16 J1216 In Tags We Trust: Trust modeling in social

tagging of multimedia content Data Mining

2012

17 J1217

Protecting Location Privacy in Sensor

Networks against a Global Eavesdropper

Mobile

Computing

2012

18 J1218

Packet Loss Control Using Tokens at the

Network Edge Networking

2012

19 J1219

Ensuring Distributed Accountability for

Data Sharing in the Cloud

Cloud

Computing

2012

20 J1220

Fast Data Collection in Tree-Based

Wireless Sensor Networks Net Working

2012

21 J1221 A Secure Erasure Code-Based Cloud

Storage System with Secure Data

Forwarding

Cloud

Computing

2012

Page 4: ieee CSE & IT M.tech\BTECH project list

22 J1222

Cloud Computing Security: From Single to

Multi-Clouds

Cloud

Computing

2012

23 J1223 HASBE: A Hierarchical Attribute-Based

Solution for Flexible and Scalable Access

Control in Cloud Computing

Cloud

Computing

2012

24 J1224

Outsourced Similarity Search on Metric

Data Assets

Cloud

Computing

2012

25 J1225

Scalable and Secure Sharing of Personal

Health Records in Cloud Computing using

Attribute-based Encryption

Cloud

Computing

2012

26 J1226

Toward Secure and Dependable Storage

Services in Cloud Computing

Cloud

Computing

2012

27 J1227

Clustering with Multi-viewpoint-Based

Similarity Measure

Knowledge and

Data

Engineering

2012

28 J1228 Scalable Coding of Encrypted Images

Image

Processing

2012

29 J1229 BloomCast: Efficient and Effective Full-

Text Retrieval in Unstructured P2P

Networks

Parallel and

Distributed

systems

2012

30 J1230 Payments for Outsourced Computations

Parallel and

Distributed

systems

2012

31 J1231

Adaptive Opportunistic Routing for

Wireless Ad Hoc Networks Networking

2012

32 J1232

Design, Implementation, and Performance

of a Load Balancer for SIP Server Clusters Networking

2012

Page 5: ieee CSE & IT M.tech\BTECH project list

33 J1233 Independent Directed Acyclic Graphs for

Resilient Multipath Routing Networking

2012

34 J1234

MeasuRouting: A Framework for Routing

Assisted Traffic Monitoring Networking

2012

35 J1235

Privacy- and Integrity-Preserving Range

Queries in Sensor Networks Networking

2012

36 J1236

RIHT: A Novel Hybrid IP Traceback

Scheme Networking

2012

37 J1237

Router Support for Fine-Grained Latency

Measurements Networking

2012

38 J1238 A Stochastic Model of Multi-virus

Dynamics

Secure

Computing

2012

39 J1239 Design and Implementation of TARF: A

Trust-Aware Routing Framework for WSNs

Secure

Computing

2012

40 J1240

Detecting and Resolving Firewall Policy

Anomalies

Secure

Computing

2012

41 J1241

Detecting Spam Zombies by Monitoring

Outgoing Messages

Secure

Computing

2012

42 J1242

On the Security of a Ticket-Based

Anonymity System with Traceability

Property in Wireless Mesh Networks

Secure

Computing

2012

43 J1243

A Novel Data Embedding Method Using

Adaptive Pixel Pair Matching

Image

Processing

2012

44 J1244 Improving Various Reversible Data Hiding

Schemes Via Optimal Codes for Binary

Covers

Image

Processing

2012

Page 6: ieee CSE & IT M.tech\BTECH project list

45 J1245

A SECURE INTRUSION DETECTION

SYSTEM AGAINST DDOS

ATTACK IN WIRELESS MOBILE AD-

HOC NETWORK

Wireless

Network

2012

46 J1246 Optimizing Cloud Resources for Delivering

IPTV Services through Virtualization Networking

2012

47 J1247

FESCIM: Fair, Efficient, and Secure

Cooperation Incentive Mechanism

for Multihop Cellular Networks

Mobile

Computing

2012

48 J1248

Energy-Efficient Strategies for Cooperative

Multichannel MAC Protocols

Mobile

Computing

2012

49 J1249

A Trigger Identification Service for

Defending

Reactive Jammers in WSN

Mobile

Computing

2012

50 J1250

FireCol: A Collaborative Protection

Network for the Detection of Flooding

DDoS Attacks

Networking

2012

51 J1251

Fast Matrix Embedding by Matrix

Extending

Network Security 2012

52 J1252 A Network Coding Equivalent Content

Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming

Parallel And Distributed

Systems

2012

53 J1253

Distributed Packet Buffers for High-Bandwidth Switches and Routers

Parallel And Distributed

Systems

2012

54 J1254

Efficient Fuzzy Type-Ahead Search in

XML Data

Knowledge And Data

Engineering

2012

55 J1255

Footprint: Detecting Sybil Attacks in

Urban Vehicular Networks

Parallel And Distributed

Systems

2012

Page 7: ieee CSE & IT M.tech\BTECH project list

56 J1256

Handwritten Chinese Text Recognition by

Integrating Multiple Contexts

Pattern Analysis And

Machine Intelligence

2012

57 J1257

On Optimizing Overlay Topologies for

Search in Unstructured Peer-to-Peer

Networks

Parallel And Distributed

Systems

2012

58 J1258

Holistic Top-k Simple Shortest Path Join in Graphs

Knowledge & Data

Engineering

2012

59 J1259

Confucius: A Tool Supporting Collaborative Scientific Workflow

Composition

Service Computing

(Web Service)

2012

Page 8: ieee CSE & IT M.tech\BTECH project list

S.No PROJECT

CODE

Project Title Domain Year

1 D1201

AMPLE: An Adaptive Traffic

Engineering

System Based on

Virtual Routing Topologies

Net Working

2012

2 D1202

Compressed-Sensing-Enabled Video

Streaming for

Wireless Multimedia Sensor Networks.

Net Working

2012

3 D1203 Design and Implementation of TARF: A

Trust-Aware Routing Framework for WSNs Net Working

2012

4 D1204 Network Assisted Mobile Computing with

Optimal Uplink Query Processing

Mobile

Computing

(Net Working)

2012

5 D1205

Optimal Power Allocation in Multi-Relay

MIMO

Cooperative Networks: Theory and

Algorithms

Net Working

2012

6 D1206

Robust Face-Name Graph Matching

for Movie

Character Identification

Digital Image

Processing

2012

7 D1207

Scalable and Secure Sharing of

Personal Health

Records in Cloud Computing using

Attribute-based Encryption

Data Mining

2012

8 D1208

Securing Node Capture Attacks for

Hierarchical Data Aggregation in Wireless

Sensor Networks

Data Mining

2012

9 D1209

SPOC: A Secure and Privacy-preserving

Opportunistic Computing Framework for

Mobile-Healthcare Emergency

Mobile

Computing

(Net Working)

2012

10 D1210 Topology control in mobile ad hoc networks

with cooperative communications Net Working

2012

Page 9: ieee CSE & IT M.tech\BTECH project list

11 D1211

The world in a nutshell concise range

queries. Heuristics Based Query Processing

for Large RDF Graphs Using Cloud

Computing.

Cloud

computing

2012

12 D1212 Automatic Reconfiguration for Large-Scale

Reliable Storage Systems Networking

2012

13 D1213 A Novel Anti phishing framework based on

visual cryptography

Image Processing

2012

14 D1214 Semi supervised Biased Maximum Margin

Analysis for Interactive Image Retrieval

Image

Processing

2012

15 D1215 Revisiting Defenses against Large-Scale

Online Password Guessing Attacks Secure

Computing

2012

16 D1216 Efficient Audit Service Outsourcing for

Data Integrity in Clouds.

Cloud

computing

2012

17 D1217 Toward Reliable Data Delivery for Highly

Dynamic Mobile AdHoc Networks Mobile

Computing

2012

18 D1218 A New Cell Counting Based Attack Against

Tor. Networking

2012

19 D1219

BECAN: A Bandwidth-Efficient

Cooperative Authentication Scheme for

Filtering Injected False Data in Wireless

Sensor Networks.

Networking

2012

20 D1220 Towards Secure and Dependable Storage

Services in Cloud Computing.

Cloud

Computing

2012

21 D1221

A Secure Erasure Code-Based Cloud

Storage System with Secure Data

Forwarding

Cloud Computing

2012

Page 10: ieee CSE & IT M.tech\BTECH project list

22 D1222 Cloud Computing Security From Single to Multi-

Clouds Cloud Computing

(IEEE Conference)

2012

23 D1223

Enhanced Data Security Model for Cloud Computing Cloud Computing

(IEEE Conference)

2012

24 D1224

Ensuring Distributed Accountability for Data

Sharing in the Cloud.

Cloud Computing

2012

25 D1225

HASBE: A Hierarchical Attribute-Based Solution for

Flexible and Scalable Access Control in Cloud

Computing

Cloud Computing

2012

26 D1226 Outsourced Similarity Search on Metric Data Assets

Cloud Computing

2012

27 D1227

Privacy-Preserving Public Auditing for Secure Cloud

Storage

Cloud Computing

2012

28 D1228 A Query Formulation Language for the data web

Knowledge and

Data Engineering

2012

29 D1229

Creating Evolving User Behavior Profiles

Automatically Knowledge and

Data Engineering

2012

30 D1230

A D-Cache: Universal Distance Cache for Metric

Access Methods

-

Knowledge and

Data Engineering

2012

31 D1231

DDD: A New Ensemble Approach for Dealing with

Concept Drift

Knowledge and

Data Engineering

2012

32 D1232

Efficient Computation of Range Aggregates against

Uncertain Location-Based Queries Knowledge and

Data Engineering

2012

Page 11: ieee CSE & IT M.tech\BTECH project list

33 D1233 Efficient Fuzzy Type-Ahead Search in XML Data

Knowledge and

Data Engineering

2012

34 D1234

Horizontal Aggregations in SQL to Prepare Data

Sets for Data Mining Analysis Knowledge and

Data Engineering

2012

35 D1235

Improving Aggregate Recommendation Diversity

Using Ranking-Based Techniques Knowledge and

Data Engineering

2012

36 D1236

Measuring the Sky: On Computing Data Cubes via

Skylining the Measures Knowledge and

Data Engineering

2012

37 D1237 Mining Web Graphs for Recommendations

Knowledge and

Data Engineering

2012

38 D1238 Organizing User Search Histories

Knowledge and

Data Engineering

2012

39 D1239

Publishing Search Logs—A Comparative Study of

Privacy Guarantees Knowledge and

Data Engineering

2012

40 D1240

Query Planning for Continuous Aggregation Queries

over a Network of Data Aggregators Knowledge and

Data Engineering

2012

41 D1241

ROAD: A New Spatial Object Search Framework for

Road Networks Knowledge and

Data Engineering

2012

42 D1242 Scalable Learning of Collective Behavior

Knowledge and

Data Engineering

2012

43 D1243

Slicing: A New Approach for Privacy Preserving

Data Publishing Knowledge and

Data Engineering

2012

44 D1244

Tree-Based Mining for Discovering Patterns of

Human Interaction in Meetings Knowledge and

Data Engineering

2012

45 D1245

Bounding the Impact of Unbounded Attacks in

Stabilization Parallel and

Distributed Systems

2012

46 D1246

Catching Packet Droppers and Modifiers in Wireless

Sensor Networks Parallel and

Distributed Systems

2012

Page 12: ieee CSE & IT M.tech\BTECH project list

47 D1247

The Three-Tier Security Scheme in Wireless Sensor

Networks with Mobile Sinks Parallel and

Distributed Systems

2012

48 D1248 ` A New Cell-Counting-Based Attack Against Tor Net Working

2012

49 D1249 Optimal Source-Based Filtering of Malicious Traffic Net Working

2012

50 D1250

A Secure Intrusion detection system against DDOS

attack in Wireless Mobile Ad-hoc Network Secure Computing

(IJCA)

2012

51 D1251

ES-MPICH2: A Message Passing Interface with

Enhanced Security Secure Computing

2012

52 D1252

On the Security and Efficiency of Content

Distribution via Network Coding Secure Computing

2012

53 D1253

A Novel Data Embedding Method Using Adaptive

Pixel Pair Matching Image Processing

2012

54 D1254

A Probabilistic Model of Visual Cryptography

Scheme With Dynamic Group Image Processing

2012

55 D1255 Active Visual Segmentation Image Processing

2012

56 D1256

Image Segmentation Based on the Poincaré Map

Method Image Processing

2012

57 D1257

K-N SECRET SHARING VISUAL

CRYPTOGRAPHY SCHEME FOR COLOR

IMAGE USING RANDOM NUMBER

Image Processing

(IJEST)

2012

58 D1258

Multiple Exposure Fusion for High Dynamic Range

Image Acquisition

Image Processing

2012

59 D1259 Smile Detection by Boosting Pixel Differences

Image Processing

2012

60 D1260

View-invariant action recognition based on Artificial

Neural Networks

Image Processing

2012

Page 13: ieee CSE & IT M.tech\BTECH project list

61 D1261 Cooperative Download in Vehicular Environments Mobile Computing

2012

62 D1262

Distributed Throughput Maximization in Wireless

Networks Via Random Power Allocation Mobile Computing

2012

63 D1263

Protecting Location Privacy in Sensor Networks

against a Global Eavesdropper Mobile Computing

2012

64 D1264

Efficient Multi-dimensional Fuzzy Search for

Personal Information Management Systems Knowledge and

Data Engineering

2012

65 D1265

An Online Learning Approach to

Occlusion Boundary Detection

IMAGE

PROCESSING 2012

66 D1266

Automatic Image Equalization and Contrast

Enhancement Using Gaussian Mixture Modeling

IMAGE

PROCESSING

2012

67 D1267

Automatic Reconfiguration for

Large-Scale Reliable Storage Systems

DEPENDABLE

AND SECURE

COMPUTING

2012

68 D1268

Cashing in on the Cache in the Cloud CLOUD

COMPUTING

2012

69 D1269

Efficient audit service outsourcing for data

integrity in clouds

CLOUD

COMPUTING

2012

70 D1270

Enabling Secure and Efficient Ranked Keyword

Search over Outsourced Cloud Data

CLOUD

COMPUTING

2012

Page 14: ieee CSE & IT M.tech\BTECH project list

71 D1271

Expert Discovery and Interactions

in Mixed Service-Oriented Systems

CLOUD

COMPUTING

2012

72 D1272

Publishing Search Logs—A Comparative

Study of Privacy Guarantees

KNOWLEDGE

AND DATA

ENGINEERING

2012

73 D1273

Revisiting Defenses against Large-Scale

Online Password Guessing Attacks

DEPENDABLE

AND SECURE

COMPUTING

2012

74 D1274

Nonlinear Approach for Enhancement of Image

Focus Volume in Shape From Focus

Image Processing

2012

75 D1275

BloomCast: Efficient and Effective Full-Text

Retrieval in Unstructured P2P Networks

Parallel & Distributed

Systems

2012

76 D1276

An Extensible Framework for Improving a Distributed Software System's Deployment

Architecture

Software

Engineering

2012

77 D1277

Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems

Parallel & Distributed

Systems

2012

78 D1278

Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks

Parallel & Distributed

Systems

2012

79 D1279

Model Checking Semantically Annotated Services

Software Engineering

2012

Page 15: ieee CSE & IT M.tech\BTECH project list

S.No Project

Code Project Title Domain Year

1 J1101 Effective Navigation of Query Results

Based on Concept Hierarchies Data Mining 2011

2 J1102 Ranking Spatial Data by Quality

Preferences Data Mining 2011

3 J1103 Discovering Conditional Functional

Dependencies

Data Mining 2011

4 J1104 Extended XML Tree Pattern Matching:

Theories and Algorithms

Data Mining

Cloud

Computing

2011

5 J1105 The CoQUOS Approach to Continuous Queries in Unstructured Overlays

Data Mining On grid

computing

2011

6 J1106 Modeling and Detection of Camouflaging

Worm

Network

Security 2011

7 J1107 SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless

Mesh Networks

Network

Security 2011

8 J1108 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop

Wireless Networks

Networking 2011

9 J1109 Nymble: Blocking Misbehaving Users in

Anonymizing Networks Networking 2011

10 J1110 Buffer Sizing for 802.11 Based Networks Networking 2011

Page 16: ieee CSE & IT M.tech\BTECH project list

11 J1111 A Privacy-Preserving Location

Monitoring System for Wireless Sensor Networks

Mobile

Computing 2011

12 J1112 Secure and Practical Outsourcing of

Linear Programming in Cloud Computing

Cloud

Computing 2011

13 JIE1101

A New Approach For Fec Decoding Based On The Bp Algorithm In Lte And

Wimax Systems

Network Security

2011

14 JIE1104

Clustering With Multi-Viewpoint Based Similarity Measure

Data Engineering

2011

15 JIE1105 Decision Trees For Uncertain Data

Data Engineering

2011

16 JIE1115 Sketch4match – Content-Based Image

Retrieval System Using Sketches Image

Processing 2011

17 JIE1117 A Competitive Study Of Cryptography

Techniques Over Block Cipher Secure

Computing 2011

18 JIE1118

Ritas: Services For Randomized Intrusion Tolerance

Secure Computing

2011

19 JIE1119

Utility-Optimal Multi-Pattern Reuse Inmulti-Cell Networks

Wireless Communicatio

n 2011

20 JIE1120

Selfish Overlay Network Creation And Maintenance

Networking 2011

21 JIE1121

Cloud Computing For Agent-Based Urban Transportation Systems

Intelligent Systems

2011

22 JIE1122 Supporting Efficient And Scalable Multicasting Over Mobile Ad Hoc

Networks

Mobile Computing

2011

Page 17: ieee CSE & IT M.tech\BTECH project list

23 JIE1123

Throughput Optimization in Mobile Backbone Networks.

Mobile Computing

2011

24 JIE1124 Locating Equivalent Servants Over P2p

Networks

Network & Service

Management 2011

25 JIE1125

Improving Utilization Of Infrastructure Clouds

Cloud Computing

2011

26 JIE1126

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Secure Computing

2011

27 JIE1127

Wireless Sensor Network Security Model Using Zero Knowledge Protocol

Mobile Computing

2011

28 JIE1128

Going Back And Forth: Efficient Multideployment And Multisnapshotting

On Clouds

Cloud Computing

2011

29 JIE1129

Progme: Towards Programmable Network Measurement

Networking 2011

30 JIE1130 Live Streaming With Receiver-Based Peer-

Division Multiplexing Networking

2011

Page 18: ieee CSE & IT M.tech\BTECH project list

S.No PROJECT

CODE

Project Title Domain Year

1 D1101 Efficient computation of range aggregates against uncertain location based queries

Data Mining

2011

2 D1102 Exploring application-level semantics for

data compression. Data Mining 2011

3 D1103 Improving aggregate recommendation

diversity using ranking-based techniques Data Mining 2011

4 D1104 One size does not fit all towards user- and

query-dependent ranking for web databases.

Data Mining 2011

5 D1105 Optimal service pricing for a cloud cache Data Mining 2011

6 D1106 A personalized ontology model for web

information gathering

Data Mining 2011

7 D1107 Publishing search logs – a comparative

study of privacy guarantees

Data Mining 2011

8 D1108 Scalable learning of collective behavior. Data Mining 2011

9 D1109

The awareness network, to whom should i display my actions? And, whose actions

should i monitor?

Data Mining 2011

10 D1110 Monitoring service systems from a

language-action perspective Data Mining 2011

Page 19: ieee CSE & IT M.tech\BTECH project list

11 D1111 The world in a nutshell concise range

queries. Data Mining 2011

12 D1112 A query formulation language for the data

web Data Mining 2011

13 D1113 Horizontal aggregations in sql to prepare

data sets for data mining analysis Data Mining

2011

14 D1114

Exploiting dynamic resource allocation for efficient parallel data processing in the

cloud

Data Mining 2011

15 D1115 Adaptive provisioning of human expertise

in service-oriented systems

Data Mining 2011

16 D1116 Bridging socially-enhanced virtual

communities

Data Mining 2011

7 D1117 Continuous neighbor discovery in

asynchronous Sensor networks

Data Mining 2011

18 D1118

Jamming-aware traffic allocation for multiple-path routing using portfolio

selection

Data Mining 2011

19 D1119 Data integrity proofs in cloud storage Knowledge &

Data Engineering

2011

20 D1120 The geometric efficient matching

algorithm for firewalls Network Security

2011

21 D1121

Adaptive fault tolerant qos control algorithms for maximizing system lifetime of query-based wireless sensor networks

Network Security

2011