Tuesday 22 July 2014

PROJECTS LIST No Project Title Tech Project Type Category .Net IEEE 1 Publishing Search Logs – A Comparative Study of Privacy Guarantees .Net Web App IEEE 2 Fuzzy Keyword Search Over Encrypted Data in Cloud Computing .Net Web App IEEE 3 Effective Personalized Privacy Preservation .Net Web App IEEE 4 Resource Overbooking: Using Aggregation profiling in large scale Resource Discovery .Net Win App IEEE 5 Integration of Sound Signature over Graphical Password Authentication System .Net Web App IEEE 6 Java IEEE 1 Geometric Approach to Improving Active Packet Loss Measurement Java Win App IEEE 2 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks Java Win App IEEE 3 Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Java Win App IEEE 4 Location Based Spatial Query Processing In Wireless Broadcast Environments Java Win App IEEE 5 Modeling & Automated Containment of Worms Java Win App IEEE 6 Benefit Based Data Caching In Ad Hoc Networks Java Win App IEEE 7 Minimizing File Download Time in Stochastic Peer-to-Peer Networks Java Win App IEEE 8 Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Java Win App IEEE 9 Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction Java Win App IEEE 10 QUIVER Consistent Object Sharing For Edge Services Java Win App IEEE 11 Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Java Win App IEEE 12 Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences Java Web App IEEE 13 Analysis Of Credit Card Fraud Detection Methods Java Web App IEEE 14 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. 15 Packet-Hiding Methods for Preventing Selective Jamming Attacks Java Win App IEEE 16 A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Java Win App IEEE 17 Trust modeling in social tagging of multimedia content Java Web App IEEE 18 Online Modeling of Proactive Moderation System for Auction Fraud Detection Java Web App IEEE 19 Packet Loss Control Using Tokens At The Network Edge Java Win App IEEE 20 Clustering with Multi-Viewpoint basedSimilarity Measure Java Win App IEEE 21 Ensuring Distributed Accountability for Data Sharing in the Cloud Java Web App IEEE 22 On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks Java Win App IEEE 23 Organizing User Search Histories Java Web App IEEE 24 Risk-Aware Mitigation for MANET Routing Attacks Java Win App IEEE 25 Fast Data Collection in Tree-Based Wireless Sensor Networks Java Win App IEEE 26 Efficient Fuzzy Type-Ahead Search in XML Data Java Win App IEEE 27 Footprint Detecting Sybil Attacks in Urban Vehicular Networks Java Win App IEEE 28 Modeling and Detection of Camouflaging Worm Java Win App IEEE 29 Locating Equivalent Servants over P2P Networks Java Win App IEEE 30 Data Leakage Detection Java Web App IEEE 31 Ranking Spatial Data by Quality Preferences Java Web App IEEE 32 Java Java – Non IEEE 1 E-consultancy on BUSINESS Java Web App Non-IEEE 2 Secure Crime Identification Java Web App Non-IEEE 3 Secure Crime Identification Java Web App Non-IEEE 4 Simulation of Manet Java Web App Non-IEEE 5 EDEMS Java Web App Non-IEEE 6 Telephones Management Services Java Web App Non-IEEE 7 Online shopping Java Web App Non-IEEE 8 Computerized lending System Java Web App Non-IEEE 9 Human Resource Planner Java Web App Non-IEEE 10 Colleges and Students Information System Java Web App Non-IEEE 11 Doctor Patient Tracker Java Web App Non-IEEE 12 ONLINE RECURITMENT SYSTEM Java Web App Non-IEEE 13 Country Cargo & Express Couriers Java Web App Non-IEEE 14 Interest Calculation Java Web App Non-IEEE 15 Online Course Request Java Web App Non-IEEE 16 Corporate Company's vehicle mgt Java Web App Non-IEEE 17 Property management system Java Web App Non-IEEE 18 BookShopManagementSystem Java Web App Non-IEEE 19 AMSS Java Web App Non-IEEE 20 AD WAY Multilevel marking Java Web App Non-IEEE 21 Ewheelz Java Web App Non-IEEE 22 AdXPress Java Web App Non-IEEE 23 Bug Tracking System Java Web App Non-IEEE 24 CRM for Airline Industry Java Web App Non-IEEE 25 Online crime investigation Java Web App Non-IEEE 26 Safe And Secure internet banking Java Web App Non-IEEE 27 Safe And Secure internet banking.rar Java Web App Non-IEEE 28 Inventory Analyzer Java Web App Non-IEEE 29 E-Corporate Project Planning Java Web App Non-IEEE 30 Corporate Hospital Heath Card Java Web App Non-IEEE 31 Apna Life Insurance Java Web App Non-IEEE 32 Resorts for U Java Web App Non-IEEE 33 Intranet Mailing System Java Web App Non-IEEE 34 Automated SPORTS Club Java Web App Non-IEEE 35 Just intime Courier Services Java Web App Non-IEEE 36 College Administration System Java Web App Non-IEEE 37 ImprovedRailwayTicketing Java Web App Non-IEEE 38 Patientbilling Java Web App Non-IEEE 39 TGMC VirtualClassRoom Java Web App Non-IEEE 40 Water Marking Java Web App Non-IEEE 41 APP Consult Java Web App Non-IEEE 42 customer care system Java Web App Non-IEEE 43 DHL Couriers Java Web App Non-IEEE 44 FAQ Java Web App Non-IEEE 45 Knowledge Storm Java Web App Non-IEEE 46 Vehicle DealShipmgt Java Web App Non-IEEE 47 Work Force Mngt Java Web App Non-IEEE 48 JOB MILLER Java Web App Non-IEEE 49 Test Analyst Java Web App Non-IEEE 50 ImprovedRailwayTicketing Java Web App Non-IEEE 51 Internetbankingsystem Java Web App Non-IEEE 52 MunicipalAdministrationSystem Java Web App Non-IEEE 53 PatientBilling Java Web App Non-IEEE 54 MunicipalAdministrationSystem Java Web App Non-IEEE 55 Data mining using Apriori Algo Java Web app Non-IEEE 56 Log into Android Mobile using Remote Access Java Web App Non-IEEE DOMAIN: WIRELESS NETWORK PROJECTS A Data Fusion Technique for Wireless Ranging Performance Improvement Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling Importance of Coherence Protocols with Network Applications on Multicore Processors Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks DOMAIN: MOBILE COMPUTING Capacity of Hybrid Wireless Mesh Networks with Random APs Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing Quality-Differentiated Video Multicast in Multirate Wireless Networks Evaluating Temporal Robustness of Mobile Networks SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity An Investigation on LTE Mobility Management On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks Simple Hybrid and Incremental Postpruning Techniques for Rule Induction Supporting Search-As-You-Type Using SQL in Databases Reinforced Similarity Integration in Image-Rich Information Networks Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling Model-Based Analysis of Wireless System Architectures for Real-Time Applications Successive Interference Cancellation: Carving Out MAC Layer Opportunities Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Group-Based Medium Access Control for IEEE 802.11n Wireless LANs Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Secure Communication Based on Ambient Audio Successive Interference Cancellation: Carving Out MAC Layer Opportunities Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks Analysis of Distance-Based Location Management in Wireless Communication Networks Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks Dynamic Coverage of Mobile Sensor Networks In-Network Estimation with Delay Constraints in Wireless Sensor Networks Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks DOMAIN: NETWORK SECURITY PROJECTS Distance Bounding A Practical Security Solution for Real-Time Location Systems EAACK—A Secure Intrusion-Detection System for MANETs Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks DOMAIN: DATA MINING (Data Engineering) Ontology Matching: State of the Art and Future Challenges A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A System to Filter Unwanted Messages from OSN User Walls A Survey of XML Tree Patterns Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Distributed Web Systems Performance Forecasting Using Turning Bands Method Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework Ranking on Data Manifold with Sink Points Region-Based Foldings in Process Discovery Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence The Generalization Ability of Online Algorithms for Dependent Data Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models Large Graph Analysis in the GMine System Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia AML: Efficient Approximate Membership Localization within a Web-Based Join Framework Event Tracking for Real-Time Unaware Sensitivity Analysis Detecting Intrinsic Loops Underlying Data Manifold Clustering Large Probabilistic Graphs Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping Finding Rare Classes: Active Learning with Generative and Discriminative Models Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models DOMAIN: CLOUD COMPUTING QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds DOMAIN: PARALLEL & DISTRIBUTED COMPUTING Network Traffic Classification Using Correlation Information Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Adaptive Network Coding for Broadband Wireless Access Networks Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision Covering Points of Interest with Mobile Sensors Topology Abstraction Service for IP-VPNs Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model- Predictive Controller High Performance Resource Allocation Strategies for Computational Economies Strategies for Energy-Efficient Resource Management of Hybrid Programming Models DOMAIN: MULTIMEDIA & IMAGE PROCESSING Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes Casual Stereoscopic Photo Authoring Estimating Information from Image Colors An Application to Digital Cameras and Natural Scenes Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views Reversible Data Hiding With Optimal Value Transfer Query-Adaptive Image Search With Hash Codes Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage LDFT-Based Watermarking Resilient to Local Desynchronization Attacks Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain A Watermarking Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues Linear Distance Coding for Image Classification Robust Face Recognition for Uncontrolled Pose and Illumination Changes Hyperspectral Imagery Restoration Using Nonlocal Spectral-Spatial Structured Sparse Representation With Noise Estimation Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images Airborne Vehicle Detection in Dense Urban Areas Using HoG Features and Disparity Maps Scene Text Detection via Connected Component Clustering and Nontext Filtering Robust Hashing for Image Authentication Using Zernike Moments and Local Features Revealing the Traces of JPEG Compression Anti-Forensics Regional Spatially Adaptive Total Variation Super-Resolution With Spatial Information Filtering and Clustering Query-Adaptive Image Search With Hash Codes Log-Gabor Filters for Image-Based Vehicle Verification Intra-and-Inter-Constraint-Based Video Enhancement Based on Piecewise Tone Mapping General Framework to Histogram-Shifting-Based Reversible Data Hiding General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes 2-D Wavelet Packet Spectrum for Texture Analysis Compressive Framework for Demosaicing of Natural Images Context-Based Hierarchical Unequal Merging for SAR Image Segmentation Visually Lossless Encoding For JPEG2000 Wang-Landau Monte Carlo-Based Tracking Methods for Abrupt Motions Latent Fingerprint Matching Using Descriptor-Based Hough Transform

1 comments:

  1. Great...
    And really"YOGA" is the only way to make our self fit and fine.

    ReplyDelete