ieee CSE & IT M.tech\BTECH project list
Upcoming SlideShare
Loading in...5
×
 

ieee CSE & IT M.tech\BTECH project list

on

  • 3,432 views

CALL:9603150547

CALL:9603150547

Statistics

Views

Total Views
3,432
Views on SlideShare
3,432
Embed Views
0

Actions

Likes
1
Downloads
43
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

ieee CSE & IT M.tech\BTECH project list ieee CSE & IT M.tech\BTECH project list Document Transcript

  • Academic Projects for EEE (2012-2013)We will develop your ideas and your papers also, For any Further information call-9603150547 e-mail visionsolutions.9@gmail.com
  • ProjectS.No Project Title Domain Year Code Service 1 J1201 Bootstrapping Ontologies for Web Services Computing 2012 (Web service) Cooperative Provable Data Possession for 2012 2 J1202 Integrity Verification in Multi-Cloud Data Mining Storage Packet-Hiding Methods for Preventing 2012 3 J1203 Selective Jamming Attacks Net Working Learn to Personalized Image Search from 2012 4 J1204 the Photo Sharing Websites Data Mining Risk-Aware Mitigation for MANET 2012 5 J1205 Routing Attacks Net Working Slicing: A New Approach to Privacy 2012 6 J1206 Preserving Data Publishing Data Mining *MULTIPARTY ACCESS CONTROL FOR 2012 7 J1207 ONLINE SOCIAL NETWORKS: MODEL Net Working AND MECHANISMS Cloud 2012 8 J1208 Cloud Data Protection for the Masses Computing 2012 9 J1209 Cut Detection in Wireless Sensor Networks Networking
  • 2012 Game-Theoretic Pricing for Video10 J1210 Streaming in Networking Mobile Networks 201211 J1211 Organizing User Search Histories Data Mining 201212 J1212 Ranking Model Adaptation for Domain- Data Mining Specific Search 201213 J1213 Online Modeling of Proactive Moderation Data Mining System for Auction Fraud Detection 2012 Automatic Discovery of Association Orders14 J1214 between Name and Aliases from the Web Data Mining using Anchor Texts-based Co-occurrences 2012 An Efficient Caching Scheme and15 J1215 Consistency Maintenance in Hybrid P2P Data Engineering System 201216 J1216 In Tags We Trust: Trust modeling in social Data Mining tagging of multimedia content 201217 J1217 Protecting Location Privacy in Sensor Mobile Networks against a Global Eavesdropper Computing 201218 J1218 Packet Loss Control Using Tokens at the Networking Network Edge 201219 J1219 Ensuring Distributed Accountability for Cloud Data Sharing in the Cloud Computing 201220 J1220 Fast Data Collection in Tree-Based Net Working Wireless Sensor Networks 2012 A Secure Erasure Code-Based Cloud21 J1221 Storage System with Secure Data Cloud Computing Forwarding
  • 201222 J1222 Cloud Computing Security: From Single to Cloud Multi-Clouds Computing 2012 HASBE: A Hierarchical Attribute-Based23 J1223 Solution for Flexible and Scalable Access Cloud Computing Control in Cloud Computing 201224 J1224 Outsourced Similarity Search on Metric Cloud Data Assets Computing 2012 Scalable and Secure Sharing of Personal25 J1225 Health Records in Cloud Computing using Cloud Computing Attribute-based Encryption 201226 J1226 Toward Secure and Dependable Storage Cloud Services in Cloud Computing Computing 2012 Knowledge and27 J1227 Clustering with Multi-viewpoint-Based Data Similarity Measure Engineering 201228 J1228 Scalable Coding of Encrypted Images Image Processing Parallel and 2012 BloomCast: Efficient and Effective Full-29 J1229 Text Retrieval in Unstructured P2P Distributed systems Networks Parallel and 201230 J1230 Payments for Outsourced Computations Distributed systems 201231 J1231 Adaptive Opportunistic Routing for Networking Wireless Ad Hoc Networks 201232 J1232 Design, Implementation, and Performance Networking of a Load Balancer for SIP Server Clusters
  • 201233 J1233 Independent Directed Acyclic Graphs for Networking Resilient Multipath Routing 201234 J1234 MeasuRouting: A Framework for Routing Networking Assisted Traffic Monitoring 201235 J1235 Privacy- and Integrity-Preserving Range Networking Queries in Sensor Networks 201236 J1236 RIHT: A Novel Hybrid IP Traceback Networking Scheme 201237 J1237 Router Support for Fine-Grained Latency Networking Measurements 201238 J1238 A Stochastic Model of Multi-virus Secure Dynamics Computing 201239 J1239 Design and Implementation of TARF: A Secure Trust-Aware Routing Framework for WSNs Computing 201240 J1240 Detecting and Resolving Firewall Policy Secure Anomalies Computing 201241 J1241 Detecting Spam Zombies by Monitoring Secure Outgoing Messages Computing 2012 On the Security of a Ticket-Based42 J1242 Anonymity System with Traceability Secure Computing Property in Wireless Mesh Networks 201243 J1243 A Novel Data Embedding Method Using Image Adaptive Pixel Pair Matching Processing 2012 Improving Various Reversible Data Hiding44 J1244 Schemes Via Optimal Codes for Binary Image Processing Covers
  • A SECURE INTRUSION DETECTION 201245 J1245 SYSTEM AGAINST DDOS Wireless ATTACK IN WIRELESS MOBILE AD- Network HOC NETWORK 201246 J1246 Optimizing Cloud Resources for Delivering Networking IPTV Services through Virtualization 2012 FESCIM: Fair, Efficient, and Secure47 J1247 Cooperation Incentive Mechanism Mobile Computing for Multihop Cellular Networks 201248 J1248 Energy-Efficient Strategies for Cooperative Mobile Multichannel MAC Protocols Computing 2012 A Trigger Identification Service for49 J1249 Defending Mobile Computing Reactive Jammers in WSN 2012 FireCol: A Collaborative Protection50 J1250 Network for the Detection of Flooding Networking DDoS Attacks 201251 J1251 Fast Matrix Embedding by Matrix Network Security Extending A Network Coding Equivalent Content Parallel And 201252 J1252 Distributed Distribution Scheme for Efficient Peer-to- Peer Interactive VoD Streaming Systems Parallel And 201253 J1253 Distributed Packet Buffers for High- Distributed Bandwidth Switches and Routers Systems Efficient Fuzzy Type-Ahead Search in Knowledge And 201254 J1254 XML Data Data Engineering Footprint: Detecting Sybil Attacks in Parallel And 201255 J1255 Urban Vehicular Networks Distributed Systems
  • Handwritten Chinese Text Recognition by Pattern 201256 Integrating Multiple Contexts Analysis And J1256 Machine Intelligence On Optimizing Overlay Topologies for Parallel And 201257 J1257 Search in Unstructured Peer-to-Peer Distributed Networks Systems Holistic Top-k Simple Shortest Path Join Knowledge & 201258 J1258 in Graphs Data Engineering Confucius: A Tool Supporting Service 201259 J1259 Collaborative Scientific Workflow Computing Composition (Web Service)
  • PROJECTS.No Project Title Domain Year CODE AMPLE: An Adaptive Traffic 2012 Engineering 1 D1201 Net Working System Based on Virtual Routing Topologies 2012 Compressed-Sensing-Enabled Video 2 D1202 Streaming for Net Working Wireless Multimedia Sensor Networks. 2012 Design and Implementation of TARF: A 3 D1203 Net Working Trust-Aware Routing Framework for WSNs 2012 Mobile Network Assisted Mobile Computing with 4 D1204 Computing Optimal Uplink Query Processing (Net Working) Optimal Power Allocation in Multi-Relay 2012 MIMO 5 D1205 Net Working Cooperative Networks: Theory and Algorithms 2012 Robust Face-Name Graph Matching Digital Image 6 D1206 for Movie Processing Character Identification Scalable and Secure Sharing of 2012 Personal Health 7 D1207 Data Mining Records in Cloud Computing using Attribute-based Encryption Securing Node Capture Attacks for 2012 8 D1208 Hierarchical Data Aggregation in Wireless Data Mining Sensor Networks SPOC: A Secure and Privacy-preserving Mobile 2012 9 D1209 Opportunistic Computing Framework for Computing Mobile-Healthcare Emergency (Net Working) 2012 Topology control in mobile ad hoc networks 10 D1210 Net Working with cooperative communications
  • The world in a nutshell concise range Cloud 201211 D1211 queries. Heuristics Based Query Processing computing for Large RDF Graphs Using Cloud Computing. 2012 Automatic Reconfiguration for Large-Scale12 D1212 Networking Reliable Storage Systems 2012 A Novel Anti phishing framework based on Image Processing13 D1213 visual cryptography 2012 Semi supervised Biased Maximum Margin Image14 D1214 Analysis for Interactive Image Retrieval Processing 2012 Revisiting Defenses against Large-Scale Secure15 D1215 Online Password Guessing Attacks Computing 2012 Cloud Efficient Audit Service Outsourcing for16 D1216 computing Data Integrity in Clouds. 2012 Toward Reliable Data Delivery for Highly Mobile17 D1217 Dynamic Mobile AdHoc Networks Computing 2012 A New Cell Counting Based Attack Against18 D1218 Networking Tor. BECAN: A Bandwidth-Efficient 2012 Networking Cooperative Authentication Scheme for19 D1219 Filtering Injected False Data in Wireless Sensor Networks. 2012 Towards Secure and Dependable Storage Cloud20 D1220 Services in Cloud Computing. Computing 2012 A Secure Erasure Code-Based Cloud Cloud Computing21 D1221 Storage System with Secure Data Forwarding
  • 2012 Cloud Computing Security From Single to Multi- Cloud Computing22 D1222 Clouds (IEEE Conference) 2012 Enhanced Data Security Model for Cloud Computing Cloud Computing23 D1223 (IEEE Conference) 2012 Ensuring Distributed Accountability for Data Cloud Computing24 D1224 Sharing in the Cloud. HASBE: A Hierarchical Attribute-Based Solution for 2012 Flexible and Scalable Access Control in Cloud Cloud Computing25 D1225 Computing 2012 Cloud Computing26 D1226 Outsourced Similarity Search on Metric Data Assets 2012 Cloud Computing27 Privacy-Preserving Public Auditing for Secure Cloud D1227 Storage 201228 Knowledge and D1228 A Query Formulation Language for the data web Data Engineering 201229 Creating Evolving User Behavior Profiles Knowledge and D1229 Automatically Data Engineering A D-Cache: Universal Distance Cache for Metric 201230 Access Methods Knowledge and D1230 Data Engineering - 2012 DDD: A New Ensemble Approach for Dealing with31 Knowledge and D1231 Concept Drift Data Engineering 201232 Efficient Computation of Range Aggregates against Knowledge and D1232 Uncertain Location-Based Queries Data Engineering
  • 201233 Knowledge and D1233 Efficient Fuzzy Type-Ahead Search in XML Data Data Engineering 201234 Horizontal Aggregations in SQL to Prepare Data Knowledge and D1234 Sets for Data Mining Analysis Data Engineering 201235 Improving Aggregate Recommendation Diversity Knowledge and D1235 Using Ranking-Based Techniques Data Engineering 201236 Measuring the Sky: On Computing Data Cubes via Knowledge and D1236 Skylining the Measures Data Engineering 201237 Knowledge and D1237 Mining Web Graphs for Recommendations Data Engineering 201238 Knowledge and D1238 Organizing User Search Histories Data Engineering 201239 Publishing Search Logs—A Comparative Study of Knowledge and D1239 Privacy Guarantees Data Engineering 201240 Query Planning for Continuous Aggregation Queries Knowledge and D1240 over a Network of Data Aggregators Data Engineering 201241 ROAD: A New Spatial Object Search Framework for Knowledge and D1241 Road Networks Data Engineering 201242 Knowledge and D1242 Scalable Learning of Collective Behavior Data Engineering 201243 Slicing: A New Approach for Privacy Preserving Knowledge and D1243 Data Publishing Data Engineering 201244 Tree-Based Mining for Discovering Patterns of Knowledge and D1244 Human Interaction in Meetings Data Engineering 201245 Bounding the Impact of Unbounded Attacks in Parallel and D1245 Stabilization Distributed Systems 201246 Catching Packet Droppers and Modifiers in Wireless Parallel and D1246 Sensor Networks Distributed Systems
  • 201247 The Three-Tier Security Scheme in Wireless Sensor Parallel and D1247 Networks with Mobile Sinks Distributed Systems48 2012 D1248 ` A New Cell-Counting-Based Attack Against Tor Net Working49 2012 D1249 Optimal Source-Based Filtering of Malicious Traffic Net Working A Secure Intrusion detection system against DDOS 201250 Secure Computing D1250 attack in Wireless Mobile Ad-hoc Network (IJCA)51 ES-MPICH2: A Message Passing Interface with 2012 D1251 Secure Computing Enhanced Security On the Security and Efficiency of Content 201252 D1252 Secure Computing Distribution via Network Coding 201253 A Novel Data Embedding Method Using Adaptive D1253 Image Processing Pixel Pair Matching 201254 A Probabilistic Model of Visual Cryptography D1254 Image Processing Scheme With Dynamic Group 201255 D1255 Active Visual Segmentation Image Processing 201256 Image Segmentation Based on the Poincaré Map D1256 Image Processing Method 2012 K-N SECRET SHARING VISUAL Image Processing57 D1257 CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER (IJEST) Image Processing 201258 Multiple Exposure Fusion for High Dynamic Range D1258 Image Acquisition Image Processing 201259 D1259 Smile Detection by Boosting Pixel Differences 2012 Image Processing60 View-invariant action recognition based on Artificial D1260 Neural Networks
  • 201261 D1261 Cooperative Download in Vehicular Environments Mobile Computing 201262 Distributed Throughput Maximization in Wireless D1262 Mobile Computing Networks Via Random Power Allocation 201263 Protecting Location Privacy in Sensor Networks D1263 Mobile Computing against a Global Eavesdropper 201264 Efficient Multi-dimensional Fuzzy Search for Knowledge and D1264 Personal Information Management Systems Data Engineering An Online Learning Approach to IMAGE65 PROCESSING D1265 Occlusion Boundary Detection 2012 Automatic Image Equalization and Contrast IMAGE 201266 PROCESSING D1266 Enhancement Using Gaussian Mixture Modeling Automatic Reconfiguration for DEPENDABLE 201267 AND SECURE D1267 Large-Scale Reliable Storage Systems COMPUTING Cashing in on the Cache in the Cloud CLOUD 201268 COMPUTING D1268 Efficient audit service outsourcing for data CLOUD 201269 integrity in clouds COMPUTING D1269 Enabling Secure and Efficient Ranked Keyword CLOUD 201270 COMPUTING D1270 Search over Outsourced Cloud Data
  • Expert Discovery and Interactions CLOUD 201271 COMPUTING D1271 in Mixed Service-Oriented Systems Publishing Search Logs—A Comparative KNOWLEDGE 201272 AND DATA D1272 Study of Privacy Guarantees ENGINEERING Revisiting Defenses against Large-Scale DEPENDABLE 201273 AND SECURE D1273 Online Password Guessing Attacks COMPUTING Image 201274 Nonlinear Approach for Enhancement of Image Processing D1274 Focus Volume in Shape From Focus Parallel & 201275 BloomCast: Efficient and Effective Full-Text Distributed D1275 Retrieval in Unstructured P2P Networks Systems An Extensible Framework for Improving a 201276 Distributed Software Systems Deployment Software D1276 Architecture Engineering Semantic-Aware Metadata Organization Parallel & 201277 Paradigm in Next-Generation File Systems Distributed D1277 Systems Improving End-to-End Routing Performance of Parallel & 201278 Greedy Forwarding in Sensor Networks Distributed D1278 Systems Model Checking Semantically Annotated Software 201279 Services Engineering D1279
  • S.No Project Project Title Domain Year Code 1 J1101 Effective Navigation of Query Results Data Mining 2011 Based on Concept Hierarchies 2 J1102 Ranking Spatial Data by Quality Data Mining 2011 Preferences Discovering Conditional Functional 3 J1103 Dependencies Data Mining 2011 Extended XML Tree Pattern Matching: Data Mining 4 J1104 Theories and Algorithms Cloud 2011 Computing Data Mining 5 J1105 The CoQUOS Approach to Continuous 2011 On grid Queries in Unstructured Overlays computing Modeling and Detection of Camouflaging Network 6 J1106 2011 Worm Security SAT: A Security Architecture Achieving Network 7 J1107 Anonymity and Traceability in Wireless 2011 Security Mesh Networks Delay Analysis and Optimality of 8 J1108 Scheduling Policies for Multi-Hop Networking 2011 Wireless Networks 9 J1109 Nymble: Blocking Misbehaving Users in Networking 2011 Anonymizing Networks 10 J1110 Buffer Sizing for 802.11 Based Networks Networking 2011
  • A Privacy-Preserving Location Mobile11 J1111 Monitoring System for Wireless Sensor 2011 Computing Networks Secure and Practical Outsourcing of Cloud12 J1112 Linear Programming in Cloud 2011 Computing Computing A New Approach For Fec Decoding13 Network JIE1101 Based On The Bp Algorithm In Lte And Security 2011 Wimax Systems14 Clustering With Multi-Viewpoint Based Data JIE1104 2011 Similarity Measure Engineering15 Data JIE1105 Decision Trees For Uncertain Data 2011 Engineering16 Sketch4match – Content-Based Image Image JIE1115 2011 Retrieval System Using Sketches Processing17 A Competitive Study Of Cryptography Secure JIE1117 2011 Techniques Over Block Cipher Computing18 Ritas: Services For Randomized Intrusion Secure JIE1118 2011 Tolerance Computing Wireless19 Utility-Optimal Multi-Pattern Reuse JIE1119 Communicatio 2011 Inmulti-Cell Networks n20 Selfish Overlay Network Creation And JIE1120 Networking 2011 Maintenance21 Cloud Computing For Agent-Based Intelligent JIE1121 2011 Urban Transportation Systems Systems Supporting Efficient And Scalable22 Mobile JIE1122 Multicasting Over Mobile Ad Hoc 2011 Computing Networks
  • 23 Throughput Optimization in Mobile Mobile JIE1123 2011 Backbone Networks. Computing Network &24 Locating Equivalent Servants Over P2p JIE1124 Service 2011 Networks Management25 Improving Utilization Of Infrastructure Cloud JIE1125 2011 Clouds Computing26 Dynamics of Malware Spread in Secure JIE1126 2011 Decentralized Peer-to-Peer Networks Computing27 Wireless Sensor Network Security Model Mobile JIE1127 2011 Using Zero Knowledge Protocol Computing Going Back And Forth: Efficient28 Cloud JIE1128 Multideployment And Multisnapshotting 2011 Computing On Clouds29 Progme: Towards Programmable JIE1129 Networking 2011 Network Measurement30 Live Streaming With Receiver-Based Peer- Networking JIE1130 2011 Division Multiplexing
  • S.No PROJECT Project Title Domain Year CODE Efficient computation of range aggregates 1 D1101 Data Mining against uncertain location based queries 2011 Exploring application-level semantics for 2 D1102 Data Mining 2011 data compression. Improving aggregate recommendation 3 D1103 Data Mining 2011 diversity using ranking-based techniques One size does not fit all towards user- and 4 D1104 query-dependent ranking for web Data Mining 2011 databases. 5 D1105 Optimal service pricing for a cloud cache Data Mining 2011 A personalized ontology model for web 6 D1106 information gathering Data Mining 2011 Publishing search logs – a comparative 7 D1107 study of privacy guarantees Data Mining 2011 8 D1108 Scalable learning of collective behavior. Data Mining 2011 The awareness network, to whom should i 9 D1109 display my actions? And, whose actions Data Mining 2011 should i monitor? Monitoring service systems from a 10 D1110 Data Mining 2011 language-action perspective
  • The world in a nutshell concise range11 D1111 Data Mining 2011 queries. A query formulation language for the data12 D1112 Data Mining 2011 web Horizontal aggregations in sql to prepare 201113 D1113 Data Mining data sets for data mining analysis Exploiting dynamic resource allocation14 D1114 for efficient parallel data processing in the Data Mining 2011 cloud Adaptive provisioning of human expertise15 D1115 in service-oriented systems Data Mining 2011 Bridging socially-enhanced virtual16 D1116 communities Data Mining 2011 Continuous neighbor discovery in7 D1117 asynchronous Sensor networks Data Mining 2011 Jamming-aware traffic allocation for18 D1118 multiple-path routing using portfolio Data Mining 2011 selection Knowledge &19 D1119 Data integrity proofs in cloud storage Data 2011 Engineering The geometric efficient matching Network20 D1120 2011 algorithm for firewalls Security Adaptive fault tolerant qos control algorithms for maximizing system lifetime Network21 D1121 2011 of query-based wireless sensor networks Security