Your SlideShare is downloading. ×
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

2011 updated titles [ skiveprojects ]

705

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
705
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Skiveprojects TABLE OF CONTENTS S. No PROJECT TITLES PAGE.NO 1 DOT NET IEEE TITLES 3 1.1  Cloud Computing 3 1.2  Mobile Computing 4 1.3  Network Security 5 1.4  Data Mining 8 1.5  Image Processing 11 1.6  Distributed Networking 12 1.7  Parallel & Distributed Computing 15 17 2 JAVA IEEE TITLES 2.1  Data Mining 17 2.2  Network Security 19 2.3  Parallel and Distributed Computing 20 2.4  Distributed Networking 21 2.5  Image Processing 23 3 NETWORK SIMULATOR(NS2) TITLES 25 4 APPLICATION PROJECT TITLES 26 4.1  DOT NET APPLICATION TITLES 26 4.2  JAVA APPLICATION TITLES 28 5 FLASH AND ANIMATION TITLES 29 6 EMBEDDED SYSTEM IEEE TITLES 30 7 EMBEDDED SYSTEM NON IEEE TITLES 33 8 MATLAB IEEE TITLES 35 8.1  Communication 35 8.2  Image Processing 36 9 VLSI IEEE TITLES 36 Fabsys Technologies Pvt.Ltd | 1Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 2. Skiveprojects About Skiveprojects Skiveprojects.com is a division of Fabsys Technologies (P) Ltd. It is specially organized for students’ guidance in their project work as well as in career development. As a team, we provide technical assistance in various technologies and domains. By efficient training methodologies, we train students in their desired field. We focus on needs of the students. To make students career brighter in desired field, we are functioning as a bridge for students. We provide  Project Guidance for all departments(UG & PG)  In plant training for IT, CSE, ECE departments respectively  Career Development programs  Seminars in various Domain & Technology every day!!  Internship Training & Certification What is the real use of doing IEEE Project in final year? Well, it is simple. Doing Project in final year will help you  To make an entry in Real time working environment  In most of the technical interview, Companies will ask questions around your final year projects  Exposure in latest technology in the field  Backbone for placement  Real time Training in an organization Bring Own Concepts!! You can bring your own concepts to us. We will develop projects according your requirement.  Project Guidance with Short Term Course.  Online Training for out-station students Fabsys Technologies Pvt.Ltd | 2Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 3. SkiveprojectsDOT NET IEEE TITLES IEEE TRANSACTION ON: CLOUD COMPUTING Domain: Dot. Net S.NO CODE PROJECT TITLE & DESCRIPTION Published Year 1. SDCC01 EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced 2011 Computer Science Course. Description: Platform clouds are valued by both students and professors to achieve the course objectives and that clouds offer a significant improvement over the previous situation in labs. Technology: Paas Cloud Usage : Cloud In Education 2. SDCC02 CloudTPS: Scalable Transactions for Web Applications in the Cloud. 2011 Description: CloudTPS (scalable transaction manager) guarantees full ACID properties for multi-item transactions issued by Web applications, even in the presence of server failures and network partitions. Technology: Local Transaction Manager Usage: Acid Properties To Nosql 3. SDCC03 A Privacy-Preserving Remote Data Integrity Checking Protocol with 2011 Data Dynamics and Public Verifiability. Description: Proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Technology: Public Verifiability Usage : Integrity In Cloud 4. SDCC04 Enabling Public Auditability and Data Dynamics for Storage Security 2011 in Cloud Computing. Description: Identifying the difficulties & potential security problems of direct extensions with fully dynamic data updates from prior works and then construct an elegant verification scheme for the seamless integration. Technology: Third Party auditor Usage : Data Security in Cloud 5. SDCC05 Optimal Service Pricing for a Cloud Cache. 2011 Description: A novel SOA-aware approach with a special focus on the data flow. The tight interaction of new cloud technologies with SOA technologies enables us to optimize the execution of data-intensive service. Technology: Framework For Dynamic Pricing Usage : Cloud Profit Fabsys Technologies Pvt.Ltd | 3Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 4. Skiveprojects 6. SDCC06 Failure Avoidance through Fault Prediction Based on Synthetic 2011 Transactions. Description: Enhancing an online service’s reliability, availability and performance. Synthetic transactions in pre-production environments, and combined with data-mining on compact, specialized logs. Technology: Synthetic Transactions Usage : Eliminate Failure 7. SDCC07 Multi-level Intrusion Detection system and Log Management in 2011 Cloud Computing. Description: A method that enables cloud computing systems both effectiveness of using system resource and system strength of security. Technology: Levels of IDS Usage: Security with high Accessibility 8. SDCC08 Using Cloud Technologies to Optimize Data-Intensive Service 2010 Applications Description: The tight interaction of new cloud technologies with SOA technologies enables us to optimize the execution of data-intensive service applications by reducing the data exchange tasks to a minimum. Technology: Cloud SOA Usage : Eliminate Unwanted Data IEEE TRANSACTION ON: MOBILE COMPUTING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1. SDMC01 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011 Networks. Description: Efficient Geographic Multicast Protocol -uses a virtual-zone-based structure to implement scalable and efficient group membership management. Technology: Virtual Zone Usage: Reliable Packet Transmissions 2. SDMC02 Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh 2010 Networks. Description: A specialization that accounts for peculiar features of wireless mesh networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast nature of wireless communication. Technology: 1-Hop Broadcast Usage :Information retrieval efficiency 3. SDMC03 A Distributed and Scalable Time Slot Allocation Protocol for Wireless 2011 Sensor Networks. Description: A distributed and scalable scheduling access scheme that mitigates high data loss in data-intensive sensor networks and can also handle some mobility. Technology: Latin Squares Usage: Eliminate Collision Fabsys Technologies Pvt.Ltd | 4Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 5. Skiveprojects 4. SDMC04 Secure High-Throughput Multicast Routing in Wireless Mesh 2011 Networks. Description: Identifying novel attacks against high throughput multicast protocols in wireless mesh networks. Technology: Defense Mechanisms Usage: Prevent from identified attacks 5. SDMC05 Message Authentication in Computationally Constrained 2010 Environments. Description: An approach to implement a compact HMAC by the use of stream ciphering is presented in this paper. Technology: Stream Cipher Usage: Authentication, Integrity 6. SDMC06 Efficient Broadcasting in Mobile AD-Hoc Network. 2010 Description: New broadcasting algorithm that constructs a CDS "on the fly" and can guarantee both full delivery and a constant approximation ratio to the optimal solution. Technology: Broadcasting Algorithms Usage: Reliable Transmission 7. SDMC07 Multicasting with Localized Control in Wireless AD-Hoc Network 2010 Description: The proposed scheme combines the layered multicast concept with the routing-based congestion avoidance idea to reduce the aggregated rate of multicast flows. Technology: cross-layer approach Usage: Congestion Avoidance IEEE TRANSACTION ON : NETWORK SECURITY Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1. SDNS01 SAT: A Security Architecture Achieving Anonymity and 2011 Traceability in Wireless. Description: Ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. Technology: Anonymity And Traceability Usage : Identify Users 2. SDNS02 Replica Placement for Route Diversity in Tree-based Routing 2011 Distributed Hash Tables Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route diversity for these DHTs. Technology: Route Diversity Usage : Response Time Reduced 3. SDNS03 Privacy-Preserving Updates to Anonymous and Confidential 2011 Databases Description: Protocols solving suppression-based and generalization-based k- anonymous and confidential databases. And it will rely on well-known cryptographic assumptions. Technology: Secure Computation Usage : Privacy-Preserving Fabsys Technologies Pvt.Ltd | 5Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 6. Skiveprojects 4. SDNS04 Revisiting Defenses Against Large-Scale Online Password Guessing 2011 Attacks Description: A new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks. Technology: Automated Turing Tests Usage : Identify Malicious Login 5. SDNS05 Balancing Revocation and Storage Trade-Offs in Secure Group 2011 Communication Description: Hybrid key management algorithm. Trade-offs between storage cost and rekeying cost for secure multicast. Technology: A Family Of Algorithms Usage : Reduce Cost Of Rekeying 6. SDNS06 Nymble: Blocking Misbehaving Users in Anonymizing Networks 2011 Description: Servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Nymble Tickets and Credentials, Blacklist. Technology: A Secure System Usage : Block Misbehaving Users 7. SDNS07 Blind Authentication: A Secure Crypto-Biometric Verification 2010 Protocol Description: A Provably secure and blind biometric authentication protocol, which addresses the concerns of user’s privacy, template protection, and trust issues. Technology: Biometric Authentication Usage : Nonrepudiable identity 8. SDNS08 An Architectural Approach to Preventing Code Injection Attacks 2010 Description: The memory architecture of modern processors that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory. Technology: Memory Architecture Usage : Improved Protection 9. SDNS09 Authenticated Group Key Transfer Protocol Based on Secret 2010 Sharing Description: An authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once. Technology: Trusted Key Generation Center Usage : Secret Sharing 10. SDNS10 Beyond Output Voting: Detecting Compromised Replicas Using 2009 HMM-Based Behavioral Distance Description: A novel approach to behavioral distance measurement using a new type of Hidden Markov Model, and present an architecture realizing this new approach. Technology: Hidden Markov Model Usage : Detect Mimicry Attacks 11. SDNS11 Flexible and Rollback recovery for grid environment 2009 Description: Two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. Technology: Theft-Induced Check Usage : Controlling The Overhead 12. SDNS12 Accurately Measuring Denial of Service in Simulation and Testbed 2009 Experiments Description: Several DoS impact metrics that measure the quality of service experienced by users during an attack. Our metrics are quantitative Technology: Denial of Service Metrics Usage :Measure service quality Fabsys Technologies Pvt.Ltd | 6Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 7. Skiveprojects 13. SDNS13 Credit card fraud detection using hidden Markov model 2009 Description: An HMM is initially trained with the normal behavior of a cardholder. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability. Technology: Hidden Markov Model Usage :Most accurate detection 14. SDNS14 In-depth packet inspection using a hierarchical pattern matching 2010 algorithm. Description: EHMA is a two-tier and cluster-wise matching algorithm, which significantly reduces the amount of external memory accesses and the capacity of memory. Technology: Cluster-Wise Matching Usage : Fast scanning process 15. SDNS15 Practical Management And Standard Administrative System 2010 Description: To reduce the manual workload of the administrative activities, organizations began to electronically automate many of these processes. Technology: Electronic Automation Usage : increasing scalability 16. SDNS16 Predictive Network Anomaly Detection And Visualization 2010 Description: An approach that uses short-term observations of network features and their respective time averaged entropies. Acute changes are localized in network feature space using adaptive Wiener filtering. Technology: Fisher linear discriminant Usage : Identifying Anomalies 17. Network Traffic Monitor 2010 SDNS17 Description: UniMon (Universal Network Traffic Monitor) is an external and passive network traffic monitor designed to adapt any type of network and protocols. Technology: Entropy of Network Traffic Usage: Monitor User Activity 18. Steward : Scaling Byzantine Fault-Tolerant Replication To Wide 2010 SDNS18 Area Networks Description: The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide-area communication. Technology: Fault-Tolerant Replication Usage :Secure TransmissionDo you need more Explanation for any Project? Contact Skiveprojects @ 9176990090 Fabsys Technologies Pvt.Ltd | 7Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 8. Skiveprojects IEEE TRANSACTION ON : DATAMINING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1. SDDM01 Mining Group Movement Patterns For Tracking Moving Objects Efficiently. Description: A local mining phase & cluster ensembling phase to find movement 2011 patterns based on local trajectories and computing the similarity of moving objects & identify the local group relationships. Technology: Distributed clustering Usage : Track Moving Objects 2. SDDM02 Efficient Periodicity Mining In Time Series Databases Using Suffix Trees. Description: The algorithm uses suffix tree as the underlying data structure. Detect 2011 symbol, sequence (partial), and segment (full cycle) periodicity in time series. Technology: Suffix Tree Usage : Time Efficient 3. SDDM03 Automatic Discovery of Personal Name Aliases From the Web Description: Automatically extracted lexical pattern-based approach to efficiently extract a large set of candidate aliases from snippets retrieved from a web search engine. 2011 Technology: Lexical Pattern Approach Usage : Information Retrieval 4. SDDM04 Experience Transfer for the Configuration Tuning in Large-Scale 2011 Computing Systems Description: The utilization of management experiences in one system to benefit the same management task in other systems (or current systems). Bayesian network to model configuration dependencies. Technology: Configuration Tuning Usage : Configuration Tuning 5. SDDM05 A Web Search Engine-Based Approach to Measure Semantic 2011 Similarity between Words. Description: An empirical method to estimate semantic similarity using page counts and text snippets retrieved from a web search engine for two words. Technology: Empirical Method Usage : Improves The Accuracy 6. SDDM06 Data Leakage Detection. 2011 Description: Data allocation strategies that improve the probability of identifying leakages and develop a model for assessing the “guilt” of agents. That improves chances of identifying the guilty agents. Technology: Data Allocation Strategies Usage : Identifying Guilty Party 7. SDDM07 A Machine Learning Approach for Identifying Disease-Treatment 2011 Relations in Short Texts. Description: A ML-based methodology for building an application that is capable of identifying and disseminating healthcare information Identifies semantic relations that exist between diseases and treatments. Technology: ML-based methodology Usage : Integrated Application Fabsys Technologies Pvt.Ltd | 8Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 9. Skiveprojects 8. SDDM08 Authenticated Multistep Nearest Neighbor Search 2011 Description: The multistep NN algorithm incurs prohibitive network overhead due to the transmission of false hits, but are nevertheless necessary for its verification. Technology: Query Authentication Usage : Reduces Size Of False Hit 9. SDDM09 Optimizing Resource Conflicts in Workflow Management Systems 2011 Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource conflicts subject to temporal constraints and simultaneously optimizes throughput. Technology: Eigen-value Analysis Usage :Minimize Resource Conflicts 10. SDDM10 Closeness: A New Privacy Measure for Data Publishing 2010 Description: A new notion of privacy called "closeness." It present the base model - closeness, which requires that the distribution of a sensitive attribute Technology: Closeness Usage : Offers Higher Utility 11. SDDM11 Record Matching over Query Results from Multiple Web Databases. 2010 Description: An unsupervised, online record matching method, UDD, where a given query, can effectively identify duplicates from the query result records of multiple Web databases. Technology: Data Deduplication Usage : Get accurate results 12. SDDM12 Towards an Effective XML Keyword Search. 2010 Description: A novel formulae to identify the search for nodes and search via nodes of a query, and present a novel XML TF*IDF ranking strategy to rank the individual matches of all possible search intentions. Technology: Relevance Ranking Usage : Rank the individual matches 13. SDDM13 Bridging Domains Using World Wide Knowledge for Transfer 2010 Learning Description: A novel transfer learning approach, called BIG to effectively extract useful knowledge in a worldwide knowledge base, which is then used to link the source and target domains. Technology: Cross-Domain Usage: Cross-domain text classification 14. SDDM14 Personalizing web directories with the aid of web usage data 2010 Description: A novel methodology that combines the users browsing behavior with thematic information from the Web directories. Technology: Personalization Methodology Usage : Web Directories 15. SDDM15 Filter-Based Data Partitioning for Training Multiple Classifier 2010 Systems Description: To assess the effectiveness of different types of training partitions, It generated a large number of disjoint training partitions with distinctive distributions. Technology: Clustering and Selection Usage : Classifier Systems Fabsys Technologies Pvt.Ltd | 9Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 10. Skiveprojects 16. SDDM16 FiVaTech: Page-Level Web Data Extraction from Template Pages 2010 Description: An unsupervised, page-level data extraction approach to deduce the schema and templates for each individual Deep Website, which contains either singleton or multiple data records in one Webpage. Technology: Multiple Trees Merging Usage : Web Data Extraction 17. SDDM17 Histogram-Based Global Load Balancing in Structured Peer-to-Peer 2009 Systems Description: A general framework, HiGLOB, for global load balancing in structured P2P systems. Each node with 1) a histogram manager, and 2) a load-balancing manager. Technology: Histogram Buckets Usage : Load-Balancing 18. SDDM18 Interactive Correction and Recommendation for Computer 2009 Language Learning and Training Description: An automated learning and skills training system for a database programming environment that promotes procedural knowledge acquisition and skills training. Technology: Error Classification Usage : Personalized Guidance 19. SDDM19 Optimal Lot Sizing Policies for Sequential Online Auctions 2009 Description: A goal programming approach for estimating the bid distribution for the bidder population from the observed bids, readily available in these auctions. Technology: Closed-Form Solution Usage : Increases users holding costs 20. SDDM20 Intrusion Detection System based on Data Mining 2009 Description: The system that performs anomaly detection can detect intrusions known and unknown, reduce omissions and misstatements, improve accuracy and speed of intrusion detection. Technology: Hidden Honey pot Usage : Solicit possible attacks 21. SDDM21 Fast Query Point Movement Techniques for Large CBIR Systems 2009 Description: A new index structure and query processing technique to improve retrieval effectiveness and efficiency. Technology: Relevance Feedback Usage : Retrieval Performance 22. SDDM22 Exact Knowledge Hiding Through Database Extension 2009 Description: A novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent item. Technology: Exact Border Approach Usage : Hiding The Sensitive Item 23. SDDM23 Hierarchical distribute p2p document clustering and clustering 2009 summarization Description: A Hierarchically distributed Peer-to-Peer (HP2PC) architecture and clustering algorithm. The architecture is based on a multilayer overlay network of peer neighborhoods. Technology: distributed key phrase extraction Usage : Global Clustering Fabsys Technologies Pvt.Ltd | 10Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 11. Skiveprojects 24. SDDM24 Vide: A Vision-Based Approach For Deep Web Data Extraction 2010 Description: A novel technique is proposed for data extraction from deep Web pages using primarily visual features. A new performance measure, revision, is proposed to evaluate Web data extraction tools. Technology: Visual Features Of Web Pages Usage : Web data extraction 25. Multidimensional Suppressions For K-Anonymity 2010 SDDM25 Description: A new method for achieving k-anonymity named K-anonymity of Classification Trees Using Suppression (kACTUS). Technology: De-Indentified Data Usage : Multidimensional Suppression 26. Voting Systems With Trust Mechanisms In Cyberspace: 2010 SDDM26 Vulnerabilities And Defenses Description: Proposing two defense schemes 1. Hide correlation knowledge from attackers 2. Introduce robustness-of-evidence, a new metric, in trust calculation Technology: RepTrap Usage : Reduce rate of attacks IEEE TRANSACTION ON: IMAGE PROCESSING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published year 1. SDIP01 1-D Transforms for the Motion Compensation Residual 2011 Description: An adaptive auto-covariance characterization for the MC-residual that shows some statistical differences between the MC-residual and the image. Technology:1D directional transform Usage: Conventional Transforms 2. SDIP02 A Stochastic Approach to Image Retrieval Using Relevance 2011 Feedback and Particle Swarm Optimization Description: An innovative approach is proposed with combination of relevance feedback (RF) approach & evolutionary stochastic algorithm, called particle swarm optimizer (PSO). Technology: Particle Swarm Optimizer Usage : Visual Query 3. SDIP03 Contourlet-Based Image Watermarking Using Optimum Detector in 2010 a Noisy Environment Description: A new Watermarking technique for eliminating the noises in the environment by using the optimum detector. Technology: General Gaussian Distribution Usage : Watermarking Fabsys Technologies Pvt.Ltd | 11Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 12. Skiveprojects 4. SDIP04 Latent Finger print matching 2010 Description: A system for matching latent fingerprints found at crime scenes to rolled fingerprints enrolled in law enforcement databases with extended features. Technology: Matching Fingerprints Usage : fingerprint quality measure 5. SDIP05 Reversible Image Watermarking Using Interpolation Technique 2010 Description: A novel reversible watermarking scheme using an interpolation technique, which can embed a large amount of covert data into images with imperceptible modification. Technology: Interpolation Technique Usage :Higher Image Fidelity 6. SDIP06 Generic Lossless visible Watermarking 2010 Description: The new watermarking methosd is based on the use of deterministic one- to-one compound mappings of image pixel values. Technology:1-To-1 Compound Mappings Usage : Recover Image 7. SDIP07 Bridging The Semantic Gap Between Image Contents And Tags 2010 Description: A unified framework which stems from a two-level data fusions between the image contents and tags: 1) A unified graph is built and; 2) A novel random walk model is then proposed. Technology: Random Walk Model Usage : Image Annotation IEEE TRANSACTION ON: DISTRIBUTED NETWORKING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published year 1. SDNW01 An Authentication Code Against Pollution Attacks in Network 2011 Coding Description: Unconditionally secure authentication code for multicast network coding, where the trusted authority gives the key rights to the destinations and intermediate nodes. Technology: Secure Authentication Code Usage :Pollution Is Canceled 2. SDNW02 Network-Coding Multicast Networks With QoS Guarantees 2011 Description: Proposing a System where Each edge node admits not more than a specified amount of traffic; the network will never experience link congestion. Technology: Network Coding Usage : Multicast Network Fabsys Technologies Pvt.Ltd | 12Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 13. Skiveprojects 3. SDNW03 A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless 2011 Networks Description: TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling of transmissions within the TCP Congestion window. Technology: Rate-Based Scheduling Usage :Overcome deficiencies 4. SDNW04 On the Fair Coexistence of Loss-and Delay-Based TCP 2011 Description: A novel delay-based additive increase, multiplicative decrease (AIMD) congestion control algorithm which depends on a nonzero average queuing delay. Technology: Congestion Control Usage : Fair Coexistence Possible 5. SDNW05 Energy-Efficient Protocol for Cooperative Networks 2011 Description: Derive the upper bound of the capacity of the protocol, and it analyze the end-to-end robustness of the protocol to data-packet loss, along with the tradeoff between energy consumption and error rate. Technology: Cooperative Communication Usage : Congestion Control 6. SDNW06 DTRAB: Combating Against Attacks on Encrypted Protocols 2010 Through Traffic-Feature Analysis Description: An anomaly-based detection system by using strategically distributed monitoring stubs (MSs). The MSs, by sniffing the encrypted traffic, extract features for detecting these attacks. Technology: Anomaly-Based Detection Usage : Avoid False Alarms 7. SDNW07 Efficient and Dynamic Routing Topology Inference From End-to- 2010 End Measurements Description: A framework for designing topology inference algorithms based on additive metrics. The framework can flexibly fuse information from multiple measurements to achieve better estimation accuracy. Technology: Topology Inference Usage : Faster Convergence Rate 8. SDNW08 A Queuing Model for Evaluating the Transfer Latency of Peer-to- 2010 Peer Systems Description: A new Modeling Framework for the peers that accounts for the file size distribution, the search time, load distribution at peers, and number of concurrent downloads allowed by a peer. Technology: Framework For Peers Usage : Reduces Probing Overhead Fabsys Technologies Pvt.Ltd | 13Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 14. Skiveprojects 9. SDNW09 An Efficient and Adaptive Decentralized File Replication Algorithm 2010 in P2P File Sharing Systems Description: This paper presents an Efficient and adaptive decentralized file replication algorithm (EAD) that achieves high query efficiency and high replica utilization at a significantly low cost. Technology: EAD file replication Usage : Overloaded node reduction 10. SDNW10 Traceback of DDoS Attacks Using Entropy Variations 2010 Description: A novel trace back method for DDoS attacks during the process. The proposed strategy is memory non-intensive, efficiently scalable, robust against packet pollution. Technology: Entropy Variations Usage : Memory Non-Intensive 11. SDNW11 POPI: A User-Level Tool for Inferring Router Packet Forwarding 2010 Priority Description: An end-to-end approach for PFP inference and its associated tool, POPI. It enables users to discover such network policies through measurements of packet losses of different packet types. Technology: End-To-End Approach Usage : Packet forwarding priority 12. SDNW12 A Directory Service for Perspective Access Networks 2010 Description: A perspective access network (PAN) is a peer-to-peer overlay network that incorporates routing and directory services that allow network perspective-sharing and nonhierarchical organization. Technology: Directory Service For Networks Usage : Network Sharing 13. SDNW13 Web User-Session Inference by Means of Clustering Techniques 2010 Description: A novel methodology with clustering techniques to identify Web user- sessions without requiring an a priori definition of threshold values. Technology: Web Usage Mining Techniques Usage : User-Sessions 14. SDNW14 Mitigating Attacks on Open Functionality in SMS-Capable Cellular 2010 Networks Description: A combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Technology: Queue Management Usage: Mitigating messaging attacks. 15. SDNW15 Plexus-A scalable p2p Protocol enabling efficient subset search 2009 Description: Plexus, a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit-sequence (pattern) & discovering it using any subset of its 1-bits. Technology: Peer-To-Peer Search Usage : Discovery Of Information Fabsys Technologies Pvt.Ltd | 14Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 15. Skiveprojects 16. SDNW16 Incentive-Based Scheduling for Market-Like Computational Grids 2009 Description: An incentive-based scheduling scheme, which utilizes a peer-to-peer decentralized scheduling framework, a set of local heuristic algorithms, and three market instruments of job announcement, price, and competition degree. Technology: Heuristic Algorithms Usage : Fair Profit Allocation 17. SDNW17 Multiple Routing Configurations for Fast IP Network Recovery 2009 Description: MRC is strictly connectionless, and assumes only destination based hop- by-hop forwarding, keeps additional routing information in the routers, and allows packet forwarding to continue. Technology: Hop-By-Hop Forwarding Usage : Load Distribution 18. SDNW18 Distributed Computing For E-Learning 2010 Description: Applying Distributed Computing strategy in E-Learning Environment to make the learning process more interactive. Technology: Semantic Applications Usage: Centralized E-Learning IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SDP01 A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad 2011 hoc Networks Description: Cooperative Diversity MAC, which exploits the cooperative communication capability of the physical layer to improve robustness in wireless ad hoc networks. Technology: Partner Selection Usage : Mitigates Interference 2 SDP02 Collective Receiver-Initiated Multicast for Grid Applications 2011 Description: Present Robber, a collective, receiver-initiated, high-throughput multicast approach inspired by the Bit Torrent protocol to maximize the throughput between multiple cluster computers. Technology: High-Throughput Multicast Usage: Static Load Balancing 3 SDP03 Compressing Network Access Control Lists 2011 Description: ACL Compressor, a framework that can significantly reduce the number of rules in an access control list while maintaining the same semantics. Technology: Dynamic Programming Usage : Access Control Lists Fabsys Technologies Pvt.Ltd | 15Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 16. Skiveprojects 4 SDP04 A Distributed Algorithm for the Replica Placement Problem 2011 Description: A new Distributed Algorithm to Improve the efficiency of object replication within a given distributed replication group. Technology: Distributed Approximation Usage : Object Replication 5 SDP05 A Generic Framework for Three-Factor Authentication: Preserving 2011 Security and Privacy in Distributed Systems Description: A systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. Technology: 3-Factor Authentication Usage: Identity Of Remote Client 6 SDP06 TASA: Tag-Free Activity Sensing using RFID Tag Arrays 2011 Description: TASA For location sensing and frequent route detection. TASA can locate objects more accurately. Technology: Frequent Route Detection Usage : Location Sensing 7 SDP07 Flexible Robust Group key Agreement 2011 Description: A new robust group key agreement protocol (GKA) allows a set of players to establish a shared secret key, regardless of network/node failures. Technology: Group Key Agreement Usage: logarithmic-sized message 8 SDP08 Symmetric Key Approaches to Securing BGP-A Little Bit Trust is 2011 Enough Description: Key approach for Trade-off between efficiency and security by giving a little dose of trust to BGP routers. Technology: Central Key Distribution Usage : Signature VerificationDO YOU HAVE OWN CONCEPT!!! Come Let’s Discuss at Skiveprojects corporate office.What is your department!! Now, you can Select project based on your dept at skiveprojects.comNeed BASEPAPER or ABSTRACT ? Send a mail to skiveprojects@gmail.com Fabsys Technologies Pvt.Ltd | 16Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 17. SkiveprojectsJAVA IEEE TITLES IEEE TRANSACTION ON : DATAMINING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published Year SJDM01 Authenticated Multistep Nearest Neighbor Search 2011 1. Description: We propose a new technique multi-step NN Algorithm that reduces the size of each false hit. Moreover, we generalize our solution for a distributed setting, where the database is horizontally partitioned over several servers. Technology: Query Authentication Usage : Reduces Size Of False Hit 2. SJDM02 A Machine Learning Approach for Identifying Disease-Treatment 2011 Relations in Short Texts Description: In this we Describes a ML-based Technology for identifying and disseminating healthcare information. It extracts sentences from published medical papers that mention diseases and treatments in short text format. Technology: ML-based Technology Usage : Integrated Application 3 SJDM03 Automatic Discovery of Personal Name Aliases from the Web 2011 Description: We describes the method numerous baselines and previously proposed name alias extraction methods, achieving a statistically significant mean reciprocal rank (MRR) of 0.67. Technology: Mean Reciprocal Rank Usage: Information Retrieval 4 SJDM04 Design and Implementation of Enterprise Financing Decision Model 2011 Based on Data Mining Description: In proposed system we have response policy such as Conservative, Aggressive, and Fine grant and here we are going to implement hashed messaged authentication (HMAC) for secure process. Technology: Financing decision Usage: Heterogeneous data integration Fabsys Technologies Pvt.Ltd | 17Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 18. Skiveprojects 5 SJDM05 Enhancing the k-means clustering algorithm by using a O(n 2011 logn)heuristic method for finding better initial centroids. Description: This project proposes an improvement on the classic k-means algorithm to produce more accurate clusters. For that we comprises of a O(n logn) heuristic method, based on sorting and partitioning the input data, for finding the centroids . Technology: Enhanced k-meansAlgorithm Usage : Accurate Clusters 6 SJDM06 Clustering with Multi-Viewpoint based Similarity Measure 2011 Description: Two criterion functions for document clustering are proposed based on this new measure. We compare them with several well-known similarity and dissimilarity with dataset from this we are Getting accurate cluster. Technology: Text mining Usage : Informative Assessment 7 SJDM07 Publishing Search Logs – A Comparative Study of Privacy Guarantees 2011 Description: We propose a k-anonymity in search log publishing. comparable utility to k−anonymity while at the same time it achieving much stronger privacy guarantee Technology: Security, integrity, and protection Usage : Probabilistic Privacy 8 SJDM08 Bin Rank: Scaling Dynamic Authority-Based Search Using 2011 Materialized Sub graphs Description: we shows Dynamic authority-based keyword search algorithms, such as Object Rank and personalized Page Rank, link information to provide high quality, high recall search in databases, and the Web. Technology: Object Rank Usage: High Quality Search Results 9 SJDM09 Asking Generalized Queries to Domain Experts to Improve Learning 2011 Description: we propose a novel active learning algorithm that asks good generalized queries. It improves the knowledge of domain experts. Technology: Generalized query Usage: Good Generalized Queries 10 SJDM10 Constrained Skyline Query Processing against Distributed Data Sites 2011 Description: We first propose a partition algorithm that divides all data sites into incomparable groups. We also implement multi filtering technique to improve the skyline query processes. Technology: Filtering Point Usage: Parallel Skyline Query Processing 11 SJDM11 Managing Multidimensional Historical Aggregate Data in 2011 Unstructured P2P Networks Description: In this project historical multidimensional data aggregates and supported by P2P-based framework which provides efficient and robust query evaluation. Technology: Data compression Usage : Extraction of Aggregates Fabsys Technologies Pvt.Ltd | 18Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 19. Skiveprojects 12 SJDM12 Knowledge-Based Interactive Post mining of Association Rules Using 2011 Ontologies Description: This paper proposes a prune and filter discovered rules. And it describes ontologies to improve the integration of user knowledge in the post processing. Technology: Data exploration and discovery Usage : Prune And Filter Rule 13 SJDM13 C-Trend : Temporal Cluster Graphs for Identifying and Visualizing 2011 Description: This paper introduces Cluster-based Temporal Representation of Event Data (C-TREND), that system implements dendogram algorithm for sorting. It takes very less time for sorting. Technology: Temporal Data Mining Usage : Discover Patterns IEEE TRANSACTION ON : NETWORK SECURITY Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SJNS01 Flexible Robust Group Key Agreement 2011 Description: We propose a novel 2-round group key agreement protocol .We show that the new protocol implies a fully-robust group key agreement with logarithmic-sized messages and expected round complexity close to 2 and finding random node faults. Technology: fault-tolerance Usage: Logarithmic-Sized Messages 2 SJNS02 Replica Placement for Route Diversity in Tree-Based Routing 2011 Distributed Hash Tables Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route diversity for these DHTs. Using this We prove that this placement creates disjoint routes and find the replication degree necessary to produce a desired number of disjoint routes. Technology: Route Diversity Usage: Response Time Reduced 3 SJNS03 Design and Implementation of an Intrusion Response System for 2011 Relational Databases Description: we propose Joint Threshold Administration Model that efficiently searches the policy database for policies that match an anomalous request. This is used to overcoming the policy matching problem. Technology: Threshold signatures Usage: Specify Appropriate Response Fabsys Technologies Pvt.Ltd | 19Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 20. Skiveprojects 4 SJNS04 A Puzzle-Based Defense Strategy Against Flooding Attacks Using 2010 Game Theory Description: It describes the game theory to propose a series of optimal puzzle-based strategies for handling increasingly sophisticated flooding attack. Technology: Client-Puzzle Approach Usage : Handling Distributed Attacks 5 SJNS05 Layered Approach Using Conditional Random Fields for Intrusion 2010 Detection Description: We propose high attack detection accuracy that can be achieved by using Conditional Random Fields and high efficiency it show that our system is robust and is able to handle noisy data without compromising performance Technology: Decision trees Usage: Detect Malicious Activities 6 SJNS06 An Identity-Based Security System for User Privacy in Vehicular Ad 2010 Hoc Networks Description: We propose a privacy-preserving defense technique For network authorities to handle misbehavior in VANET access and it challenge that privacy provides avenue for misbehavior. Technology: Identity-Based Cryptography Usage: Privacy And Traceability IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SJP01 Joint Optimization of Complexity and Overhead for the Routing in 2011 Hierarchical Networks Description: We show that area-based link-vector algorithm (ALVA) which is used to analyze the routing complexity and the routing table size in the hierarchical network. Technology: Area-Based Link-Vector Usage: Find Best Routing Policy 2 SJP02 Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems(S) 2011 Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a sequential probability ratio test in Unstructured Peer-to-Peer Systems for finding anomaly intruder. Technology: Mutual Anonymity Usage: Achieving Anonymity Fabsys Technologies Pvt.Ltd | 20Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 21. Skiveprojects 3 SJP03 Cooperative Channelization in Wireless Networks with Network 2011 Coding Description: We propose cooperative channelization technique, this is used to find which portions of the transmission media are allocated to links which are congested at the point and where network coding cannot efficiently repair loss. Technology: Resource Reservation Usage: Reduce No of Transmissions 4 SJP04 Load Balance with Imperfect Information in Structured Peer-to- 2011 Peer Systems Description: We propose a novel load balancing algorithm it is used to estimate the probability distributions of the capacities of peers and the loads of virtual servers. Technology: Virtual Server Usage : Probability Distributions IEEE TRANSACTION ON: DISTRIBUTED NETWORKING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SJNW01 Energy-Efficient Protocol for Cooperative Networks 2011 Description: We propose a cooperative communication protocol, which is used to controlling traffic, and delay process. And we analyzed the robustness of the protocol to data packet loss. Technology: cooperative communication protocol Usage : Congestion Control 2 SJNW02 Parametric Methods for Anomaly Detection in Aggregate Traffic 2011 Description: We introduce the bi-variate Parametric Detection Mechanism (bPDM), which can detect anomalies and low-rate attacks in a few seconds. Technology: Bi-variate Parametric Detection Usage: Detect Network Anomalies 3 SJNW03 Self-Reconfigurable Wireless Mesh Networks 2011 Description: This paper presented an autonomous network reconfiguration system (ARS) that enables a multi-radio WMN to autonomously recover from wireless link failures. Technology: Cooperatively reconfiguration Usage: Preserve Network Performance Fabsys Technologies Pvt.Ltd | 21Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 22. Skiveprojects 4 SJNW04 Rumor Riding: Anonymzing Unstructured Peer-to-Peer Systems 2011 Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a sequential probability ratio test for finding anomaly intruder. Technology: Mutual Anonymity Usage : To Achieve Anonymity 5 SJNW05 Joint Optimization of Complexity and Overhead for the Routing in 2011 Hierarchical Networks Description: We show that area-based link-vector algorithm (ALVA) which is used is to analyze the routing complexity and the routing table size in the hierarchical network. Technology: Area-based link-vector Usage: Find Best Routing Policy 6 SJNW06 Cooperative Channelization in Wireless Networks with Network 2011 Coding Description: We propose cooperative channelization, this is used to find which portions of the transmission media are allocated to links and which are congested at the point and where network coding cannot efficiently repair loss. Technology: Resource Reservation Usage : Reduce No of Transmissions 7 SJNW07 Load Balance with Imperfect Information in Structured Peer-to- 2011 Peer Systems Description: We propose a novel load balancing algorithm it is used to estimate the probability distributions of the capacities of peers and the loads of virtual servers Technology: Virtual Server Usage : Load-Balancing 8 SJNW08 Path Diversity Over Packet Switched Networks: Performance 2010 Analysis and Rate Allocation Description: In this paper, Forward Error Correction (FEC) is applied across multiple independent paths to enhance the end-to-end reliability. We prove that the probability of irrecoverable loss (PE) decays exponentially with the number of paths. Technology: Gilbert-Elliot channels Usage : End-To-End Reliability 9 SJNW09 Normalized queuing delay: congestion control jointly utilizing delay 2010 and marking Description: In this paper, we consider the design of a congestion control scheme and the concept of normalized queuing delay. Which is used to reduces the bottleneck problem. And controlling traffic congestion Technology: Network Calculus Usage : Congestion Measure Fabsys Technologies Pvt.Ltd | 22Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 23. Skiveprojects 10 SJNW10 Multiple Routing Configurations For Fast IP Network Recovery 2009 Description: we present a new recovery scheme called MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alter native output link immediately after the detection of a failure. Technology: Hop-by-Hop Forwarding Usage: Handle Link And Node Failures 11 SJNW11 Differentiated bandwidth allocation with TCP protection in core 2009 routers Description: We present an Active Queue Management (AQM) scheme. which draws a packet at random from the buffer, compares it with the arriving packet, and drops both if they are from the same flow. Technology: Active Queue Management (AQM) Usage : Flows In Same Priority 12 SJNW12 Node Isolation Model And Age-Based Neighbor Selection In 2009 Unstructured P2p Networks Description: we show that two age-biased neighbor-selection strategies, which dramatically reduces the probability of user isolation and graph partitioning compared with uniform selection of neighbors. Technology: Node isolation model Usage: Reduce Probability Of User Isolation 13 SJNW13 A Traffic Engineering Approach For Placement And Selection Of 2009 Network Services Description: We propose service placement problem which is used finding the best location for each service gateway, and selecting the best service gateway for each flow. Technology: Service gateway placement Usage : Minimize Traffic Flow 14 SJNW14 Dynamic Routing With Security Consideration 2009 Description: We proposing a dynamic routing algorithm such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks that could randomize delivery paths for data transmission. Technology: Security-enhanced data transmission Usage: Defeat Various Threats 15 SJNW15 Colored Tree 2009 Description: We show through extensive simulations that the average length of the disjoint paths obtained using the SimCT algorithm is lesser compared to the previously known techniques. Technology: SimCT algorithm Usage: Minimize Cost Of Routing  You Can Register project free at skiveprojects.com Technical Assistance any time @ 9176990090 Fabsys Technologies Pvt.Ltd | 23Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 24. Skiveprojects IEEE TRANSACTION ON: IMAGE PROCESSING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published year 1 SJIP01 Graph Cuts for Curvature Based Image Denoising Description: we will present an efficient minimization algorithm based on graph cuts 2011 for minimizing the energy in the Euler’s elastic model which is used to minimizing the staircase effects. Technology: Binary MRF models Usage :Image Denoising 2. SJIP02 Image Denoising in Mixed Poisson–Gaussian Noise Description: We propose a general Technology (PURE-LET) to design and optimize a 2011 wide class of transform domain thresholding algorithms for denoising images corrupted by mixed Poisson-Gaussian noise. Technology: Linear expansion of thresholds Usage : Image Denoising 3 SJIP03 Practical Bounds on Image Denoising: From Estimation to Information Description: We show that the, cluster co variances and level of redundancy for 2011 patches in the image, can be estimated directly from the noise corrupted image. Technology: Shannon entropy Usage : Noise-Free Image 4 SJIP04 From Tiger to Panda: Animal Head Detection 2011 Description: we proposed two detection algorithms, namely Brute force detection and Deformable detection for capture the shape and texture features on animal head. Technology: Fusion Usage: Animal Head Detection 5 SJIP05 On High-Order Denoising Models and Fast Algorithms for Vector- Valued Images Description: we introduce three high-order and curvature-based model and a fast multi 2010 grid algorithm which proves image denosing calculation. And removes staircase effects. Technology: partial differential equations(PDEs) Usage :Vector Denoising 6 SJIP06 A Perceptually Relevant Approach to Ringing Region Detection Description: The proposed ringing regions detection method which is used to show 2010 the ringing regions resulting images in psycho visual experiment Technology: Luminance masking Usage : Automatic Detection Fabsys Technologies Pvt.Ltd | 24Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 25. Skiveprojects NETWORK SIMULATOR (NS2) TITLES IEEE TRANSACTION ON: NS2 - NETWORK SIMULATOR Domain: NS2 S.NO CODE PROJECT TITLES Published year 1. S11NS01 Secure Trust Management Model for Peer-to-Peer File Sharing System 2011 2. S11NS02 Channel-Aware Routing in MANETs With Route Handoff 2011 3. S11NS03 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2011 4. S11NS04 ConverSS: A Hybrid MAC/Routing Solution for Small-Scale, 2011 Convergecast Wireless Networks 5. S11NS05 Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks 2011 Using SVM and FDA 6. S11NS06 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011 Networks 7. S11NS07 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2010 Networks 8. S11NS08 Trust Management in Mobile Ad Hoc Networks Using a Scalable 2010 Maturity-Based Model 9. S11NS09 Channel Assignment for Multihop Cellular Networks: Minimum Delay 2010  Training provided by experienced IT Professionals.  Own Concepts can be developed in NS2 Fabsys Technologies Pvt.Ltd | 25Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 26. Skiveprojects APPLICATION PROJECT TITLES Web and Windows Application: DOT NET REALTIME APPLICATION PROJECT TITLES S.No CODE PROJECT TITLES LANGUAGE 1 SDAP01 An Intelligent tutoring system with web enhanced training Dotnet assessments 2 SDAP02 Role Engineering via role based access control Dotnet 3 SDAP03 A Relation-Based Page Ranking in Web Search Engines Dotnet 4 SDAP04 Database Enterprise Manager Dotnet 5 SDAP05 Online Bug tracking System Dotnet 6 SDAP06 Trace back of DoS Attacks using Entropy Variations Dotnet 7 SDAP07 A new steganographic method based on information sharing via Dotnet PNG images 8 SDAP08 Step Construction of Visual Cryptography Schemes (VCS) Dotnet 9 SDAP09 Efficient Compression of Encrypted Grayscale Images Dotnet 10 SDAP10 Latent Fingerprint Matching Dotnet 11 SDAP11 Online Data leakage detection Dotnet 12 SDAP12 Online Buying and Selling System. Dotnet 13 SDAP13 Secure Mobile health care for rural with electronic alerts Dotnet 14 SDAP14 Southern Railway Recruitment Portal Dotnet 15 SDAP15 Web-based Recruitment Process System for the HR group for a Dotnet company 16 SDAP16 Fast firewall implementations for software and hardware-based Dotnet routers Fabsys Technologies Pvt.Ltd | 26Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 27. Skiveprojects 17 SDAP17 File Replication Detection Algorithm in P2P File Sharing Systems Dotnet 18 SDAP18 Dynamic Routing Topology with Security Consideration Dotnet/Java 19 SDAP19 Incentive-Based Scheduling for Market-Like Computational Grids Dotnet 20 SDAP20 Approximate query processing in peer to peer networks Dotnet 21 SDAP21 XML Based Ranking and Keyword Search Dotnet 22 SDAP22 Secured Data Object Replication in data grid Dotnet 23 SDAP23 Medical Anonymity Processing And Publishing Dotnet 24 SDAP24 Object Tracking System Dotnet 25 SDAP25 Secure Data Transformation System Dotnet 26 SDAP26 Effective blogger with XML interchange Dotnet 27 SDAP27 Alert based monitoring and scheduling on Proportional shares Dotnet 28 SDAP28 Exact Knowledge hiding for automobiles industry Dotnet 29 SDAP29 Efficient Property Interpreter Dotnet 30 SDAP30 Blind Banking Transformation System Dotnet 31 SDAP31 Security and Privacy for Social Networks. Dotnet 32 SDAP32 Still to animation movie creation Dotnet 33 SDAP33 Medical anonymity processing and publishing Dotnet 34 SDAP34 Global roaming and target tracking in mobile sensor network Dotnet 35 SDAP35 Development Of A Campaign Information System Dotnet 36 SDAP36 Perspective Access Management Dotnet 37 SDAP37 Email Proxy Server with Secure Service Dotnet 38 SDAP38 Online Bus Ticket Booking Dotnet 39 SDAP39 Dotnet Customer Relationship Management Fabsys Technologies Pvt.Ltd | 27Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 28. SkiveprojectsAPPLICATION PROJECT TITLESWeb and Windows Application: JAVA REALTIME APPLICATION PROJECT TITLES DOMAIN: JAVA S.NO CODE PROJECT TITLES DOMAIN 1 SJAP Normalized queuing delay: congestion control jointly utilizing Java delay and marking 2 SJAP Distributed Algorithm for Minimum path Java 3 SJAP Path Diversity for packets Java 4 SJAP Node isolation model and age-based neighbor selection in Java unstructured p2p networks 5 SJAP An Identity-Based Security System for User Privacy in Vehicular Java Ad Hoc Networks 6 SJAP Layered Approach Using Conditional Random Fields for Intrusion Java Detection. 7 SJAP A Puzzle based defense strategy against flooding attacks using Java game theory 8 SJAP Adaptive Join Operators for Result Rate Optimization on Java Streaming Inputs 9 SJAP Bin Rank: Scaling Dynamic Authority-Based Search Using Java Materialized Sub graphs Fabsys Technologies Pvt.Ltd | 28Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 29. Skiveprojects 10 SJAP NNexus: An automatic linker for collaborative web based corpora Java 11 SJAP SSUM: Smart Server Update Mechanism for Maintaining Cache Java Consistency in Mobile Environments 12 SJAP CAR: context aware adaptive routing for delay tolerant mobile Java networks 13 SJAP Generic Loss Less Watermarking Java 14 SJAP Unseen Visible Water Marking Java 15 SJAP Colored tree Java 16 SJAP QKDP: Provably secured third party authenticated quantum key Java distribution protocol 17 SJAP Controlling IP spoofing through inter-domain packet filters Java 18 SJAP A service centric multicast architecture and routing protocol Java 19 SJAP Enhancing search performance in unstructured p2p networks Java based on users’ common interest 20 SJAP Two Techniques for Fast computation of constrained shortest path JavaFor Application Project Description, visit Skiveprojects.com!!Get free Project Explanation @ 9176990090, 044-42712737 Fabsys Technologies Pvt.Ltd | 29Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 30. Skiveprojects FLASH AND ANIMATION TITLES REALTIME FLASH & ANIMATION TITLES DOMAIN: FLASH AND ANIMATION S.NO CODE PROJECT TITLES 1. SFLA01 Revealing multiple photos with a Grid Effect Animation 2. SFLA02 Create a 360° panorama viewer with AS3 3. SFLA03 Efficient Animation handling methodology in ActionScript 4. SFLA04 Loading multiple XML data in Flash using ActionScript 5. SFLA05 New Interactive learning environment in flash 6. SFLA06 Multiple Movie clips usage in flash demonstration 7. SFLA07 ActionScript for exploring real time environment 8. SFLA08 Inventory Management System with ActionScript 9. SFLA09 Novel E-learning process with ActionScript 10. SFLA10 Flash Animation with XML Horizontal Accordion 11. SFLA11 Image Appearance Effect in flash 12. SFLA12 A flash method to reveal hidden photos using Mouse movement strategy 13. SFLA13 Making interactive flash games using ActionScript 14. SFLA14 Database management in flash with key features 15. SFLA15 A Random Animated Color Text Effect using Action Script Fabsys Technologies Pvt.Ltd | 30Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 31. SkiveprojectsEMBEDDED IEEE PROJECT TITLES TOPICS BASED ON IEEE 2011- EMBEDDED SYSTEM S.NO CODE PROJECT TITLES 1. SEI1101 A wearable device for recording of bio potentials and body movements. 2. SEI1102 Research on the Integrated Management of Highway Based on Radio Frequency Identification Technology. 3. SEI1103 Design and Implementation of a n Embedded Home Surveillance System with Ultra-Low Alert Power. 4. SEI1104 Next Smart Sensors Generation. 5. SEI1105 Radio Frequency-based Body Temperature and Walking Steps Monitor of Dairy Cow. 6. SEI1106 Wireless Sensor Network for Precise Agriculture Monitoring. 7. SEI1107 A Virtual Control System for Automotive and Railway Industries. 8. SEI1108 Research on Auto monitoring System for cold storage temperature based on VB. 9. SEI1109 Research on water-saving irrigation automatic control system based on Internet. 10. SEI1110 Intelligent Sensor with Data Fusion to Improve the Care and Management of Water. 11. SEI1111 Implementation of CAN bus in an autonomous All-Terrain Vehicle. 12. SEI1112 Remote Control of Robot Arm with five DOF. 13. SEI1113 Anti-Theft Tracking System for Automobiles. 14. SEI1114 Capacity Value of Wind Power, Calculation, and Data Requirements: the Irish Power System Case. 15. SEI1115 PIC18LF4620 Based Customizable Wireless Sensor Node to Detect Hazardous Gas Pipeline Leakage. 16. SEI1116 A Self-acting Water Pump Control System for Residential Buildings Based on Resonance Water Level Sensor. Fabsys Technologies Pvt.Ltd | 31Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 32. Skiveprojects 17. SEI1117 Wireless Integrated Robots for Effective Search and Guidance of Rescue Teams. 18. SEI1118 An Obstacle Signaling System For The Blind. 19. SEI1119 A Low-cost Embedded Web-Server for an Institutional e-Learning Strategy. 20. SEI1120 Hardware Design of River Flow Velocity Monitoring System. TOPICS BASED ON IEEE 2010- EMBEDDED SYSTEM S.NO CODE PROJECT TITLES 1. SEI1001 Design of remote data monitoring and recording system based on arm 2. SEI1002 Design and implementation of remote meter reading system 3. SEI1003 Construction of intelligent greenhouse control system based on can bus 4. SEI1004 Development of remote waste gas monitor system 5. SEI1005 Electronic toll collection system based on global positioning system technology 6. SEI1006 The system of wireless smart house based on gsm and zigbee 7. SEI1007 Developing a voice control system for zigbee-based home automation networks 8. SEI1008 A kind of design schema of wireless smart water meter reading system based on zigbee technology 9. SEI1009 Cellular phone based biomedical system for health care 10. SEI1010 Smart parking reservation system using short message services (sms)Yeah!! Get explanation for Embedded Projects @ Skiveprojects. Contact: 9176990090  Own Concepts can be done!! Fabsys Technologies Pvt.Ltd | 32Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 33. SkiveprojectsEMBEDDED NON IEEE TITLES EMBEDDED NON IEEE TITLES DOMAIN: EMBEDDED SYSTEM S.NO CODE PROJECT TITLES 1. SENI1101 Zigbee Based Secured Communication with RSA Encryption 2. SENI1102 Zigbee based speed control of AC/Induction motor 3. SENI1103 Zigbee based power plant monitoring System 4. SENI1104 Password enabled GSM Based Mobile switching 5. SENI1105 Industrial Power Monitoring and Intimation through GSM 6. SENI1106 Data Acquisition System With GSM Modem 7. SENI1107 Gas detection Robot 8. SENI1108 Automatic cleaning Robot 9. SENI1109 Automated Environment Monitoring Robot 10. SENI1110 Programmable RTC based street light controller 11. SENI1111 Automatic Room light controller with visitor counter 12. SENI1112 Rechargeable Prepaid Energy Billing System 13. SENI1113 Plant Humidity Monitoring for Textile Industries 14. SENI1114 Car Air conditioner control using temperature sensor 15. SENI1115 Industrial monitoring System for Textile industry. Fabsys Technologies Pvt.Ltd | 33Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 34. Skiveprojects 16. SENI1116 Multi Parameter and control using GSM 17. SENI1117 Heart beat analyzer and intimation through SMS. 18. SENI1118 Schedule follower system for truck transportation using GPS 19. SENI1120 Measurement System for Green House 20. SENI1121 Multi channel Fire monitor with alarm 21. SENI1122 Online temperature monitoring 22. SENI1123 PWM based DC motor speed controller 23. SENI1124 I2C based Power plant monitoring System 24. SENI1125 I2C based environmental monitoring System 25. SENI1126 CAN based Encrypted communication System 26. SENI1127 RFID based tollgate billing system 27. SENI1128 SMS content printer 28. SENI1129 Energy meter billing system 29. SENI1130 Bus Ticket printing SystemOwn Concepts in Embedded Systems!! Contact: Skiveprojects@gmail.comPost Own Concept in Skiveprojects.com & Get Assistance Now!!!Technical Appointment @ 9176990090 Fabsys Technologies Pvt.Ltd | 34Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 35. SkiveprojectsMATLAB IEEE TITLES IEEE TRANSACTION ON COMMUNICATION DOMAIN: MATLAB S.NO CODE PROJECT TITLES Published Year 1. SMCO1 A novel algorithm of seeking FRFT order for speech processing 2011 2. SMCO2 An Energy-Efficient Communication Scheme for Wireless Networks: A 2011 Redundant Radix-Based Approach 3. SMCO3 Defects Detection of Cold-roll Steel Surface Based on MATLAB 2011 4. SMCO4 Equal Gain Transmission with Antenna Selection in MIMO 2011 Communications 5. SMCO5 Image Deblurring and Super-Resolution by Adaptive Sparse Domain 2011 Selection and Adaptive Regularization 6. SMCO6 List-Based Group-Wise Symbol Detection for Multiple Signal 2011 Communications 7. SMCO7 Opportunistic Relaying for MIMO Wireless Communication: 2011 Relay Selection and Capacity Scaling Laws 8. SMCO8 Performance Analysis of Two-Way Relaying with Non-Coherent 2011 Differential Modulation 9. SMCO9 Unified Error-Rate Analysis of OFDM over Time-Varying Channels 2011 10. SMCO10 Whisper-Island Detection Based on Unsupervised Segmentation With 2011 Entropy-Based Speech Feature ProcessingFor more MATLAB Projects, visit Skiveprojects.com Fabsys Technologies Pvt.Ltd | 35Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software
  • 36. Skiveprojects IEEE TRANSACTION ON IMAGEPROCESSING DOMAIN: MATLAB S.NO CODE PROJECT TITLES 1. SMIP01 Prostate Cancer Localization With Multispectral MRI Using Cost-Sensitive Support Vector Machines and Conditional Random Fields 2. SMIP02 Morphological decomposition of 2-D binary shapes into modestly overlapped disk components 3. SMIP03 Tricolor Attenuation Model for Shadow Detection 4. SMIP04 Visual-Context Boosting for Eye Detection 5. SMIP05 Automatic Plant Leaf Classification for a Mobile Field Guide 6. SMIP06 Teeth Segmentation in Digitized Dental X-Ray Films Using Mathematical Morphology 7. SMIP07 A new method of vehicle license plate location under complex scenes 8. SMIP08 Automated Algorithm for Iris Detection and Code GenerationVLSI IEEE TITLES IEEE TRANSACTION ON VLSI Domain: VLSI S.NO CODE PROJECT TITLES Year 1. SVL01 Design of a Low Power Viterbi Decoder for Wireless Communication 2011 2. SVL02 New Approach to Look-Up-Table Design and Memory-Based 2011 Realization of FIR Digital Filter 3. SVL03 Software-Defined Radio for OFDM Transceivers 2011 4. SVL04 Self-Test Techniques for Crypto-Devices 2011 5. SVL05 Enhanced scaling-Free Cordic 2011 Fabsys Technologies Pvt.Ltd | 36Training Office:#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.comIEEE Projects –Software

×