Gagner
Technologies
MCA/M.SC Projects 2013

SMS: “Project” / Call: 9962221452
MCA projects, M.Sc projects, Final Year Projects in Chennai, Real time
projects, Application projects, Live projects, JAVA projects, .NET projects.
Final Year Projects for MCA, M SC (IT), BCA, BSC (CSE/IT), BE (CSE, IT).
We also provide projects @ reasonable cost including Personality
Development Training (Free of cost) & Placement Assistance (Free of Cost) at
Gagner Technologies

Mobile Apps (Android):
Our Mobile Application Development is the process by which application software
is developed for small low-power handheld devices such as personal digital
assistants, enterprise digital assistants or mobile phones. Gagner Applications are
either pre-installed on phones during manufacture, or downloaded by customers
from various mobile software distribution platforms.
Android IOS and Windows Mobile support typical application binaries as
found on personal computers with code which executes in the native machine format
of the processor (the ARM architecture is a dominant design used on many current
models).Mobile applications debugging on a PC without a processor emulator, and
also supports the Portable Executable (PE) format associated with the .NET
Framework. Windows Mobile and iOS offer free SDKs and integrated development
environments to developers. Machine language executables offer considerable
performance advantages over Java.
IEEE 2013 Projects
DOTNET
DATA MINING
GD001
GD002
GD003

A Novel profit Maximizing Metric for measuring classification
performance of customer churn Prediction Models
Annotating search results from Web databases

GD009

Building a Scalable Database-Driven Reverse Dictionary
Discovering Temporal Change Patterns in the Presence of
Taxonomies
Efficient and Effective Duplicate Detection in Hierarchical Data
Extending BCDM to Cope with Proposals and Evaluations of
Updates)
Failure-Aware Cascaded Suppression in Wireless Sensor Networks
Information-Theoretic Outlier Detection for Large-Scale
Categorical Data
PMSE: A Personalized Mobile Search Engine

GD010

Genetic Programming Approach to Record duplication

GD011

A Query Formulation Language for the Data web

GD012

Outsourced Similarity Search on Metric Data Assets
Efficient Iceberg Query Evaluation Using Compressed Bitmap
Index

GD004
GD005
GD006
GD007
GD008

GD013
GD014
GD015

TSCAN: A Content Anatomy Approach to Temporal Topic
Summarization
Visual Role Mining:A Picture Is Worth a Thousand Roles
CLOUD COMPUTING

GD021
GD022
GD023

Security and Privacy-Enhancing Multi cloud Architectures
Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In
The Cloud
GD024

GD025

Toward Secure Multi key word Top-k Retrieval over Encrypted
Cloud Data
A Hierarchical Approach for the Resource Management of Very
Large Cloud

GD026

Platforms
Ensuring Distributed responsibility For Data distribution in the
Cloud

GD027

Active Resource Distribution Using Implicit Mechanism in Cloud
Computing Environment

DISTRIBUTED SYSTEM
GD041
GD042
GD044
GD045
GD046
GD047
GD048
GD049
GD050
GD051
GD052
GD053
GD054

Aging-aware energy-efficient workload allocation for mobile
multimedia platforms
Attached-RTS: Eliminating an exposed terminal problem in
wireless networks
Efficient computation of robust average of compressive sensing
data in wireless sensor networks in the presence of sensor faults
ESWC: efficient scheduling for the mobile sink in wireless sensor
networks with delay constraint
High-accuracy TDOA-based localization without time
synchronization
Hint-Based Execution Of Workloads In Clouds With Nefeli
Intelligent Sensor Placement For Hot Server Detection In Data
Centers
ITA: Innocuous Topology Awareness For Unstructured P2p
Networks
A new hierarchical packet classification algorithm for Networking
Concept
Grouping-Enhanced Resilient Probabilistic En-Route Filtering of
Injected False Data in WSNs
The Three-Tier Security Scheme in Wireless Sensor Networks with
Mobile Sinks
A Secure Erasure Code -Based Cloud Storage System with Secure
Data Forwarding
Balancing the Trade-Offs between Query Delay and Data
Availability in MANETs
GD055

A Voice-Input Voice-Output Communication Assists In Favor Of
People With Harsh Verbal Communication Destruction

MOBILE COMPUTING
GD061
GD062
GD063
GD064
GD065
GD066
GD067
GD068

Network-Assisted Mobile Computing With Optimal Uplink Query
Processing
ALERT: An Anonymous Location-Based Efficient Routing Protocol In
Manets
Toward Accurate Mobile Sensor Network Localization In Noisy
Environments
On The Forwarding Performance Under Heterogeneous Contact
Dynamics In Mobile Opportunistic Networks
Predictable Mobile Routing For Spacecraft Networks
Design And Analysis Of Adaptive Receiver Transmission Protocols
For Receiver Blocking Problem In Wireless Ad Hoc Networks
Enhanced Least-Squares Positioning Algorithm For Indoor Position

GD070

Game-Based Broadcast Over Reliable And Unreliable Wireless Links
In Wireless Multihop Networks
Understanding The Scheduling Performance In Wireless Networks
With Successive Interference Cancellation
Topological Persistence For Medium Access Control

GD071

Reducing Signaling Overhead For Femtocell/Macrocell Networks

GD072

Adaptive Duty Cycle Control With Queue Management In Wireless
Sensor Networks
Secure and Efficient Handover Authentication Based on Bilinear
Pairing Functions
Senseless :A Database Driven White Space Network

GD069

GD073
GD074
GD075

Efficient Rendezvous Algorithms for Mobility-Enabled Wireless
Sensor Networks

GD076

Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
NETWORKING
GD091 Randomized Information Dissemination In Dynamic Environments
GD092 An Efficient And Robust Addressing Protocol For Node Auto
Configuration In Ad Hoc Networks
GD093 Fine-Grained Channel Access In Wireless LAN
GD094 QFQ: Efficient Packet Scheduling With Tight Guarantees
GD095 An Efficient And Fair Mac Protocol Robust To Reactive Interference
GD096 A Formal Data-Centric Approach For Passive Testing Of
Communication Protocols
GD097 Spreader Classification Based On Optimal Dynamic Bit Sharing
GD098 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
GD099 An Adaptive System Based On Roadmap Profiling To Enhance
Warning Message Dissemination In Vanets
GD100 Duty-Cycle-Aware Minimum-Energy Multicasting In Wireless
Sensor Networks
ICTCP: Incast Congestion Control For TCP In Data-Center Networks
GD101
GD102 Moment-Based Spectral Analysis Of Large-Scale Networks Using
Local Structural Information
GD103 Time-Bounded Essential Localization For Wireless Sensor Networks
GD104 Mobility Increases The Connectivity Of Wireless Networks
GD105 Topology Control For Effective Interference Cancellation In
Multiuser MIMO Networks
GD106 Latency Equalization as a New Network Service Primitive
GD107 Privacy- and Integrity-Preserving Range Queriesin Sensor Networks
NETWORK SECURITY
GD121
GD122
GD123
GD124
GD125
GD126

GD127

Entrusting Private Computation And Data To Untrusted Networks
NICE: Network Intrusion Detection And Countermeasure Selection
In Virtual Network
DNS For Massive-Scale Command And Control
Warningbird:A Near Real-Time Detection System For Suspicious
Urls In Twitter Stream
A System For Timely And Controlled Information Sharing In
Emergency Situations
Detecting Automation of Twitter Accounts:Are You a Human, Bot,
or Cyborg?
Malware Clearance for Secure Commitment of OS-Level Virtual
Machines
SOFTWARE ENGINEERING

GD141
GD142
GD143
GD144
GD145
GD146
GD147
GD148

A Decentralized Self-Adaptation Mechanism For Service-Based
Applications In The Cloud
A Large-Scale Empirical Study Of Just-In-Time Quality Assurance
A Machine Learning Approach To Software Requirements
Prioritization
Abstracting Runtime Heaps For Program Understanding
Coverage Estimation In Model Checking With Bitstate Hashing
Edzl Schedulability Analysis In Real-Time Multicore Scheduling
Event Logs For The Analysis Of Software Failures A Rule-Based
Approach
Local Versus Global Lessons For Defect Prediction And Effort
Estimation
IEEE 2013 Projects
JAVA
DATA MINING
GJ001

Optimal Route Queries with Arbitrary Order Constraints

GJ002

Protecting Sensitive Labels in Social Network Data Anonymization

GJ003

Successive Group Selection for Microaggregation

GJ004

Transductive Multilabel Learning via Label Set Propagation
Single-Database Private Information Retrieval from Fully
Homomorphic Encryption
Efficient Evaluation of SUM Queries over Probabilistic Data

GJ005
GJ006
GJ007
GJ008
GJ009
GJ010
GJ011
GJ012
GJ013

Multiview Partioning Via Tensor Methods
On the Spectral Characterization and Scalable Mining of Network
Communities
Incremental Information Extraction Using Relational Databases
Mining Web Graphs for Recommendations
Extending Attribute Information for Small Data Set Classification
Anomaly Detection for Discrete Sequences A Survey
Mining Social Emotions from Affective Text

CLOUD COMPUTING
GJ021
GJ022
GJ023
GJ024

Security and Privacy-Enhancing Multi cloud Architectures
Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In
The Cloud
Toward Secure Multi key word Top-k Retrieval over Encrypted
Cloud Data

GJ025

A Hierarchical Approach for the Resource Management of Very
Large Cloud

GJ026

Platforms
Ensuring Distributed responsibility For Data distribution in the
Cloud

GJ027

Cloud Computing Security: From Single To Multi-Clouds
Decentralized Access Control With Anonymous Authentication of

GJ028

Data Stored in Clouds

DISTRIBUTED SYSTEM

GJ041
GJ042
GJ043
GJ044
GJ045
GJ046
GJ047
GJ048
GJ049
GJ050
GJ051

GJ052

Link Scheduling For Exploiting Spatial Reuse In Multihop Mimo
Networks
Modeling Propagation Dynamics Of Social Network Worms
Per-Flow Queue Management With Succinct Priority Indexing
Structures For High Speed Packet Scheduling
A Secure Erasure Code-Based Cloud Storage System with
Secure Data Forwarding
Scalable Hyper Grid K-Nn-Based Online Anomaly Detection In
Wireless Sensor Networks
Self-Adaptive Contention Aware Routing Protocol For
Intermittently Connected Mobile Networks
Sensor Network Navigation without Location
Task Allocation for Undependable Multi Agent Systems in Social
Networks
Virtual Batching: Request Batching For Server Energy
Conservation In Virtualized Data Centers
Online Balancing Two Independent Criteria upon Placements and
Deletions
Catching Packet Droppers and Modifiers in Wireless Sensor
Networks
CCD: A Distributed Publish/Subscribe Framework for Rich
Content Formats
GJ053

Meeting Soft Deadlines in Scientific Workflows Using
Resubmission Impact

GJ054

A voice Input –Voice output communication Aid for people with
severe speech Impairment
GKAR: A Novel Geographic K-Anycast Routing for Wireless
Sensor Networks

GJ055
GJ056

Efficient Two-Server Password-Only Authenticated Key Exchange

MOBILE COMPUTING
GJ071
GJ072
GJ073
GJ074
GJ075
GJ076
GJ077
GJ078
GJ079
GJ080

Predicting Human Movement Based On Telecom's Handoff In
Mobile Networks
Deployment Of A Connected Reinforced Backbone Network With A
Limited Number Of Backbone Nodes
Underwater Localization With Time-Synchronization And
Propagation Speed Uncertainties
Maximizing Rendezvous Diversity In Rendezvous Protocols For
Decentralized Cognitive Radio Networks
A Progressive Approach To Reducing Data Collection Latency In
Wireless Sensor Networks With Mobile Elements
A Traffic-Aware Channel And Rate Reassignment Algorithm For
Wireless Mesh Networks
Nuzzer: A Large-Scale Device-Free Passive Localization System For
Wireless Environments
On Power And Throughput Tradeoffs Of Wifi And Bluetooth In
Smart phones
Optimal Content Downloading In Vehicular Networks

GJ083

A Robust Indoor Pedestrian Tracking System With Sparse
Infrastructure Support
Assessing The E-Services Of International Airport Websites:
Implications For Innovative E-Tourism Applications
Variable-Width Channel Allocation For Access Points: A GameTheoretic Perspective
Fast Data Collection in Tree-Based Wireless Sensor Networks

GJ084

Stateless Multicast Protocol for Ad Hoc Networks

GJ081
GJ082
NETWORKING
GJ091

Distortion-Aware Scalable Video Streaming To Multi network
Clients

GJ092

Combined Optimal Control Of Activation And Transmission In
Delay-Tolerant Networks

GJ093

Quantifying And Verifying Reachability For Access Controlled
Networks

GJ094

Model-Driven Optimization Of Opportunistic Routing

GJ095
ABC: Adaptive Binary Cuttings For Multidimensional Packet
Classification
GJ096

Localization Of Wireless Sensor Networks In The Wild: Pursuit Of
Ranging Quality

GJ097

Combined Optimal Control Of Activation And Transmission In
Delay-Tolerant Networks

GJ098
GJ099
GJ100
GJ101
GJ102
GJ103

Answering “What-If” Deployment and Configuration Questions With
WISE: Techniques and Deployment Experience
A Distributed Control Law for Load Balancing in Content Delivery
Networks
Stochastic Game for Wireless Network Virtualization
A Utility Maximization Framework for Fair and Efficient
Multicasting in Multicarrier Wireless Cellular Networks
Achieving Efficient Flooding by Utilizing Link Correlation in
Wireless Sensor Networks
Efficient Algorithms for Neighbor Discovery in Wireless Networks

GJ104

Diffusion Dynamics of Network Technologies With Bounded
Rational Users: Aspiration-Based Learning

GJ105

Tiered Authentication Of Multicast Protocol For Ad-Hoc Networks
GJ106
GJ107

Static Routing and Wavelength Assignment for Multicast Advance
Reservation in All-Optical Wavelength-Routed WDM Networks
Independent Directed Acyclic Graphs for Resilient Multipath Routing

NETWORK SECUIRITY
GJ121
GJ122
GJ123
GJ124
GJ125
GJ126
GJ127
GJ128

To Lie Or To Comply: Defending Against Flood Attacks In
Disruption Tolerant Networks
Non-Cooperative Location Privacy
Predicting Architectural Vulnerability On Multithreaded Processors
Under Resource Contention And Sharing
SORT: A Self-Organizing Trust Model For Peer-To-Peer Systems
On Inference-Proof View Processing of XML Documents
Data-Provenance Verification For Secure Hosts
On the Security and Efficiency of Content Distribution via Network
Coding
Packet-Hiding Methods for Preventing Selective Jamming Attacks
Security Analysis and Implementation of 3-Level Security System

GJ129

Using Image Based Authentication

SOFTWARE ENGINEERING
GJ141
GJ142
GJ143
GJ144
GJ145
GJ145
GJ146

Locating Need-To-Externalize Constant Strings For Software
Internationalization With Generalized String-Taint Analysis
Proactive And Reactive Runtime Service Discovery A Framework
And Its Evaluation
Synthesizing Modal Transition Systems From Triggered Scenarios
Trustrace Mining Software Repositories To Improve The Accuracy
Of Requirement Traceability Links
Using Timed Automata For Modeling Distributed Systems With
Clocks Challenges And Solutions
Validating Second-Order Mutation At System Level
Verifying Linearizability Via Optimized Refinement Checking
GJ147

Perfomance Specification and Evaluation with Unifies Stochastic
Probes and Fluid Anlaysis
ANDROID PROJECTS TITLES 2013

GA01

Funny Event Manager and Voice chipmunk changer

GA02

GPS geo-coder to track near hospital and ATM Location.

GA03

Secured Bluetooth multiple file transfer with Amazon file upload

GA04

Speech Synthesizer and SMS Transactions Mobile
Communication

GA05

Cricket and football live Data streaming in Notification service

GA06

Multiple OS file Transfer and Web XML Parser.

GA07

Mobil backup for contact, SMS and personal information.

GA08

Live streaming data with player application. (Audio & Video Play).

GA09

Parent child mobile tracker to trace all events(IEEE)

GA10

Entertainment with Face book and Twitter and pun nib notify status

GA11

Bar Code and QR Code reader Secure data Transactions.

GA12

Mange multilevel Shopping complex data maintenance

GA13

Software Version Self Update For Android Mobile Applications

GA14

Step counter with speed and Direction finder with Shaking Moves.

GA15

Apex: Extending Android Permission Model and Enforcement
with User-defined Runtime Constraints(IEEE)

GA16

Image to text reader in OCR conversion

GA17

Gallery Image & face-book Management System(IEEE)
GA18

Content provider applications (Auto boot Application) Mobile Thief
Cracker.(IEEE)

GA19

Data storage security applications (Files and Folder) android
mobile security.(IEEE)

GA20

Document viewer and Mobile printer

GA21

A Framework for Personal Mobile Commerce Pattern Mining and
Prediction(IEEE)

GA22
GA23

Android Screen Capturing and Storing.
PMSE:A Personalized Mobile Search Engine

Mobileapplicationprojectsformcaingagnerchennai

  • 1.
    Gagner Technologies MCA/M.SC Projects 2013 SMS:“Project” / Call: 9962221452 MCA projects, M.Sc projects, Final Year Projects in Chennai, Real time projects, Application projects, Live projects, JAVA projects, .NET projects. Final Year Projects for MCA, M SC (IT), BCA, BSC (CSE/IT), BE (CSE, IT). We also provide projects @ reasonable cost including Personality Development Training (Free of cost) & Placement Assistance (Free of Cost) at Gagner Technologies Mobile Apps (Android): Our Mobile Application Development is the process by which application software is developed for small low-power handheld devices such as personal digital assistants, enterprise digital assistants or mobile phones. Gagner Applications are either pre-installed on phones during manufacture, or downloaded by customers from various mobile software distribution platforms. Android IOS and Windows Mobile support typical application binaries as found on personal computers with code which executes in the native machine format of the processor (the ARM architecture is a dominant design used on many current models).Mobile applications debugging on a PC without a processor emulator, and also supports the Portable Executable (PE) format associated with the .NET Framework. Windows Mobile and iOS offer free SDKs and integrated development environments to developers. Machine language executables offer considerable performance advantages over Java.
  • 2.
    IEEE 2013 Projects DOTNET DATAMINING GD001 GD002 GD003 A Novel profit Maximizing Metric for measuring classification performance of customer churn Prediction Models Annotating search results from Web databases GD009 Building a Scalable Database-Driven Reverse Dictionary Discovering Temporal Change Patterns in the Presence of Taxonomies Efficient and Effective Duplicate Detection in Hierarchical Data Extending BCDM to Cope with Proposals and Evaluations of Updates) Failure-Aware Cascaded Suppression in Wireless Sensor Networks Information-Theoretic Outlier Detection for Large-Scale Categorical Data PMSE: A Personalized Mobile Search Engine GD010 Genetic Programming Approach to Record duplication GD011 A Query Formulation Language for the Data web GD012 Outsourced Similarity Search on Metric Data Assets Efficient Iceberg Query Evaluation Using Compressed Bitmap Index GD004 GD005 GD006 GD007 GD008 GD013 GD014 GD015 TSCAN: A Content Anatomy Approach to Temporal Topic Summarization Visual Role Mining:A Picture Is Worth a Thousand Roles CLOUD COMPUTING GD021 GD022 GD023 Security and Privacy-Enhancing Multi cloud Architectures Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud
  • 3.
    GD024 GD025 Toward Secure Multikey word Top-k Retrieval over Encrypted Cloud Data A Hierarchical Approach for the Resource Management of Very Large Cloud GD026 Platforms Ensuring Distributed responsibility For Data distribution in the Cloud GD027 Active Resource Distribution Using Implicit Mechanism in Cloud Computing Environment DISTRIBUTED SYSTEM GD041 GD042 GD044 GD045 GD046 GD047 GD048 GD049 GD050 GD051 GD052 GD053 GD054 Aging-aware energy-efficient workload allocation for mobile multimedia platforms Attached-RTS: Eliminating an exposed terminal problem in wireless networks Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults ESWC: efficient scheduling for the mobile sink in wireless sensor networks with delay constraint High-accuracy TDOA-based localization without time synchronization Hint-Based Execution Of Workloads In Clouds With Nefeli Intelligent Sensor Placement For Hot Server Detection In Data Centers ITA: Innocuous Topology Awareness For Unstructured P2p Networks A new hierarchical packet classification algorithm for Networking Concept Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks A Secure Erasure Code -Based Cloud Storage System with Secure Data Forwarding Balancing the Trade-Offs between Query Delay and Data Availability in MANETs
  • 4.
    GD055 A Voice-Input Voice-OutputCommunication Assists In Favor Of People With Harsh Verbal Communication Destruction MOBILE COMPUTING GD061 GD062 GD063 GD064 GD065 GD066 GD067 GD068 Network-Assisted Mobile Computing With Optimal Uplink Query Processing ALERT: An Anonymous Location-Based Efficient Routing Protocol In Manets Toward Accurate Mobile Sensor Network Localization In Noisy Environments On The Forwarding Performance Under Heterogeneous Contact Dynamics In Mobile Opportunistic Networks Predictable Mobile Routing For Spacecraft Networks Design And Analysis Of Adaptive Receiver Transmission Protocols For Receiver Blocking Problem In Wireless Ad Hoc Networks Enhanced Least-Squares Positioning Algorithm For Indoor Position GD070 Game-Based Broadcast Over Reliable And Unreliable Wireless Links In Wireless Multihop Networks Understanding The Scheduling Performance In Wireless Networks With Successive Interference Cancellation Topological Persistence For Medium Access Control GD071 Reducing Signaling Overhead For Femtocell/Macrocell Networks GD072 Adaptive Duty Cycle Control With Queue Management In Wireless Sensor Networks Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions Senseless :A Database Driven White Space Network GD069 GD073 GD074 GD075 Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks GD076 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
  • 5.
    NETWORKING GD091 Randomized InformationDissemination In Dynamic Environments GD092 An Efficient And Robust Addressing Protocol For Node Auto Configuration In Ad Hoc Networks GD093 Fine-Grained Channel Access In Wireless LAN GD094 QFQ: Efficient Packet Scheduling With Tight Guarantees GD095 An Efficient And Fair Mac Protocol Robust To Reactive Interference GD096 A Formal Data-Centric Approach For Passive Testing Of Communication Protocols GD097 Spreader Classification Based On Optimal Dynamic Bit Sharing GD098 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization GD099 An Adaptive System Based On Roadmap Profiling To Enhance Warning Message Dissemination In Vanets GD100 Duty-Cycle-Aware Minimum-Energy Multicasting In Wireless Sensor Networks ICTCP: Incast Congestion Control For TCP In Data-Center Networks GD101 GD102 Moment-Based Spectral Analysis Of Large-Scale Networks Using Local Structural Information GD103 Time-Bounded Essential Localization For Wireless Sensor Networks GD104 Mobility Increases The Connectivity Of Wireless Networks GD105 Topology Control For Effective Interference Cancellation In Multiuser MIMO Networks GD106 Latency Equalization as a New Network Service Primitive GD107 Privacy- and Integrity-Preserving Range Queriesin Sensor Networks
  • 6.
    NETWORK SECURITY GD121 GD122 GD123 GD124 GD125 GD126 GD127 Entrusting PrivateComputation And Data To Untrusted Networks NICE: Network Intrusion Detection And Countermeasure Selection In Virtual Network DNS For Massive-Scale Command And Control Warningbird:A Near Real-Time Detection System For Suspicious Urls In Twitter Stream A System For Timely And Controlled Information Sharing In Emergency Situations Detecting Automation of Twitter Accounts:Are You a Human, Bot, or Cyborg? Malware Clearance for Secure Commitment of OS-Level Virtual Machines SOFTWARE ENGINEERING GD141 GD142 GD143 GD144 GD145 GD146 GD147 GD148 A Decentralized Self-Adaptation Mechanism For Service-Based Applications In The Cloud A Large-Scale Empirical Study Of Just-In-Time Quality Assurance A Machine Learning Approach To Software Requirements Prioritization Abstracting Runtime Heaps For Program Understanding Coverage Estimation In Model Checking With Bitstate Hashing Edzl Schedulability Analysis In Real-Time Multicore Scheduling Event Logs For The Analysis Of Software Failures A Rule-Based Approach Local Versus Global Lessons For Defect Prediction And Effort Estimation
  • 7.
    IEEE 2013 Projects JAVA DATAMINING GJ001 Optimal Route Queries with Arbitrary Order Constraints GJ002 Protecting Sensitive Labels in Social Network Data Anonymization GJ003 Successive Group Selection for Microaggregation GJ004 Transductive Multilabel Learning via Label Set Propagation Single-Database Private Information Retrieval from Fully Homomorphic Encryption Efficient Evaluation of SUM Queries over Probabilistic Data GJ005 GJ006 GJ007 GJ008 GJ009 GJ010 GJ011 GJ012 GJ013 Multiview Partioning Via Tensor Methods On the Spectral Characterization and Scalable Mining of Network Communities Incremental Information Extraction Using Relational Databases Mining Web Graphs for Recommendations Extending Attribute Information for Small Data Set Classification Anomaly Detection for Discrete Sequences A Survey Mining Social Emotions from Affective Text CLOUD COMPUTING GJ021 GJ022 GJ023 GJ024 Security and Privacy-Enhancing Multi cloud Architectures Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud Toward Secure Multi key word Top-k Retrieval over Encrypted
  • 8.
    Cloud Data GJ025 A HierarchicalApproach for the Resource Management of Very Large Cloud GJ026 Platforms Ensuring Distributed responsibility For Data distribution in the Cloud GJ027 Cloud Computing Security: From Single To Multi-Clouds Decentralized Access Control With Anonymous Authentication of GJ028 Data Stored in Clouds DISTRIBUTED SYSTEM GJ041 GJ042 GJ043 GJ044 GJ045 GJ046 GJ047 GJ048 GJ049 GJ050 GJ051 GJ052 Link Scheduling For Exploiting Spatial Reuse In Multihop Mimo Networks Modeling Propagation Dynamics Of Social Network Worms Per-Flow Queue Management With Succinct Priority Indexing Structures For High Speed Packet Scheduling A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Scalable Hyper Grid K-Nn-Based Online Anomaly Detection In Wireless Sensor Networks Self-Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks Sensor Network Navigation without Location Task Allocation for Undependable Multi Agent Systems in Social Networks Virtual Batching: Request Batching For Server Energy Conservation In Virtualized Data Centers Online Balancing Two Independent Criteria upon Placements and Deletions Catching Packet Droppers and Modifiers in Wireless Sensor Networks CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats
  • 9.
    GJ053 Meeting Soft Deadlinesin Scientific Workflows Using Resubmission Impact GJ054 A voice Input –Voice output communication Aid for people with severe speech Impairment GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks GJ055 GJ056 Efficient Two-Server Password-Only Authenticated Key Exchange MOBILE COMPUTING GJ071 GJ072 GJ073 GJ074 GJ075 GJ076 GJ077 GJ078 GJ079 GJ080 Predicting Human Movement Based On Telecom's Handoff In Mobile Networks Deployment Of A Connected Reinforced Backbone Network With A Limited Number Of Backbone Nodes Underwater Localization With Time-Synchronization And Propagation Speed Uncertainties Maximizing Rendezvous Diversity In Rendezvous Protocols For Decentralized Cognitive Radio Networks A Progressive Approach To Reducing Data Collection Latency In Wireless Sensor Networks With Mobile Elements A Traffic-Aware Channel And Rate Reassignment Algorithm For Wireless Mesh Networks Nuzzer: A Large-Scale Device-Free Passive Localization System For Wireless Environments On Power And Throughput Tradeoffs Of Wifi And Bluetooth In Smart phones Optimal Content Downloading In Vehicular Networks GJ083 A Robust Indoor Pedestrian Tracking System With Sparse Infrastructure Support Assessing The E-Services Of International Airport Websites: Implications For Innovative E-Tourism Applications Variable-Width Channel Allocation For Access Points: A GameTheoretic Perspective Fast Data Collection in Tree-Based Wireless Sensor Networks GJ084 Stateless Multicast Protocol for Ad Hoc Networks GJ081 GJ082
  • 10.
    NETWORKING GJ091 Distortion-Aware Scalable VideoStreaming To Multi network Clients GJ092 Combined Optimal Control Of Activation And Transmission In Delay-Tolerant Networks GJ093 Quantifying And Verifying Reachability For Access Controlled Networks GJ094 Model-Driven Optimization Of Opportunistic Routing GJ095 ABC: Adaptive Binary Cuttings For Multidimensional Packet Classification GJ096 Localization Of Wireless Sensor Networks In The Wild: Pursuit Of Ranging Quality GJ097 Combined Optimal Control Of Activation And Transmission In Delay-Tolerant Networks GJ098 GJ099 GJ100 GJ101 GJ102 GJ103 Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience A Distributed Control Law for Load Balancing in Content Delivery Networks Stochastic Game for Wireless Network Virtualization A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks Achieving Efficient Flooding by Utilizing Link Correlation in Wireless Sensor Networks Efficient Algorithms for Neighbor Discovery in Wireless Networks GJ104 Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning GJ105 Tiered Authentication Of Multicast Protocol For Ad-Hoc Networks
  • 11.
    GJ106 GJ107 Static Routing andWavelength Assignment for Multicast Advance Reservation in All-Optical Wavelength-Routed WDM Networks Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORK SECUIRITY GJ121 GJ122 GJ123 GJ124 GJ125 GJ126 GJ127 GJ128 To Lie Or To Comply: Defending Against Flood Attacks In Disruption Tolerant Networks Non-Cooperative Location Privacy Predicting Architectural Vulnerability On Multithreaded Processors Under Resource Contention And Sharing SORT: A Self-Organizing Trust Model For Peer-To-Peer Systems On Inference-Proof View Processing of XML Documents Data-Provenance Verification For Secure Hosts On the Security and Efficiency of Content Distribution via Network Coding Packet-Hiding Methods for Preventing Selective Jamming Attacks Security Analysis and Implementation of 3-Level Security System GJ129 Using Image Based Authentication SOFTWARE ENGINEERING GJ141 GJ142 GJ143 GJ144 GJ145 GJ145 GJ146 Locating Need-To-Externalize Constant Strings For Software Internationalization With Generalized String-Taint Analysis Proactive And Reactive Runtime Service Discovery A Framework And Its Evaluation Synthesizing Modal Transition Systems From Triggered Scenarios Trustrace Mining Software Repositories To Improve The Accuracy Of Requirement Traceability Links Using Timed Automata For Modeling Distributed Systems With Clocks Challenges And Solutions Validating Second-Order Mutation At System Level Verifying Linearizability Via Optimized Refinement Checking
  • 12.
    GJ147 Perfomance Specification andEvaluation with Unifies Stochastic Probes and Fluid Anlaysis ANDROID PROJECTS TITLES 2013 GA01 Funny Event Manager and Voice chipmunk changer GA02 GPS geo-coder to track near hospital and ATM Location. GA03 Secured Bluetooth multiple file transfer with Amazon file upload GA04 Speech Synthesizer and SMS Transactions Mobile Communication GA05 Cricket and football live Data streaming in Notification service GA06 Multiple OS file Transfer and Web XML Parser. GA07 Mobil backup for contact, SMS and personal information. GA08 Live streaming data with player application. (Audio & Video Play). GA09 Parent child mobile tracker to trace all events(IEEE) GA10 Entertainment with Face book and Twitter and pun nib notify status GA11 Bar Code and QR Code reader Secure data Transactions. GA12 Mange multilevel Shopping complex data maintenance GA13 Software Version Self Update For Android Mobile Applications GA14 Step counter with speed and Direction finder with Shaking Moves. GA15 Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints(IEEE) GA16 Image to text reader in OCR conversion GA17 Gallery Image & face-book Management System(IEEE)
  • 13.
    GA18 Content provider applications(Auto boot Application) Mobile Thief Cracker.(IEEE) GA19 Data storage security applications (Files and Folder) android mobile security.(IEEE) GA20 Document viewer and Mobile printer GA21 A Framework for Personal Mobile Commerce Pattern Mining and Prediction(IEEE) GA22 GA23 Android Screen Capturing and Storing. PMSE:A Personalized Mobile Search Engine