This document provides a summary of 11 mobile computing final year project titles from IEEE papers between 2011-2008. It includes the project code, title, brief description and reference for each. The projects relate to topics like reliability improvement in device-to-device communication, location tracking in mobile networks, environment partitioning in robotic networks, photo retrieval on mobile devices, routing in wireless mesh networks, use of smart antennas in multi-hop networks, scheduling in wireless networks, network connectivity with group mobility models, reliable data delivery in ad hoc networks, local broadcast algorithms in ad hoc networks, and privacy-preserving location monitoring. The document provides contact information to obtain further details on the base papers.
Overview of final year project titles and offers base papers for various engineering domains.
Details on projects related to mobile computing including enhancements in device-to-device communication, location tracking, and data delivery in mobile networks.
Projects exploring data engineering, focusing on recommendation systems, privacy in search logs, and clustering algorithms.
Research projects centered on securing communication channels, privacy preserving systems, and tampering detection methods.
Innovations in mobile computing including energy-efficient routing protocols, adaptive communication technologies, and smart grid utility.
Projects on improving data processing and resource allocation using distributed systems and cloud computing solutions.
Advanced methods in image processing such as restoration algorithms, watermarking, and efficient segmentation techniques.
Research on efficient data mining algorithms, multimedia database systems, and applications of machine learning in image processing.
Diverse projects addressing networking protocols, mobile ad hoc networks, and various optimization techniques for communication.
Innovative approaches in service computing and ensuring security in distributed computing environments.
TTA
FINAL YEAR PROJECTS TITLES
WITH ABSTRACT
IEEE 2011, 2010, 2009, 2008 , etc…
Projects for B.E/B.Tech/M.E/Bsc/Msc
For complete base paper, call now and talk
to our expert
89397 22135 | 89397 22145 | 044 4218 1385
2.
TTA Final year projects by IT professionals
JAVA - DOMAIN : MOBILE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
YJM01 Reliability Improvement A new interference management scheme is
Using Receive Mode proposed to improve the reliability of
Selection in the Device- a device-to-device (D2D)
to-Device Uplink Period communication in the uplink (UL) period wit IEEE 2011
Under laying Cellular hout reducing the power of cellular user
Networks equipment (UE). To improve
the reliability of the D2D receiver, two
conventional receive techniques and one
proposed method are introduced. One
YJM02 Map-Based Location and Technical enhancements IEEE 2011
Tracking in Multipath of mobile technologies are paving the way to
Outdoor Mobile Networks the definition of high-quality and accurate
geolocation solutions based on data
collected and managed by
GSM/3G networks. We present a technique
that provides geolocation and mobility
prediction both at network and service level,
does not require any change to the
existing mobile network infrastructure, and i
s entirely performed on
the mobile network side
YJM03 Distributed lgorithms for A widely applied strategy for workload IEEE 2011
Environment Partitioning sharing is to equalize the workload assigned
in Mobile Robotic to each resource. In mobilemultiagent
Networks systems, this principle directly leads to
equitable partitioning policies whereby: 1)
the environment is equitably divided into
subregions of equal measure; 2) one agent
is assigned to each subregion; and 3) each
agent is responsible for service requests
originating within its own subregion.
YJM04 Photo Retrieval based on In this paper IEEE 2011
Spatial Layout with new photo retrieval system for mobile device
Hardware Acceleration for s is proposed. The system can be used to
Mobile Devices search for photos withsimilar spatial layouts
efficiently, and it adopts an image
segmentation algorithm that extracts
features of image regions based on K-Means
clustering. Since K-Means is computationally
intensive for real-time applications and
prone to generate clustering
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
3.
TTA Final year projects by IT professionals
results with local optima,
parallel hardware architectures are designed
to meet the real-time requirement of
the retrieval process.
YJM05 Hop-by-hop Routing in Wireless Mesh Network (WMN) has become IEEE 2011
Wireless Mesh Networks an important edge network to provide
with Bandwidth Internet access to remote areas
Guarantees and wireless connections in a metropolitan
scale. In this paper, we study the problem of
identifying the maximum
available bandwidth path, a fundamental
issue in supporting quality-of-
service in WMNs
YJM06 Cooperating with The use of smart antennas in multi- IEEE 2011
Smartness: Using hop wireless networks (MWNs) has garnered
Heterogeneous Smart significant attention over the last few years.
Antennas in Multi-hop While homogeneous MWNs with all nodes
Wireless Networks having the same antenna capabilities will
have certain applications, we argue that
MWNs with nodes
having heterogeneous antenna capabilities
are more likely to be the norm due to a
variety of motivating factors.
YJM07 Local Greedy In recent years, there has been a significant IEEE 2011
Approximation for amount of work done in developing low-
Scheduling in Multi-hop complexity schedulingschemes to achieve
Wireless Networks high performance in multi-
hop wireless networks. A centralized sub-
optimal schedulingpolicy,
called Greedy Maximal Scheduling (GMS) is
a good candidate because its empirically
observed performance is close to
optimal in a variety of network settings.
YJM08 Network Connectivity We investigate the communication IEEE 2011
with a Family of Group range of the nodes necessary
Mobility Models for network connectivity, which we call bi-
directional connectivity, in a simple setting.
Unlike in most of existing studies, however,
the locations ormobilities of the nodes may
be correlated through group mobility: Nodes
are broken
into groups, with each groupcomprising the
same number of nodes, and lie on a unit
circle. The locations of the nodes in the
same group are not mutually independent,
but are instead conditionally independent
given the location of the group. We examine
the distribution of the smallest
communication
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
4.
TTA Final year projects by IT professionals
YJM09 Towards Reliable Data This paper addresses the problem of IEEE 2011
Delivery for Highly delivering data packets for highly dynamic m
Dynamic Mobile Ad Hoc obile ad hoc networks in areliable and timely
Networks manner. Most existing ad hoc routing
protocols are susceptible to node mobility,
especially forlarge-scale networks. Driven by
this issue, we propose an efficient Position
based Opportunistic Routing protocol (POR)
which takes advantage of the stateless
property of geographic routing and the
broadcast nature of wireless medium.
YJM10 Local Broadcast There are two main approaches, static and IEEE 2011
Algorithms in Wireless Ad dynamic, in broadcast algorithms in wireless
Hoc Networks: Reducing ad hoc networks. In thestatic
the Number of approach, local algorithms determine the sta
Transmissions tus (forwarding/non-forwarding) of each
node proactively based on local topology
information and a globally known priority
function. In this paper, we first show
that localbroadcast algorithms based
on the static approach cannot achieve a
good approximation factor to the optimum
solution (an NP-hard problem).
YJM11 A Privacy-Preserving Monitoring personal locations with a potentia IEEE 2011
Location Monitoring lly untrusted server poses privacy threats to
System for Wireless the monitored individuals. To this end, we
Sensor Networks propose a privacy-
preserving location monitoring system for wi
reless sensornetworks. In our system, we
design two in-
network location anonymization algorithms,
namely, resource and quality-aware
algorithms, that aim to enable the system to
provide high-
quality location monitoring services forsyste
m users,
while preserving personal location privacy
YJM12 Optimal Stochastic We consider IEEE 2011
Location Updates in the location service in a mobile ad-
Mobile Ad Hoc Networks hoc network (MANET), where each node
needs to maintain itslocation information by
1) frequently updating
its location information within its
neighboring region, which is called
neighborhood update (NU), and 2)
occasionally updating its location information
to certain
distributedlocation server in the network,
which is called location server update (LSU).
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
5.
TTA Final year projects by IT professionals
YJM13 Supporting Efficient and Group communications are important IEEE 2011
Scalable Multicasting over in Mobile Ad hoc Networks (MANETs).
Mobile Ad Hoc Networks Multicast is an efficient method for
implementing group communications.
However, it is challenging to
implement efficient and scalable multicast in
MANET due to the difficulty in group
membership management and multicast
packet forwarding over a dynamic topology.
We propose a novel Efficient Geographic
Multicast Protocol (EGMP).
JAVA - DOMAIN : KNOWLEDGE AND DATA ENGINEERING
CODE PROJECT TITLE DESCRIPTION REFERENCE
YJK01 Motion Segmentation Group communications are important IEEE 2011
using the Hadamard in Mobile Ad hoc Networks (MANETs).
Product and Spectral Multicast is an efficient method for
Clustering implementing group communications.
However, it is challenging to
implement efficient and scalable multicas
t in MANET due to the difficulty in group
membership management and multicast
packet forwarding over a dynamic
topology
YJK02 A Unified Probabilistic In this paper, we formalize the IEEE 2011
Framework for Name problem in a unified probabilisticframewo
Disambiguation in Digital rk, which incorporates both attributes
Library and relationships. Specifically, we
define a disambiguationobjective
function for the problem and
propose a two-step parameter estimation
algorithm. We also investigate adynamic
approach for estimating the number of
people K.
YJK03 Improving Aggregate In this paper, we introduce and explore a IEEE 2011
Recommendation number of item ranking techniques that
Diversity can generate recommendations that
Using Ranking-Based have substantially
Techniques higher aggregate diversity across all
users while maintaining comparable
levels of recommendation accuracy.
Comprehensive empirical evaluation
consistently shows the diversity gains of
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
6.
TTA Final year projects by IT professionals
the proposed techniques using several
real-world rating datasets and different
rating prediction algorithms.
YJK04 Publishing Search Logs – In this paper we analyze algorithms IEEE 2011
A Comparative Study of for publishing frequent keywords, queries
Privacy Guarantees and clicks of a search log. We first show
how methods that achieve variants of k-
anonymity are vulnerable to active
attacks. We then demonstrate that the
stronger guarantee ensured by epsilon-
differential privacy unfortunately does
not provide any utility for this problem.
We then propose a novel algorithm
ZEALOUS and show how to set its
parameters to achieve (epsilon, delta)-
probabilistic privacy.
YJK05 Cluster Oriented This paper presents a IEEE 2011
Ensemble Classifier: novel cluster oriented ensemble classifier
Impact of Multi-cluster . The proposed ensemble classifier is
Characterization on based onoriginal concepts such
Ensemble Classifier as learning of cluster boundaries by the
Learning. base classifiers and
mapping of clusterconfidences to class
decision using a fusion classifier. The
categorised data set is characterised into
multipleclusters and fed to a
number of distinctive base classifiers.
YJK06 Visual Role Mining: A This paper offers a new role engineering IEEE 2011
Picture Is Worth a approach to Role-Based Access Control
Thousand Roles (RBAC), referred to as visualrole mining.
The key idea is to graphically represent
user-permission assignments to enable
quick analysis and elicitation of
meaningful roles. First, we formally
define the problem by
introducing a metric for the quality of the
visualization.
YJK07 A Knowledge-Driven This paper introduces a knowledge- IEEE 2011
Approach to Activity driven approach to real-time,
Recognition in Smart continuous activity recognition based on
Homes multi-sensor data
streams in smart homes.
The approach goes beyond the
traditional data-centric methods
for activityrecognition in three ways.
Firstly, it makes extensive use of
domain knowledge in the lifecycle
of activityrecognition. Secondly, it uses
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
7.
TTA Final year projects by IT professionals
ontologies for explicit context
and activity modeling and
representation. Thirdly and finally, it
exploits semantic reasoning and
classification for activity inferencing, thus
enabling both coarse-grained and fine-
grained activity recognition.
YJK08 Finding Top-k Answers in in this paper, we study how to integrate IEEE 2011
Keyword Search over multiple related tuple units to
Relational Databases effectively answerkeyword queries. To
Using Tuple Units achieve a high performance, we devise
two novel indexes, single-keyword-based
structure-aware index and keyword-pair-
based structure-aware index, and
incorporate structural relationships
between different tuple units into the
indexes. We use the indexes to efficiently
identify the answers of
integrated tupleunits.
YJK09 Efficient Iceberg Query In this paper, we exploited the IEEE 2011
Evaluation using property of bitmap index and
Compressed Bitmap Index developed a very
effective bitmappruning strategy
for processing iceberg queries.
Our index-pruning based
approach eliminates the need of
scanning and processing the
entire data set (table) and thus
speeds up
the iceberg query processing
significantly. Experiments show
that our approach is much
more efficient than existing
algorithms commonly used in
row-oriented and column-oriented
databases
YJK10 Improving Security and in this study, we propose a novel CP-ABE IEEE 2011
Efficiency in Attribute- scheme for a data sharing system by
Based Data Sharing exploiting the characteristic of the
system architecture. The proposed
scheme features the following
achievements: (1) the key escrow
problem could be solved by escrow-free
key issuing protocol, (2) fine-grained
user revocation per each attribute could
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
8.
TTA Final year projects by IT professionals
be done by proxy encryption which takes
advantage of the
selective attribute group key distribution
on top of the ABE.
YJK11 Clustering with Multi- In this paper, we introduce a IEEE 2011
Viewpoint based novel multi-
Similarity Measure viewpoint based similarity measure and
two related clustering methods. The
major difference between a traditional
dissimilarity/similarity measure and ours
is that the former uses only a
single viewpoint, which is the origin,
while the latter utilizes many different
viewpoints, which are objects assumed
to not be in the same cluster with the
two objects being measured. Using
multiple viewpoints, more informative
assessment of similarity could be
achieved.
YJK12 Manifold Adaptive In this paper, we propose a novel active IEEE 2011
Experimental Design for learning algorithm which is performed in
Text Categorization the data manifold adaptive kernel space.
The manifold structure is incorporated
into the kernel space by using graph
Laplacian. This way,
the manifold adaptive kernel space
reflects the underlying geometry of the
data.
YJK13 Multi-resolution Web link In this paper, we generalize the IEEE 2011
analysis using generalised multiresolution popularity analysis to use
link relations any form of Web page link relations. We
provide results for both the
PageRank relations and the In-
degree relations. By utilizing the
multiresolution popularity lists, we
achieve a 13 percent and 25 percent
improvement in mean average precision
over In-degree and PageRank,
respectively.
YJK14 Distributed Processing of In this paper, we introduce the IEEE 2011
Probabilistic Top-k notion of sufficient set and necessary set
Queries in Wireless for distributed processing ofprobabilistic t
Sensor Networks op-k queries in cluster-
based wireless sensor networks. These
two concepts have very nice properties
that can facilitate localized data
pruning in clusters. Accordingly, we
develop a suite of algorithms, namely,
sufficient set-based (SSB), necessary
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
9.
TTA Final year projects by IT professionals
set-based (NSB) and boundary-based
(BB), for inter-
cluster queryprocessing with bounded
rounds of communications.
YJK15 Cost-aware rank join with We address the problem of joining IEEE 2011
random and sorted access ranked results produced by two or more
services on the Web. We consider
services endowed with two kinds
of access that are often available:
i) sorted access, which returns
tuplessorted by score; ii) random access,
which returns tuples matching a
given join attribute
value. Rank joinoperators combine
objects of multiple relations and output
the K combinations with the highest
aggregate score.
YJK16 Joint Top-K Spatial Web users and content are increasingly IEEE 2011
Keyword Query being geo-positioned, and increased
Processing focus is being given to serving local
content in response to web queries. This
development calls
for spatial keyword queries that take into
account both the locations and textual
descriptions of content. We study the
efficient, joint processing of multiple top-
kspatial keyword queries.
Such joint processing is attractive during
high query loads and also occurs when
multiplequeries are used to obfuscate a
user's true query.
YJK17 Adaptive Provisioning of IEEE 2011
Human Expertise
in Service-oriented
Systems
YJK18 Improving Aggregate In this paper, we introduce and explore a IEEE 2011
Recommendation number of item ranking techniques that
Diversity Using Ranking- can generate recommendations that
Based Techniques have substantially
higher aggregate diversity across all
users while maintaining comparable
levels of recommendation accuracy.
Comprehensive empirical evaluation
consistently shows the diversity gains of
the proposed techniques using several
real-world rating datasets and different
rating prediction algorithms.
YJK19 Publishing Search Logs – In this paper we analyze algorithms IEEE 2011
A Comparative Study of for publishing frequent keywords, queries
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
10.
TTA Final year projects by IT professionals
Privacy Guarantees and clicks of a search log. We first show
how methods that achieve variants of k-
anonymity are vulnerable to active
attacks. We then demonstrate that the
stronger guarantee ensured by epsilon-
differential privacy unfortunately does
not provide any utility for this problem.
YJK20 A Link-Analysis Extension This work IEEE 2011
of Correspondence introduces a link analysis procedure for d
Analysis for Mining iscovering relationships
Relational Databases in a relational database or a graph,
generalizing both simple and
multiple correspondence analysis. It is
based on a random walk model through
thedatabase defining a Markov chain
having as many states as elements in
the database. Suppose we are interested
in analyzing the relationships between
some elements (or records) contained in
two different
tables ofthe relational database
YJK21 Adaptive Cluster Distance We consider approaches for similarity IEEE 2011
Bounding for High search in correlated, high-
Dimensional Indexing dimensional data sets, which are derived
within a clustering framework. We note
that indexing by “vector approximation”
(VA-File), which was proposed as a
technique to combat the “Curse of
Dimensionality,” employs scalar
quantization, and hence necessarily
ignores dependencies across dimensions,
which represents a source of
suboptimality.
YJK22 Discovering Conditional In this paper, we present the BioNav IEEE 2011
Functional Dependencies system, a novel search interface that
enables the user to navigate large
number of query results by organizing
them using the MeSH concept hierarchy.
First, the query results are organized into
a navigation tree. At each node
expansion step, BioNav reveals only a
small subset of the concept nodes,
selected such that the expected
user navigationcost is minimized.
YJK23 Effective Navigation of In this paper, we propose a novel IEEE 2011
Query Results Based on algorithm, called Semisupervised Semi-
Concept Hierarchies RiemannianMetric Map (S3RMM),
following the geometric framework
of semi Riemannian manifolds. S3RMM
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
11.
TTA Final year projects by IT professionals
maximizes the discrepancy of the
separability and similarity measures of
scatters formulated by using semi-
Riemannian metric tensors.
YJK24 Learning Semi- In this paper, we propose a novel IEEE 2011
Riemannian Metrics for algorithm, called Semisupervised Semi-
Semi supervised Feature RiemannianMetric Map (S3RMM),
Extraction following the geometric framework
of semi Riemannian manifolds. S3RMM
maximizes the discrepancy of the
separability and similarity measures of
scatters formulated by using semi-
Riemannian metric tensors. The metric
tensor of each sample is learned via
semisupervised regression
YJK25 Load Shedding in Mobile IEEE 2011
Systems with Mobi Qual
YJK26 Ranking Spatial Data by A spatial preference query ranks objects IEEE 2011
Quality Preferences based on the qualities of features in
their spatial neighborhood. For example,
using a real estate agency database of
flats for lease, a customer may want to
rank the flats with respect to the
appropriateness of their location, defined
after aggregating the qualities of other
features (e.g., restaurants, cafes,
hospital, market, etc.) within
their spatial neighborhood. Such a
neighborhood concept can be
specified by the user via different
functions
DOMAIN : NETWORK SECURITY
CODE PROJECT TITLE DESCRIPTION REFERENCE
YJS01 Secret Key Agreement IEEE 2011
from Vector Gaussian We investigate
Sources by Rate Limited the secret key agreement from correlate
Public Communication d vector Gaussian sources in which
legitimate parties can
use public communication with limited ra
te. For the class of protocols with one-
way public communication, we show that
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
12.
TTA Final year projects by IT professionals
the optimal trade-off between
the rate of key generation and
the rate of the publiccommunication is
characterized as an optimization problem
of a Gaussian random variable.
YJS02 Detecting Recompression In this paper, we present a new IEEE 2011
of JPEG Images via technique to discover traces caused
Periodicity Analysis of by recompression. We assume all
Compression Artifacts for source images are in JPEG format and
Tampering Detection propose to formulate the periodic
characteristics of JPEG images both in
spatial and transform domains. Using
theoretical analysis, we design a
robust detection approach which is able
to detect either block-aligned or
misaligned recompression.
YJS03 Privacy-Preserving ECG The paper deals with all the IEEE 2011
Classification With requirements anddifficulties related to
Branching Programs and working with data that must stay
Neural Networks encrypted during all the computation
steps, including the necessity of
working with fixed point
arithmetic with no truncation while
guaranteeing the same performance of a
floating point implementation in the plain
domain.
YJS04 Restoring Degraded Face The purpose of this paper is to illustrate IEEE 2011
Images: A Case Study in the complexity
Matching Faxed, Printed, of face recognition in such realistic
and Scanned Photos scenarios and to provide a viable solution
to it. The contributions of this work are
two-fold. First, a database
of face images is assembled and used to
illustrate the challenges associated
with matching severely degraded face im
ages. Second, a preprocessing scheme
with low computational complexity is
developed in order to eliminate the noise
present in degraded images and restore
their quality.
YJS05 Keys Through ARQ: This paper develops a novel framework IEEE 2011
Theory and Practice for sharing secret keys using the
Automatic Repeat reQuest (ARQ)
protocol. We first characterize the
underlying information theoretic limits,
under different assumptions on the
channel spatial and temporal correlation
function. Our analysis reveals a novel
role of “dumb antennas” in overcoming
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
13.
TTA Final year projects by IT professionals
the negative impact of spatial correlation
on the achievable secrecy rates.
YJS06 Digital Image It is often desirable to determine if IEEE 2011
Authentication From JPEG an image has been modified in any
Headers way from its original recording.
The JPEGformat affords engineers many
implementation trade-offs which give rise
to widely varying JPEG headers. We
exploit these variations
for image authentication.
YJS07 A Message-Passing We propose a new paradigm for blind IEEE 2011
Approach to Combating watermark decoding in the presence
Desynchronization Attacks of desynchronization attacks. Employing
Forney-style factor graphs to model the
watermarking system, we cast the blind
watermark decoding problem
as a probabilistic inference problem
on a graph, and solve it via message-
passing.
YJS08 Nonlinearity Estimation We present a radio frequency (RF) front- IEEE 2011
for Specific Emitter end nonlinearity estimator that is based
Identification in Multipath on the knowledge of a training sequence
Channels to
perform specific emitter identification (SE
I), which discerns radio emitters of
interest. Design and fabrication
variations provide unique signal
signatures for each emitter, and we
extract those characteristics through
the estimation of
transmitter nonlinearity coefficients.
YJS09 Physical-Layer Secret Key In thissystem, Alice and Bob IEEE 2011
Agreement in Two-Way share secret keys generated from
Wireless Relaying measured radio propagation
Systems characteristics with the help of the
relay in the presence of an
eavesdropper. We present
four secret key agreement schemes: an
amplify-and-forward (AF) scheme, a
signal-combining amplify-and-forward
(SC-AF) scheme, a multiple-access
amplify-and-forward (MA-AF) scheme,
and an amplify-and-forward with artificial
noise (AF with AN) scheme
YJS10 Secure Type-Based We consider data confidentiality in a IEEE 2011
Multiple Access distributed detection scenario with
a type-based multiple-access (TBMA)
protocol where a large set of sensors
sends local measurements to an ally
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
14.
TTA Final year projects by IT professionals
fusion center (FC) over an insecure
wireless medium called the main
channel.
YJS11 Key Agreement Over In this paper, a IEEE 2011
Multiple Access Channel generalized multiple access channel (MA
C) model for secret key sharing between
three terminals is considered. In this
model, there are two transmitters and a
receiver where all three terminals receive
noisychannel outputs.
YJS12 Strongly Secure We consider the problem IEEE 2011
Communications Over the of secure communications over the two-
Two-Way Wiretap way wiretap channel under a strong
Channel secrecy criterion. We improve existing
results by developing an achievable
region based on strategies that exploit
boththe interference
at the eavesdropper's terminal and
cooperation between legitimate users.
YJS13 Using a Knowledge-Based In this paper, a knowledge- IEEE 2011
Approach to Remove based (KB) approach, which
Blocking Artifacts in Skin simultaneouslyremoves JPEG blocking art
Images ifacts, and recovers skin features, is
for Forensic Analysis proposed. Given a training set containing
both original and
compressed skin images, the relationship
between original blocks and compressed
blocks can be established. This prior
information is used to infer the original
blocks of compressed evidence images.
YJS14 Improved Differential Differential Fault Analysis (DFA) finds IEEE 2011
Fault Analysis the key of a block cipher
on AES Key Schedule using differential information between
correct and faulty ciphertexts obtained
by inducing faults during the
computation of ciphertexts. Among many
ciphers Advanced Encryption Standard
(AES) has been the main target of DFA
due to its popularity.
YJS15 Blind Forensics of Median This paper proposes a novel approach for IEEE 2011
Filtering detecting median filtering in digitalimage
in Digital Images s, which can 1) accurately
detect median filtering in arbitrary image
s, even reliably
detect median filteringin low-resolution
and JPEG compressed images; 2) reliably
detect tampering when part of a median-
filtered imageis inserted into a non-
median-filtered image, or vice versa.
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
15.
TTA Final year projects by IT professionals
YJS16 Improved Radiometric This paper experimentally IEEE 2011
Identification of demonstratesimproved identification acc
Wireless Devices using uracy and reduced sensitivity
MIMO Transmission to identification parameters when such
techniques are applied to the multiple
transmitters within multiple-input
multiple-output devices. It further
studies an information theoretic
technique for determining
which radiometric features are most
effective in discriminating devices and
analyzes the identification performance
as a function of the number of features
used.
YJS17 Robust Image We propose a robust quantization- IEEE 2011
Watermarking Based on based image watermarking scheme,
Multi scale Gradient called
Direction Quantization the gradient direction watermarking(GD
WM), based on the
uniform quantization of
the direction of gradient vectors. In
GDWM, the watermark bits are
embedded by quantizing the angles of
significant gradient vectors at multiple
wavelet scales.
DOMAIN : NETWORKING
CODE PROJECT TITLE REFERENCE
YJS01 Cluster-Based Back-Pressure the back-pressure algorithmrequires IEEE 2011
Routing Algorithm routers to maintain a separate queue
for each destination, which precludes its
implementation in large-scale networks.
In this paper, we propose a
distributed cluster-based back-
pressure routing algorithm that retains
the adaptability of back-
pressure routing while significantly
reducing the number of queues that
have to be maintained at each node.
YJS02 Impact of Correlated Mobility on We extend the analysis of the scaling IEEE 2011
Delay-Throughput laws of wireless ad hoc networks to the
Performance in Mobile Ad-Hoc case of correlated nodes movements,
Networks which are commonly
found in real mobility processes. We
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
16.
TTA Final year projects by IT professionals
consider a simple version of the
Reference Point
Group Mobility model, in which nodes
belonging to the same group are
constrained to lie in a disc area, whose
center moves uniformly across
the network
YJS03 On the Price of Security in In this paper, based on a general IEEE 2011
Large-Scale Wireless Ad Hoc random network model, theasymptotic
Networks behaviors of secure throughput and
delay with the common transmission
range rn and the probability
pf of neighboring nodes having a
primary security association are
quantified when the network size n is
sufficiently large. The costs and
benefits of secure-link-augmentation
operations on the secure throughput
and delay are also analyzed.
YJS04 Cross-Layer Designs in Coded A cross-layer design along with an IEEE 2011
Wireless Fading optimal resource allocation framework is
Networks With Multicast formulated for wireless fadingnetworks,
where the nodes are allowed to
perform network coding. The aim is to
jointly optimize end-to-end transport-
layer rates, network code design variabl
es, broadcast link flows, link capacities,
average power consumption, and short-
term power allocation policies.
YJS05 Link-State Routing With Hop- This paper settles an open IEEE 2011
by-Hop Forwarding Can Achieve question with a positive
Optimal Traffic Engineering answer: Optimal traffic engineering (or
optimalmulticommodity flow) can be
realized using just link-
state routing protocols with hop-by-
hop forwarding. Today's typical versions
of these protocols, Open Shortest Path
First (OSPF) and Intermediate System-
Intermediate System (IS-IS),
split traffic evenly over shortest paths
based on link weights.
YJS06 Stability and Benefits of Network utility maximization has been IEEE 2011
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
17.
TTA Final year projects by IT professionals
Suboptimal Utility Maximization widely used to model resource
allocation and network architectures.
However, in practice, often it cannot be
solved optimally due to complexity
reasons. Thus motivated, we address
the following two questions in this
paper: 1)
Can suboptimal utility maximization mai
ntain queue stability? 2) Can
underoptimization of utility objective
function in fact benefit other network
design objectives?
YJS07 A New Estimation Scheme for Many congestion control protocols have IEEE 2011
the Effective Number been recently proposed in order to
of Users in Internet Congestion alleviate the problems encountered by
Control TCP in high-speed networks and
wireless links. Protocols utilizing an
architecture that is in the same spirit
asthe ABR service in ATM networks
require
estimates of the effective number of use
rs utilizing each link in thenetwork to
maintain
stability in the presence of delays. In thi
s paper, we
propose a novel estimation algorithm
that is based on online parameter
identification techniques and is shown
through analysis and simulations to
converge
to the effective number of users utilizing
each link
YJS08 Multichannel Scheduling and In this paper, we utilize multiple IEEE 2011
Spanning Trees: Throughput– frequency channels and design an
Delay Tradeoff for Fast efficient link scheduling protocol that
DataCollection in Sensor gives a constant factor approximation
Networks on the optimal throughput in delivering
aggregated data from all the nodes to
the sink. To minimize the
maximum delay subject to a
given throughput bound, we also design
an $(alpha, beta)$-bicriteria
approximation algorithm to construct a
Bounded-Degree Minimum-
Radius Spanning Tree, with the radius
of thetree at most $beta$ times the
minimum possible radius for a given
degree bound $Delta^*$, and the
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
18.
TTA Final year projects by IT professionals
degree of any node at most $Delta^* +
alpha$ , where $alpha$ and $beta$ are
positive constants.
YJS09 DAC: Generic and Automatic In this paper, we present DAC, IEEE 2011
Address Configuration for Data a generic andautomatic Data center Add
Center Networks ress Configuration system. With an
automatically generated blueprint that
defines the connections of
servers and switches labeled by logical
IDs, e.g., IP addresses, DAC first learns
the physical topology labeled by device
IDs, e.g., MAC addresses.
YJS10 Distributed -Optimal User In this paper, we develop a framework IEEE 2011
Association and Cell Load for user association in infrastructure-
Balancing in Wireless Networks based wireless networks, specifically
focused on flow-
level cell load balancing under spatially
inhomogeneous traffic distributions. Our
work encompasses several
different user association policies: rate-
optimal, throughput-optimal, delay-
optimal, andload-equalizing, which we
collectively denote $alpha$-
optimal user association.
YJS11 MeasuRouting: A Framework for Monitoring transit traffic at one or more IEEE 2011
Routing Assisted Traffic points in a network is of interest to
Monitoring network operators for reasons
oftraffic accounting, debugging or
troubleshooting, forensics,
and traffic engineering. Previous
research in the area has focused on
deriving a placement of monitors across
the network toward the end of
maximizing the monitoringutility of the
network
operator for a given traffic routing.
However, both traffic characteristics and
measurement objectives can
dynamically change over time,
rendering a previously optimal
placement of monitors suboptimal.
YJS12 Automatic Generation of System level modeling is widely IEEE 2011
Assertions from System Level employed at early
Design Using Data Mining stages of system development for
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
19.
TTA Final year projects by IT professionals
simplifying designverification and
architectural
exploration. Assertion based verification
has become a well established
part of RTL verification methodology. In
the traditional assertion based
verification flow, assertions are
manually written. In this paper, we
generate assertions from system level d
esigns using GoldMine,
an automatic assertion generationengin
e that uses data mining and static
analysis.
YJS13 Spatial Correlation and Mobility- In this paper, a IEEE 2011
Aware Traffic Modeling for novel trafficmodeling scheme for capturi
Wireless Sensor Networks ng these dynamics is proposed that
takes into account the statistical
patterns of
node mobility and spatial correlation.
The contributions made in this paper are
twofold. First, it is shown that the joint
effects
of mobility and spatial correlation can
lead to bursty traffic. More specifically,
high mobilityvariance and small spatial c
orrelation can give rise to pseudo-long-
range-dependent (LRD) traffic (high
burstytraffic), whose autocorrelation
function decays
slowly and hyperbolically up to a certain
cutoff time lag.
YJS14 Jamming-Aware Traffic Multiple-path source routing protocols IEEE 2011
Allocation for Multiple-Path allow a data source node to distribute
Routing Using Portfolio the total traffic among available paths.
Selection In this paper, we consider the problem
of jamming-aware source routing in
which the source node
performs traffic allocation based on
empirical jamming statistics at
individual network nodes. We formulate
thistraffic allocation as a lossy network
flow optimization
problem using portfolio selection theory
from financial statistics.
YJS15 A Unified Approach to In this work, we develop the IEEE 2011
Optimizing Performance in mathematical framework and novel
Networks serving design methodologies needed to support
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
20.
TTA Final year projects by IT professionals
Heterogeneous Flows such heterogeneous requirements and
propose provably
optimal network algorithms that account
for the multilevel interactions between
the flows. To that end, we first
formulate a network optimization
problem that incorporates the above
throughput and service prioritization
requirements of the two traffic types.
We, then develop a distributed joint
load-balancing and congestion control
algorithm that achieves the dual goal of
maximizing the aggregate utility gained
by the elastic flows while satisfying the
fixed throughput and prioritization
requirements of the inelastic flows
YJS16 Delay Analysis and Optimality This paper focuses on IEEE 2011
of Scheduling Policies for designing and analyzing throughput-
Multi-Hop Wireless Networks optimal scheduling policies that avoid
using per-flow or per-destination
information, maintain a single data
queue for each link, exploit only local
information, andpotentially improve
the delay performance, for multi-
hop wireless networks under general
interference constraints
YJS17 Selfish Overlay Network In this paper, we unify the IEEE 2011
Creation and Maintenance aforementioned thrusts by
defining and studying
the selfish neighbor selection (SNS)
game and its application
to overlay routing. At the heart of SNS
stands the restriction that peers are
allowed up to a certain number of
neighbors. This makes SNS substantially
different from existingnetwork formation
games that impose no bounds on peer
degrees. Having bounded degrees has
important practical consequences as it
permits
the creation of overlay structures that
require $O(n)$ instead of $O(n^2)$link
monitoring overhead.
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
21.
TTA Final year projects by IT professionals
DOMAIN : PARALLEL DISTRIBUTION
CODE PROJECT TITLE REFERENCE
YJP01 EBRP: Energy-Balanced n this paper, enlightened by the IEEE 2011
Routing Protocol for Data concept of potential in common
Gathering in Wireless Sensor physics, we design an Energy-
Networks Balanced Routing Protocol (EBRP) by
constructing a mixed virtual potential
field, including depth, energy density
and residual energy to force packets to
move towards the sink through the
dense energy area so as to protect the
nodes with relatively low
residual energy. The design principle
and guidelines are presented in detail.
YJP02 Effective Delay-Controlled This paper proposes a IEEE 2011
Load Distribution over new load distribution model aiming to
Multipath Networks minimize the difference among end-to-
end delays, thereby reducing
packet delay variation and risk of
packet reordering without
additional network overhead. In
general, the lower the risk of packet
reordering, the smaller
the delay induced by the packet
reordering recovery process, i.e.,
extra delay induced by the packet
reordering recovery process is
expected to decrease.
YJP03 Tracking Dynamic Boundaries We examine the problem IEEE 2011
using Sensor Network of tracking dynamic boundaries occurri
ng in natural
phenomena using a network of
range sensors. Two main challenges of
the boundary tracking problem are
accurate boundary estimation from
noisy observations and
continuous tracking of the boundary.
We
propose Dynamic Boundary Tracking (
DBTR), an algorithm that combines the
spatial estimation and temporal
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
22.
TTA Final year projects by IT professionals
estimation techniques.
YJP04 CACAO: Distributed Client- In CACAO, the clients feed back traffic IEEE 2011
Assisted Channel Assignment information to their APs. This leads to
Optimizationfor better network condition knowledge
Uncoordinated WLANs and
betterchannel assignment decisions at
the APs. We conduct extensive
simulation study and comparisons
using Network Simulator 2 (NS2). Our
results show that CACAO outperforms
other traditional and recent schemes in
terms of TCP and UDP throughputs
with a similar level of fairness.
YJP05 Athanasia: A User- This article presents Athanasia, a user- IEEE 2011
Transparent and Fault- transparent and fault-
Tolerant System tolerant system, for parallel application
for Parallel Applications s running on large-scale
cluster systems. Cluster systems have
been regarded as a de facto standard
to achieve multitera-flop computing
power. These cluster systems, as we
know, have an inherent failure factor
that can cause computation failure. The
reliability issue
in parallel computing systems,
therefore, has been
studied for arelatively long time in the
literature, and we have seen many
theoretical promises arise from the
extensive research.
YJP06 BECAN: A Bandwidth-Efficient Inthis paper, we IEEE 2011
Cooperative Authentication propose a novel bandwidth-
Scheme for Filtering Injected efficient cooperative authentication (BE
False Data in Wireless Sensor CAN) scheme for filteringinjected false
Networks data. Based on the random graph
characteristics of sensor node
deployment and the cooperativebit-
compressed authentication technique,
the proposed BECAN scheme can save
energy by early detecting
andfiltering the majority
of injected false data with minor extra
overheads at the en-route nodes.
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
23.
TTA Final year projects by IT professionals
YJP07 Delay Constrained Subtree Virtual world and other IEEE 2011
Homeomorphism Problem collaborative applications are
with Applications increasingly becoming popular among
Internet users. In such applications,
users interact with each other through
digital entities or avatars. In order to
preserve the user experience, it is
important that certain Quality of
Service (QoS) requirements
(e.g. delay, bandwidth) are satisfied by
the interactions. These QoS
requirements are usually defined by
the application designer.
Whenapplications with such QoS
requirements are being deployed on a
network of servers, an appropriate set
of servers capable of satisfying the QoS
constraints of the interactions must be
identified.
YJP08 Efficient communication In this article we show IEEE 2011
algorithms in hexagonal the hexagonal mesh networks develope
mesh interconnection d in the early 1990s are a special case
networks of the EJnetworks that have been
considered more recently. Using a node
addressing scheme based on the EJ
number system, we give a shortest
path
routing algorithm for hexagonal mesh n
etworks.
YJP09 An Efficient Prediction-based This paper proposes predict and relay IEEE 2011
Routing in Disruption- (PER), an efficient routing algorithm for
Tolerant Networks DTNs, where nodes determine the
probability distribution of future contact
times and choose a proper next-
hop in order to improve the end-to-end
delivery probability. The algorithm
is based on two observations: one is
that nodes usually move around a set
of well-visited landmark points instead
of moving randomly; the other is that
node mobility behavior is semi-
deterministic and could be predicted
once there is sufficient mobility history
information.
YJP10 Bounding the Impact of Self-stabilization is a versatile approach IEEE 2011
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
24.
TTA Final year projects by IT professionals
Unbounded Attacks to fault-tolerance since it permits a
in Stabilization distributed system to recover from any
transient fault that arbitrarily
corrupts the contents of all
memories in the system. Byzantine
tolerance is an attractive
feature of distributed systems that
permits to cope with arbitrary
malicious behaviors. Combining these
two properties proved difficult: it is
impossible to
contain the spatial impact of Byzantine
nodes in a self-stabilizing context for
global tasks such as tree orientation
and tree construction.
YJP11 Stability Analysis of In this paper, we propose a policy that IEEE 2011
Reservation-Based allows links to transmit data in any
Scheduling Policies in future frame by means of frame
Wireless Networks reservations. The new, reservation-
based distributed scheduling approach
will improve the capacity of the system
and provide greater throughput.
YJP12 Fast Secure Communications This paper proposes three IEEE 2011
in Shared Memory authentication schemes to remove
Multiprocessor Systems those security vulnerabilities. First, we
prevent replay attacks on data
messages by inserting Request Counter
(RC) into request messages. Second,
we also use RC to detect integrity
attacks on control messages. Third, we
propose a new counter, referred to as
GCC Counter (GC), to protect the
global counter messages. We simulated
our design with SPLASH-2 benchmarks
on up to 16-
processor sharedmemory multiprocess
or systems by using Simics with
Wisconsin multifacet General
Execution-
drivenMultiprocessor Simulator
(GEMS).
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
25.
TTA Final year projects by IT professionals
DOMAIN : IMAGE PROCESSING
CODE PROJECT TITLE DESCRIPTION REFERENCE
YJI01 A Generalized Accelerated This paper IEEE 2011
Proximal Gradient Approach proposes a generalized accelerated
for Total Variation-Based proximal gradient (GAPG) approach
Image Restoration for solving total variation(TV)-
based image restoration problems.
The GAPG algorithm generalizes the
original APG algorithm by replacing
the Lipschitz constant with an
appropriate positive-definite matrix,
resulting in faster
convergence. For TV-
basedimage restoration problems,
we further introduce two auxiliary
variables that approximate the
partial derivatives. Constraints on
the variables can easily be imposed
without modifying the algorithm
much, and the TV regularization
can be either isotropic or
anisotropic.
YJI02 Residues Cluster Based In this paper, IEEE 2011
Segmentation and Outlier- the phase unwrappingproblem is
Detection Method for Large- abstracted as solving a large-
Scale Phase Unwrapping scale system of inconsistent linear
equations. With the difficulties
oflarge-
scale phase unwrapping analyzed, L
0
-norm criterion is found to have
potentials in efficient image
tiling andsplicing. Making use of the
clustering characteristic
of residue distribution, a tiling
strategy is proposed for L0-norm
criterion. Unfortunately, L0-norm is
an NP-hard problem, which is very
difficult to find an exact solution in
a polynomial time.
YJI03 An a priori shading correction Digital imaging devices are increasingly IEEE 2011
technique for contact imaging used for color measurements in fields
devices such as forensics, the food industry,
and ecological and medical research.
Especially concerning the skin, in the
follow-up of benign or malignant
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
26.
TTA Final year projects by IT professionals
lesions, it is crucial to ensure that the
measured colors are accurate and
reproducible. Several color calibration
methods having been presented over
the last few years
YJI04 Spread Spectrum Image Efficient image watermark calls for IEEE 2011
Watermarking Based on full exploitation of
Perceptual Quality Metric the perceptual distortion constraint.
Second-order statistics of visual
stimuli are regarded as critical
features for perception. This paper
proposes a second-order statistics
(SOS) based image quality metric,
which considers the texture
masking effect and the contrast
sensitivity in Karhunen-Loève
transform domain.
YJI05 Memory-Efficient Architecture Hysteresis thresholding is a method IEEE 2011
for Hysteresis Thresholding that offers
and Object Feature Extraction enhanced object detection. Due to
its recursive nature, it is time
consuming and requires a lot
of memory resources. This makes it
avoided in streaming processors
with limitedmemory. We propose
two versions of a memory-
efficient and fast architecture for hy
steresis thresholding: a high-
accuracy pixel-
based architecture and a faster
block-based one at the expense of
some loss in the accuracy.
YJI06 Generalized Random Walks In this paper, we propose a novel IEEE 2011
for Fusion of Multi-Exposure probabilistic model-
Images based fusion technique for multi-
exposure images. Unlike
previousmulti-
exposure fusion methods, our
method aims to achieve an optimal
balance between two quality
measures, i.e., local contrast and
color consistency, while combining
the scene details revealed under
different exposures.
YJI07 Edge Strength Filter Based We propose an orientation- IEEE 2011
Color Filter Array free edge strength lter and apply it
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
27.
TTA Final year projects by IT professionals
Interpolation to the demosaicing
problem. Edge strength lter output
is utilized both to improve the initial
green channel interpolation and to
apply the constant color dierence
rule adaptively. This
simple edge directed method yields
visually pleasing results with high
CPSNR.
YJI08 Towards a Unified Color mage processing methods that IEEE 2011
Space for Perception-Based utilize characteristics of the human
Image Processing visual system
require color spaces with certain
properties to operate effectively.
After analyzing different types
of perception-
based image processingproblems,
we present a list of
properties a unified color space sho
uld have. Due to contradictory
perceptual phenomena and
geometric
issues a color space cannot
incorporate all these properties.
YJI09 Model-guided Adaptive In compressive sensing (CS) a IEEE 2011
Recovery of Compressive challenge is to find a space in which
Sensing the signal is sparse and hence
recoverable faithfully. Since many
natural signals such as images have
locally varying statistics, the sparse
space varies in time/spatial domain. As
such, CS recovery should be conducted
in locally adaptive, signal-dependent
spaces to counter the fact that the CS
measurements are global and
irrespective of signal structures
DOMAIN : MOBILE COMPUTING
CODE PROJECT TITLE REFERENCE
YDM01 Providing Secure Integrity in IEEE
Peer-to-peer Oriented Mobile
Environments
YDM02 RAM: Rate Adaptation in IIEEE
Mobile Environments
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
28.
TTA Final year projects by IT professionals
YDM03 Robust Relative Location IEEE
Estimation in Wireless Sensor
Networks with Inexact
Position Problems
YDM04 On the Cost of Knowledge of IEEE
Mobility in
Dynamic Networks: An
Information-Theoretic
Approach
YDM05 A Novel MAC Scheme for IEEE
Multi-Channel Cognitive Radio
Ad Hoc Networks
YDM06 Efficient Virtual Backbone IEEE
Construction with Routing
Cost Constraint in Wireless
Networks using Directional
Antennas
YDM07 Color Based Fruits IIEEE
Classification Using GPU
YDM08 Wireless Multicast IEEE
Optimization : A Cross-Layer
Approach
YDM09 Web Content Recommender IEEE
System based on Consumer
Behavior Modeling
YDM10 STORM: A Framework for IEEE
Integrated Routing,
Scheduling and Traffic
Management in Ad Hoc
Networks
YDM11 Throughput Optimization in IEEE
Mobile Backbone Networks
DOMAIN : KNOWLEDGE AND DATA ENGINEERING
CODE PROJECT TITLE DESCRIPTION REFERENCE
YDK01 Motion Segmentation in the IEEE
Presence of Outlying,
Incomplete, or Corrupted
Trajectories
YDK02 Segmentation and Sampling IIEEE
of Moving Object
Trajectories based on
Representativeness
YDK03 A Query Formulation IEEE
Language for the Data Web
YDK04 Optimizing Multiway Joins in IEEE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
29.
TTA Final year projects by IT professionals
a Map-Reduce Environment
YDK05 A Survey on Graphical IEEE
Methods for
Classification Predictive
Performance Evaluation
YDK06 Efficient and Accurate IEEE
Discovery of Patterns in
Sequence Data Sets
YDK07 Energy Efficient Schemes for IIEEE
Accuracy-Guaranteed
Sensor Data Aggregation
using Scalable Counting
YDK08 Optimizing the Calculation of IEEE
Conditional Probability Tables
in Hybrid BayesianNetworks
using Binary Factorization
YDK09 A performance anomaly IEEE
detection and analysis
framework for DBMS
development
YDK10 Increasing retrieval quality in IEEE
conversational
recommenders
YDK11 Optimizing Multiway Joins in IEEE
a Map-Reduce
Environment
YDK12 Coupled Behavior Analysis IEEE
with Applications
YDK13 Cascading spatio-temporal IEEE
pattern discovery
YDK14 Mining Order-Preserving IIEEE
Submatrices from Data with
Repeated Measurements
YDK15 Network Similarity IEEE
Decomposition (NSD): A Fast
and Scalable Approach to
NetworkAlignment
YDK16 Data Integrity Proofs in Cloud IEEE
Storage
YDK17 Efficient Computation of IEEE
Range Aggregates
against Uncertain Location
Based Queries
YDK18 Exploring Application-Level IEEE
Semantics for Data
Compression
YDK19 Monitoring Service Systems IEEE
from a Language-Action
Perspective
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
30.
TTA Final year projects by IT professionals
YDK20 One Size Does Not Fit All: IEEE
Towards User- and Query-
Dependent Ranking For Web
Databases
YDK21 Optimal service pricing for a IIEEE
cloud cache
YDK22 A Personalized Ontology IEEE
Model for Web Information
Gathering
YDK23 Scalable Learning of IEEE
Collective Behavior
YDK24 The World in a Nutshell: IIEEE
Concise Range Queries
YDK25 Decision Trees for Uncertain IEEE
Data
YDK26 The CoQUOS Approach to IEEE
Continuous Queries in
Unstructured Overlays
DOMAIN : MOBILE COMPUTING(j)
CODE PROJECT TITLE DESCRIPTION REFERENCE
SJM01 Continuous Monitoring IEEE-2009
of Spatial Queries in
Wireless Broadcast
SJM02 Energy Maps For IEEE-2009
Mobile Wireless
networks coherence
Time Versues
Spreding Period
SJM03 Energy-Efficient SINR- IEEE-2009
Based Routing for
Multihop Wireless
SJM04 Mitigation of Control IEEE-2009
Channel Jamming
Under Node Capture
Attacks
SJM05 Mobility Management IEEE-2009
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
31.
TTA Final year projects by IT professionals
Approaches for Mobile
IP Networks
SJM06 SIMPS Using IEEE-2009
Sociology for Personal
Mobility
SJM07 Intrusion Detection in IEEE-2008
Homogeneous and
Heterogeneous
Wireless Sensor
Networks
SJM08 Bandwidth Estimation IEEE-2008
for IEEE 802.11-
Based Ad Hoc
Networks
SJM09 Location Based IEEE-2008
Spatial Query
Processing In Wireless
Broadcast
Environments
SJM10 Bandwidth Efficient IEEE-2008
Video Multicasting in
Multiradio
Muilticellular Wireless
DOMAIN : NETWORK COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SJN01 Measuring Capacity IEEE-2009
Bandwidth of
Targeted Path
Segments
SJN02 Evaluating the IEEE-2009
Vulnerability of
Network Traffic Using
Joint
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
32.
TTA Final year projects by IT professionals
SJN03 Capturing Router IEEE-2009
Congestion and Delay
SJN04 Multiple Routing IEEE-2009
Configurations for
Fast IP Network
Recovery
SJN05 Residual-Based IEEE-2009
Estimation of Peer
and Link Lifetimes in
P2P Networks
SJN06 Spatio-Temporal IEEE-2009
Network Anomaly
Detection by
Assessing Deviations
of Empirical Measures
SJN07 A Geometric Approach IEEE-2009
to Improving Active
Packet Loss
Measurement
SJN08 Benefit Based Data IEEE-2009
Caching In Ad Hoc
Networks
SJN09 Minimizing File IEEE-2009
Download Time in
Stochastic Peer-to-
Peer Networks
SJN10 Rate & Delay IEEE-2009
Guarantees Provided
By Close Packet
Switches with Load
Balancing
SJN11 Performance of a IEEE-2009
Speculative
Transmission Scheme
for Scheduling-
Latency Reduction
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
33.
TTA Final year projects by IT professionals
SJN12 Dual-Link Failure IEEE-2009
Resiliency through
Backup Link Mutual
Exclusion
SJN13 BRA A Bidirectional IEEE-2009
Routing Abstraction
for Asymmetric Mobile
Ad Hoc Networks
SJN14 Securing User- IEEE-2009
Controlled Routing
Infrastructures
SJN15 Two Techniques for IEEE 2008
Fast Computation of
Constrained Shortest
Paths
SJN16 Predictive Job IEEE-2005
Scheduling in a
Connection Limited
System using Parallel
Genetic Algorithm
SJN17 A Distributed IEEE-2004
Database Architecture
for Global Roaming in
Next-Generation
Mobile Networks
SJN18 Location Aided IEEE-2004
Routing In Mobile AD-
HOC Networks
SJN19 IEEE-2007
An Acknowledgment-
Based Approach For
The Detection Of
Routing Misbehavior
In MANETs
SJN20 XTC: A Practical IEEE-2004
Topology Control
Algorithm for Ad-Hoc
Networks
SJN21 A near-optimal IEEE-2005
multicast scheme for
mobile ad hoc
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
34.
TTA Final year projects by IT professionals
networks using a
hybrid genetic
algorithm
SJN22 Network border IEEE-2004
patrol: preventing
congestion collapse
and promoting
fairness in the
Internet
SJN23 An Agent Based IEEE-2006
Intrusion Detection,
Response and
Blocking using
signature method in
Active Network.
SJN24 ITP: An Image IEEE-2002
Transport Protocol for
the Internet
SJN25 Performance IEEE REFERENCE
Evaluation of RMI
SJN26 Genetic Algorithm IEEE REFERENCE
Based Train
Simulation Using
Concurrent
Engineering
SJN27 Public Key Validation IEEE REFERENCE
for DNS security
Extension
SJN28 Homogenous Network IEEE REFERENCE
Control and
Implementation
DOMAIN : DISTRIBUTE COMPUTING(j)
CODE PROJECT TITLE DESCRIPTION REFERENCE
SJD01 Detecting Malicious IEEE-2009
Packet Losses
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
35.
TTA Final year projects by IT professionals
SJD02 A Distributed Stream IEEE-2009
Query Optimization
Framework through
Integrated Planning
and Deployment
SJD03 QUIVER Consistent IEEE-2008
Object Sharing For
Edge Services
SJD04 Efficient and Secure IEEE-2008
Content Processing
and Distribution by
Cooperative
Intermediaries
SJD05 Efficient and Secure IEEE-2008
Content Processing
and Distribution by
Cooperative
Intermediaries
SJD06 Distributed cache IEEE-2006
updating for the
Dynamic source
routing protocol
DOMAIN : SECURE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SJS01 Flexible Rollback IEEE-2009
Recovery in Dynamic
Heterogeneous Grid
Computing
SJS02 Dynamic Routing with IEEE-2009
Security
Considerations
SJS03 Modeling & IEEE-2008
Automated
Containment of
Worms
SJS04 Controlling IP IEEE-2008
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
36.
TTA Final year projects by IT professionals
Spoofing Through
Inter Domain Packet
Filters
SJS05 Protection of IEEE-2008
Database Security via
Collaborative
Inference Detection
SJS06 A Precise Termination IEEE-2008
Condition of the
Probabilistic Packet
Marking Algorithm
SJS07 An Adaptive IEEE-2007
Programming Model
for Fault-Tolerant
Distributed Computing
SJS08 Hybrid Intrusion IEEE-2007
Detection with
Weighted Signature
Generation over
Anomalous Internet
Episodes (HIDS)
SJS09 Application of BPCS IEEE-2004
steganography to
wavelet compressed
video
DOMAIN : IMAGE PROCESSING
CODE PROJECT TITLE REFERENCE
SJI01 Adaptive Fuzzy IEEE-2009
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
37.
TTA Final year projects by IT professionals
Filtering for Artifact
Reduction in
Compressed Images
and Videos
SJI01 Facial Recognition IEEE-2009
using multisensor
images based on
localized kernel eigen
spaces
SJI03 Face Recognition IEEE-2005
Using Laplacian faces
SJI04 Noise Reduction by IEEE-2006
Fuzzy Image Filtering
Image Processing
SJI05 Online Handwritten IEEE-2004
Script Recognition
Image Processing
SJI06 Structure and Texture IEEE-2004
Filling-In of Missing
Image Blocks in
Wireless Transmission
and Compression App
SJI07 Image Stream IEEE-2006
Transfer Using Real-
Time Transmission
Protocol
SJI08 Personal Identification IEEE-2003
Based On Iris Texture
Analysis
SJI09 Personal IEEE-2006
Authentication Using
3-D Finger Geometry
SJI10 Image Compression IEEE REFERENCE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
38.
TTA Final year projects by IT professionals
and De-compression
SJI11 Java water marking IEEE REFERNCE
and image combustion
DOMAIN : DATA MINING
SJDM01 Online Index IEEE-2008
Recommendations for
High-Dimensional
Databases Using
Query Workloads
SJDM02 A Signature-Based IEEE-2008
Indexing Method for
Efficient Content-
Based Retrieval of
Relative Temporal
Pattern
SJDM03 An Efficient IEEE-2008
Association Rule
Mining Algorithm In
Distributed Databases
SJDM04 Truth Discovery with IEEE-2008
multiple Conflicting
Information Providers
on web
SJDM05 ODAM: An Optimized IEEE-2004
Distributed Association
Rule Mining Algorithm
SJDM06 GHIC A Hierarchical IEEE-2005
Pattern-Based
Clustering Algorithm
for Grouping Web
Transactions
DOMAIN : MULTIMEDIA
CODE PROJECT TITLE DESCRIPTION REFERENCE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
39.
TTA Final year projects by IT professionals
SJMUO1 Mobile Agents In IEEE-2004
Distributed Multimedia
Database Systems
DOMAIN : MOBILE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDM01 A Gen2-based RFID IEEE-2009
Authentication
Protocol for Security
and Privacy
SDM02 A Tabu Searching IEEE
Algorithm For Cluster
Building in Wireless
Sensor Networks
SDM03 Biased Random Walks IEEE
in Uniform Wireless
Networks
SDM04 Cell Breathing IEEE
Techniques for Load
Balancing in Wireless
LANs
SDM05 Greedy Routing with IEEE
Anti-Void Traversal for
Wirless Sensor
Networks
SDM06 Information Content- IEEE
Based Sensor
Selection and
Transmission Power
Adjustment for
Collaborative Target
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
40.
TTA Final year projects by IT professionals
Tracking
SDM07 Local Construction of IEEE
Near-Optimal Power
Spanners for Wireless
Ad Hoc Networks
SDM08 On the Planning of IEEE
Wireless Sensor
Networks Energy-
Efficient Clustering
under the Joint Rout
SDM09 Random Cast An IEEE
Energy Efficient
Communication
Scheme for Mobile Ad
Hoc Networks
SDM10 Route Stability in IEEE
MANETs under the
Random Direction
Mobility Model
SDM11 Large Connectivity for IEEE
Dynamic Random
Geometric Graphs
DOMAIN : NETWORK COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDN01 Analysis of Shortest IEEE-2009
Path Routing for Large
Multi-Hop Wireless
Networks
SDN02 Delay Analysis for IEEE-2009
Maximal Scheduling
With Flow Control in
Wireless Networks
With Bursty Traffic
SDN03 Explicit Load IEEE-2009
Balancing Technique
for NGEO Satellite Ip
Networks With On-
Board Processing
Capabilities
SDN04 Resequencing Analysis IEEE-2009
of Stop-and-Wait ARQ
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
41.
TTA Final year projects by IT professionals
for Parallel
Multichannel
Communications
SDN05 PRESTO Feedback- IEEE-2009
Driven Data
Management in
Sensor Networks
SDN06 Resource Allocation in IEEE-2009
OFDMA Wireless
Communications
Systems Supporting
Multimedia Services
SDN07 Secure and Policy- IEEE-2009
Complaint Source
Routing
SDN08 Single-Link Failure IEEE-2009
Detection in All-
Optical Networks
Using
SDN09 Two Blocking IEEE-2009
Algorithm on Adaptive
Binary Splitting Single
and Pair Resolutions
for RFID Tag
Identification
SDN10 Virus Spread in IEEE-2009
Networks
SDN11 Rate Allocation & IEEE-2008
Network Lifetime
Problem for Wireless
Sensor Networks
SDN12 Probabilistic Packet IEEE-2008
Marking For Large
Scale IP Trace Back
SDN13 Statistical Techniques IEEE-2008
for Detecting Traffic
Anomalies through
Packet Header Data
SDN14 Efficient Broadcasting IEEE-2005
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
42.
TTA Final year projects by IT professionals
with Guaranteed
Coverage in Mobile Ad
Hoc Networks
SDN15 Multiple Ant Colonies IEEE REFERNCE
Optimization for Load
Balancing in
Distributed Systems
DOMAIN : DISTRIBUTE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDD01 Compaction of IEEE-2009
Schedules and a Two-
Stage Approach for
Duplication-Based
DAG Scheduling
SDD02 Enforcing Minimum- IEEE-2009
Cost Multicast Routing
against Shelfish
Information Flows
SDD03 Movement-Assisted IEEE-2009
Connectivity
Restoration in
Wireless Sensor and
SDD04 HBA Distributed IEEE
Metadata Management
for Large Cluster-
Based Storage
Systems
DOMAIN : SECURE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDS01 Performance of IEEE-2009
Orthogonal
Fingerprinting Codes
under Worst-Case
Noise
SDS02 Spread-Spectrum IEEE-2009
Watermarking
Security
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
43.
TTA Final year projects by IT professionals
SDS03 The Effectiveness of IEEE-2009
Checksums for
Embedded Control
Networks
SDS04 On the Security of IEEE-2009
Route Discovery in
MANETs
SDS05 Steganography for IEEE REFERNCE
Hiding Data in Wave
Audio Files
SDS06 Hiding messages in IEEE REFERNCE
the Noise of a Picture
DOMAIN : IMAGE PROCESSING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDJ01 Adaptive Fuzzy IEEE-2009
Filtering for Artifact
Reduction in
Compressed Images
and Videos
SDJ02 Facial Recognition IEEE-2009
using multisensor
images based on
localized kernel eigen
spaces
SDJ03 Active Learning IEEE-2008
Methods for
Interactive Image
Retrieval
SDJ04 Vision Based IEEE-2008
Processing For Real-
Time 3-D Data
Acquisition Based On
Coded Structured
Light
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
44.
TTA Final year projects by IT professionals
SDJ05 Efficient 2-D IEEE-2008
Grayscale
Morphological
Transformations With
Arbitraly Flat
Structuring Elements
SDJ06 Image Processing IEEE-2006
Techniques for the
Detection and
Removal of Cracks in
Digitized Paintings
SDJ07 Neural Networks IEEE-2004
for Unicode Optical
Character Recognition
SDJ08 Back Propagation IEEE REFERENCE
Neural Network for
Image Recognition
SDJ09 Image Processing for IEEE REFERENCE
Edge Detection
SDJ10 Hopfield model of IEEE REFERENCE
neural network for
pattern recognition
DOMAIN :
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDDM01 Hardware enhanced IEEE-2008
association rule
mining with Hashing
and Pipelining
SDDM02 Watermarking IEEE-2008
Relational Databases
Using Optimization
Based Techniques
SDDM03 Workflow Mining IEEE-2004
Discovering Process
Models from Event
Logs
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
45.
TTA Final year projects by IT professionals
DOMAIN : NETWORKING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDN01 Efficient Routing In IEEE 2008
Intermittently
Connected Mobile
Networks The Multiple
Copy Case
DOMAIN : MULTIMEDIA
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDMU01 Orthogonal Data IEEE2008
Embedding for
Binary Images in
Morphological
Transform Domain-
A High-Capacity
Approach
DOMAIN : TRANSPORTATION SYSTEM
CODE PROJECT TITLE REFERENCE
SDT01 Fuzzy Control Model IEEE-2008
Optimization for
Behavior-Constent
Traffic Routing
Under Information
Provision
DOMAIN : SOFTWARE ENGINEERING
CODE PROJECT TITLE DESCRIPTION REFERENCE
SDSE01 Estimation of IEEE-2008
Defects Based On
Defect Decay Model
ED3M
DOMAIN : DATA MINING
CODE PROJECT TITLE DESCRIPTION
REFERENCE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
46.
TTA Final year projects by IT professionals
JJD01 Answering Frequent IEEE
Probabilistic Inference
Queries in Databases
JJD02 A Dual Framework and IEEE
Algorithms for
Targeted Online Data
Delivery
JJD03 A Fuzzy Self- IEEE
Constructing Feature
Clustering Algorithm
for Text Classification
JJD04 A Link-Analysis IEEE
Extension of
Correspondence
Analysis for Mining
RDs
JJD05 Adaptive Cluster IEEE
Distance Bounding for
High Dimensional
Indexing
JJD06 Adaptive Provisioning IEEE
of Human Expertise in
Service-oriented
Systems
JJD07 Data Integrity Proofs IEEE
in Cloud Storage
JJD08 Decision Trees for IEEE
Uncertain Data
JJD09 Discovering IEEE
Conditional Functional
Dependencies
JJD10 Effective Navigation of IEEE
Query Results Based
on Concept
Hierarchies
JJD11 Efficient Computation IEEE
of Range Aggregates
against Uncertain
Location Based
Queries
JJD12 Exploring Application- IEEE
Level Semantics for
Data Compression
JJD13 Extended XML Tree IEEE
Pattern Matching:
Theories and
Algorithms
JJD14 Improving Aggregate IEEE
Recommendation
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
47.
TTA Final year projects by IT professionals
Diversity Using
Ranking-Based
Techniques
JJD15 Integration of Sound IEEE
Signature in Graphical
Password
Authentication System
JJD16 Learning Semi- IEEE
Riemannian Metrics
for Semi supervised
Feature Extraction
JJD17 One Size Does Not Fit IEEE
All: Towards User- and
Query-Dependent
Ranking For Web
Databases
JJD18 Ranking Spatial Data IEEE
by Quality Preferences
JJD19 Scalable Learning of IEEE
Collective Behavior
JJD20 The CoQUOS IEEE
Approach to
Continuous Queries in
Unstructured Overlays
JJD21 The World in a IEEE
Nutshell:Concise
Range Queries
JJD22 Estimating the IEEE
Helpfulness and
Economic Impact of
Product Reviews:
MiningText and
Reviewer
Characteristics
JJD23 Publishing Search IEEE
Logs – A Comparative
Study of Privacy
Guarantees
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
48.
TTA Final year projects by IT professionals
DOMAIN : CLOUD COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJC01 Going Back and Forth: IEEE
Efficient
Multideployment and
Multisnapshotting on
Clouds
JJC02 Improving Utilization IEEE
of Infrastructure
JJC03 26 Secure and IEEE
Practical Outsourcing
of Linear Programming
in Cloud Computing
JJC04 Optimal service pricing IEEE
for a cloud cache
JJC05 Automated IEEE
Certification for
Compliant Cloud-
based Business
Processes
DOMAIN : SERVICE COMPUTING
CODE PROJECT TITLE DESCRIPTION
REFERENCE
JJS01 Vulnerability Analysis IEEE
in SOA-based
Business Processes
DOMAIN : WEB SERVICE
CODE PROJECT TITLE DESCRIPTION
REFERENCE
JJW01 A Personalized IEEE
Ontology Model for
Web Information
Gathering
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
49.
TTA Final year projects by IT professionals
DOMAIN : MOBILE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJM01 A Privacy-Preserving IEEE
Location Monitoring
System for Wireless
Sensor Networks
JJM02 Optimal Stochastic IEEE
Location Updates in
Mobile Ad Hoc
Networks
JJM03 Supporting Efficient IEEE
and Scalable
Multicasting over
Mobile Ad Hoc
Networks
JJM04 Throughput IEEE
Optimization in Mobile
Backbone Networks
JJM05 Load Shedding in IEEE
Mobile Systems with
MobiQual
JJM06 Cognitive Radio based IEEE
Wireless Sensor
Network Architecture
for Smart Grid Utility
JJM07 A Cooperative IEEE
Diversity- Based
Robust MAC Protocol
in Wireless Ad Hoc
JJM08 Performance C IEEE
haracterization for
IEEE 802.11p Network
With Single Channel
Devices
JJM09 Energy Efficiency of IEEE
MAC protocols in
Wireless Sensor
Networks
JJM10 Energy efficient IEEE
localized routing
algorithm for Wireless
Sensor Networks
JJM011 Energy Efficient IEEE
Routing Protocol for
Wireless Sensor
Networks with Node
and Sink
Mobility
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
50.
TTA Final year projects by IT professionals
JJM012 Dynamic Location IEEE
Update Scheme for
Mobile Sinks in
Wireless Sensor
Networks
JJM013 98 Modeling and IEEE
Improving TCP
Performance over
Cellular Link with
Variable Bandwidth
JJM014 Expected Routing IEEE
Overhead for Location
Service in MANETs
under Flat Geographic
Routing
JJM015 Temporal Link IEEE
Signature
Measurements for
Location Distinction
DOMAIN : NETWORK AND SERVICE MANAGEMENT
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJN01 Locating Equivalent IEEE
Servants over P2P
Networks
DOMAIN : NETWORK COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJN01 Improved division by IEEE
invariant integers
DOMAIN : PARALLEL AND DISTRIBUTED COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
51.
TTA Final year projects by IT professionals
JJP01 A Generic Framework IEEE
for Three-Factor
Authentication:
Preserving Security and
Privacy in Distributed
Systems
JJP02 Exploiting Dynamic IEEE
Resource Allocation for
Efficient Parallel Data
Processing in the
Cloud
DOMAIN : SECURE COMPUTING
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJS01 A Distributed Algorithm IEEE
for Finding All Best
Swap Edges of a
Minimum Diameter
Spanning Tree
JJS02 A Fault-Tolerant Token- IEEE
Based Atomic
Broadcast Algorithm
JJS03 A Policy Enforcing IEEE
Mechanism for Trusted
Ad Hoc Networks
JJS04 A Tamper-Resistant IEEE
Programming Language
System
JJS05 Adaptive Fault Tolerant IEEE
QoS Control Algorithms
for Maximizing System
Lifetime of
Query-Based Wireless
Sensor Networks
JJS06 Balancing Revocation IEEE
and Storage Trade-Offs
in Secure Group
Communication
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
52.
TTA Final year projects by IT professionals
JJS07 Chip Self-Organization IEEE
and Fault-Tolerance in
Massively Defective
Multicore Arrays
JJS08 Comparative Evaluation IEEE
of Spoofing Defenses
JJS09 48 Mechanism Design- IEEE
Based Secure Leader
Election Model for
Intrusion Detection in
MANET
JJS10 Modeling and Detection IEEE
of Camouflaging Worm
JJS11 Nymble: Blocking IEEE
Misbehaving Users in
Anonymizing Networks
JJS12 RITAS: Services for IEEE
Randomized Intrusion
Tolerance
JJS13 Robust Correlation of IEEE
Encrypted Attack Traffic
through Stepping
Stones by Flow
Watermarking
JJS14 SAT: A Security IEEE
Architecture
AchievingAnonymity
and Traceability in
Wireless Mesh
Networks
JJS15 The Geometric Efficient IEEE
Matching Algorithm for
Firewalls
JJS16 Analyzing a Family of IEEE
Key Protection
Schemes against
Modification Attacks
JJS17 Distributed Detection of IEEE
Clone Attacks in
Wireless Sensor
Network
JJS18 Prime: Byzantine IEEE
Replication under
Attack
JJS19 Securing Topology IEEE
Maintenance Protocols
for Sensor Networks
JJS20 ELMO: Energy Aware IEEE
Local Monitoring in
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
53.
TTA Final year projects by IT professionals
Sensor Networks
DOMAIN : SOFTWARE ENGINEERING
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJSE01 A Comparative Study of IEEE
Software Model
Checkers as Unit
Testing Tools:An
Industrial Case
Study
JJSE02 Developing a Single IEEE
Model and Test
Prioritization Strategies
for Event-Driven
Software
JJSE03 Genetic Algorithms for IEEE
Randomized Unit
Testing
JJSE04 Semi-Proving: An IEEE
Integrated Method for
Program Proving,
Testing, and Debugging
JJSE05 Software Module IEEE
Clustering as a Multi–
Objective Search
Problem
JJSE06 The Awareness IEEE
Network, To Whom
Should I Display My
Actions? And, Whose
Actions
Should I Monitor?
JJSE07 Verifying the Evolution IEEE
of Probability
Distributions Governed
by a DTMC
DOMAIN : WIRELESS COMMUNICATION
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
54.
TTA Final year projects by IT professionals
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJW01 A Spatiotemporal IEEE
Approach for Secure
Range Queries in Tiered
Sensor Networks
JJW02 A Threshold-Selective IEEE
Multiuser Downlink
MACscheme for
802.11n Wireless
Networks
JJW03 Blind Channel IEEE
Estimation for STBC
Systems Using Higher-
Order Statistics
JJW04 Distributed Adaptation IEEE
of Quantized Feedback
for Downlink Network
MIMO Systems
JJW05 Fundamental Limits of IEEE
Information
Dissemination in
Wireless Ad Hoc
Networks–Part II:
Multi-Packet Reception
JJW06 Generalized Analysis of IEEE
a Distributed Energy
Efficient Algorithm for
Change Detection
JJW07 Improving the IEEE
Performance of Wireless
Ad Hoc Networks
Through MAC Layer
Design
JJW08 Network Coding Based IEEE
Privacy Preservation
against Traffic Analysis
in Multi-hop Wireless
Networks
JJW09 Throughput IEEE
Optimization in High
Speed DownlinkPacket
Access (HSDPA)
JJW10 Utility-Optimal Multi- IEEE
Pattern Reuse in Multi-
Cell Networks
JJW11 Weighted Energy IEEE
Detection for
Noncoherent Ultra-
Wideband Receiver
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
55.
TTA Final year projects by IT professionals
Design
DOMAIN : NETWORKING
CODE PROJECT TITLE DESCRIPTION REFERENCE
JJN01 A Unified Approach to IEEE
Optimizing Performance
in Networks serving
Heterogeneous
Flows
JJN02 Buffer Sizing for 802.11 IEEE
Based Networks
JJN03 Continuous Neighbor IEEE
Discovery in
Asynchronous Sensor
Networks
JJN04 Delay Analysis and IEEE
Optimality of
Scheduling Policies for
Multi-Hop Wireless
Networks
JJN05 Is Cloned Code older IEEE
than Non-Cloned Code?
JJN06 Jamming-Aware Traffic IEEE
Allocation for Multiple-
Path Routing Using
Portfolio Selection
JJN07 Live Streaming with IEEE
Receiver-based Peer-
division Multiplexing
JJN08 Monitoring Service IEEE
Systems from a
Language-Action
Perspective
JJN09 ProgME: Towards IEEE
Programmable Network
Measurement
JJN10 Selfish Overlay Network IEEE
Creation and
Maintenance
JJN11 SPAF: Stateless FSA- IEEE
based Packet Filters
JJN12 Topological IEEE
Transformation
Approaches to TCAM-
Based Packet
Classification
JJN13 Achieving Bounded IEEE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
56.
TTA Final year projects by IT professionals
Matching Delay and
Maximized Throughput
in Information
MATLAB
Scalable Face Image Retrieval with Identity-
JM01 Based IEEE 2011
Quantization and Multi-Reference Re-ranking
No-Reference Metric Design With Machine
JM02 Learning for Local Video Compression Artifact IEEE 2011
Level
Enhanced Assessment of the Wound-Healing
JM03 Process by Accurate Multiview Tissue IEEE 2011
Classification
Enhanced Assessment of the Wound-Healing
JM04 Process by Accurate Multiview Tissue IEEE 2011
Classification
Face Recognition by Exploring Information
JM05 Jointly in Space, Scale and Orientation IEEE 2011
Mixture of Gaussians-Based Background
JM06 Subtraction for Bayer-Pattern Image IEEE 2011
Sequences
A Novel 3-D Color Histogram Equalization
JM07 Method With Uniform 1-D Gray Scale IEEE 2011
Histogram
Color Extended Visual Cryptography
JM08 Using Error Diffusion IEEE 2011
Using a Visual Discrimination Model for the
JM09 Detection of Compression Artifacts in Virtual IEEE 2011
Pathology Images
Detection of Architectural Distortion
JM10 in Prior Mammograms IEEE 2011
A Differential Geometric Approach to
JM11 Automated Segmentation of Human Airway IEEE 2011
Tree
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
57.
TTA Final year projects by IT professionals
A Supervised Framework for the
JM12 Registration and Segmentation of White IEEE 2011
Matter Fiber Tracts
Curvature Interpolation Method for Image
JM13 Zooming IEEE 2011
IMAGE Resolution Enhancement by Using
JM14 Discrete and IEEE 2011
Stationary Wavelet Decomposition
Text Segmentation for MRC Document
JM16 Compression IEEE 2011
NON IEEE
JNIEEJD01 Airline Reservation System
JNIEEJD02 Appointment Scheduler
JNIEEJD03 B2C-Ecommerce Portal
JNIEEJD04 E RP for Small Business
JNIEEJD05 Workflow Automation System
JNIEEJD06 Website Search Engine
JNIEEJD07 Web portal for Internet and Intranet
JNIEEJD08 Warehouse Management System
JNIEEJD09 Webportal on online community System
JNIEEJD10 Travel Management System
JNIEEJD11 Payroll Processing System
JNIEEJD12 Resume Tracking Sys tem
JNIEEJD13 Purchase Order System
JNIEEJD14 Online File Uploading System
JNIEEJD15 Quality Function Deployment
JNIEEJD16 Operation Scheduling
JNIEEJD17 Online-Shopping
JNIEEJD18 Banking
JNIEEJD19 Browsing Centre Automation
JNIEEJD20 Boutique Management System
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
58.
TTA Final year projects by IT professionals
JNIEEJD21 Call Management System
JNIEEJD22 Cement Dealer Management System
JNIEEJD23 Civil supply maintenance System
JNIEEJD24 Consensus of commission agency
JNIEEJD25 Electricity
JNIEEJD26 Firm Management system
JNIEEJD27 Hotel Management System
JNIEEJD28 Insurance
JNIEEJD29 Journal Management
JNIEEJD30 L IC
JNIEEJD31 Management Information System
JNIEEJD32 Mobile service Provider System
JNIEEJD33 Multiplexx
JNIEEJD34 Production and Planning Control
JNIEEJD35 Project Cargo
JNIEEJD36 Stock Inventory System
JNIEEJD37 Super Market
JNIEEJD38 Trade Management System
JNIEEJD39 B U S Reservation System
JNIEEJD40 IT Tutor Automation
JNIEEJD41 Online Certification Exam
JNIEEJD42 Civil Registry System
JNIEEJD43 Hospital Medi Fedora
JNIEEJD44 Budget Analyzer
JNIEEJD45 Centralized Vendor Management Portal
JNIEEJD46 Digital Library Management System
JNIEEJD47 Railway Management System
JNIEEJD48 Sniffer Mail
JNIEEJD49 Bar Coding System
JNIEEJD50 E-Fund Transfer
JNIEEJD51 Chat Engine in E-Banking
JNIEEJD52 FTP and S MTP Server
SYSTEM /NETWORK PROJECT TITLE
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in
59.
TTA Final year projects by IT professionals
JNIEENS01 Advanced File Splitter and Merger(System)
JNIEENS02 ATM Network Simulation(System)
JNIEENS03 Communication Management Protocol Library
JNIEENS04 COOL-PIE(System)
JNIEENS05 Enumerating Login Session(System)
JNIEENS06 Execute Application on Remote System(System)
JNIEENS07 Firewall Protection(System)
JNIEENS08 File Management(System)
JNIEENS09 File Transfer(System)
JNIEENS10 File Watch(System)
JNIEENS11 File Spy(System)
JNIEENS12 HTTP Tunneling(System)
JNIEENS13 Image Compression(System)
JNIEENS14 Image Compression Using Port (System)
JNIEENS15 HTML Editor (Application)
JNIEENS16 J-Messenger(Application)
JNIEENS17 Net Watchman(System)
JNIEENS18 NetBIOS Enumerator(System)
JNIEENS19 Network Analyzer(System)
JNIEENS20 Mini Server(System)
JNIEENS21 Port Scanner(System)
JNIEENS22 Proxy Server
JNIEENS23 Remote Control PC Through Internet
JNIEENS24 Remote Control PC Through LAN
JNIEENS25 Remote Processes and Machine Control
We are open to prepare and guide any new ideas
on any domain/Technology. If you have any
topics that should be done, please send the topic
to leads@talhunt.co.in
For base paper and detailed discussion, call 89397 22135 |
89397 22145 | 044 4218 1385
Web: www.talhunt.co.in