SlideShare a Scribd company logo
1 of 59
Download to read offline
TTA
   FINAL YEAR PROJECTS TITLES
         WITH ABSTRACT

   IEEE 2011, 2010, 2009, 2008 , etc…

  Projects for B.E/B.Tech/M.E/Bsc/Msc

For complete base paper, call now and talk
              to our expert

89397 22135 | 89397 22145 | 044 4218 1385
TTA                                                    Final year projects by IT professionals



                              JAVA - DOMAIN : MOBILE COMPUTING


CODE      PROJECT TITLE               DESCRIPTION                                      REFERENCE


YJM01     Reliability Improvement     A new interference management scheme is
          Using Receive Mode          proposed to improve the reliability of
          Selection in the Device-    a device-to-device (D2D)
          to-Device Uplink Period     communication in the uplink (UL) period wit      IEEE 2011
          Under laying Cellular       hout reducing the power of cellular user
          Networks                    equipment (UE). To improve
                                      the reliability of the D2D receiver, two
                                      conventional receive techniques and one
                                      proposed method are introduced. One

YJM02     Map-Based Location and      Technical enhancements                           IEEE 2011
          Tracking in Multipath       of mobile technologies are paving the way to
          Outdoor Mobile Networks     the definition of high-quality and accurate
                                      geolocation solutions based on data
                                      collected and managed by
                                      GSM/3G networks. We present a technique
                                      that provides geolocation and mobility
                                      prediction both at network and service level,
                                      does not require any change to the
                                      existing mobile network infrastructure, and i
                                      s entirely performed on
                                      the mobile network side
YJM03     Distributed lgorithms for   A widely applied strategy for workload           IEEE 2011
          Environment Partitioning    sharing is to equalize the workload assigned
          in Mobile Robotic           to each resource. In mobilemultiagent
          Networks                    systems, this principle directly leads to
                                      equitable partitioning policies whereby: 1)
                                      the environment is equitably divided into
                                      subregions of equal measure; 2) one agent
                                      is assigned to each subregion; and 3) each
                                      agent is responsible for service requests
                                      originating within its own subregion.
YJM04     Photo Retrieval based on    In this paper                                    IEEE 2011
          Spatial Layout with         new photo retrieval system for mobile device
          Hardware Acceleration for   s is proposed. The system can be used to
          Mobile Devices              search for photos withsimilar spatial layouts
                                      efficiently, and it adopts an image
                                      segmentation algorithm that extracts
                                      features of image regions based on K-Means
                                      clustering. Since K-Means is computationally
                                      intensive for real-time applications and
                                      prone to generate clustering

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                      results with local optima,
                                      parallel hardware architectures are designed
                                      to meet the real-time requirement of
                                      the retrieval process.
YJM05     Hop-by-hop Routing in       Wireless Mesh Network (WMN) has become           IEEE 2011
          Wireless Mesh Networks      an important edge network to provide
          with Bandwidth              Internet access to remote areas
          Guarantees                  and wireless connections in a metropolitan
                                      scale. In this paper, we study the problem of
                                      identifying the maximum
                                      available bandwidth path, a fundamental
                                      issue in supporting quality-of-
                                      service in WMNs
YJM06     Cooperating with            The use of smart antennas in multi-              IEEE 2011
          Smartness: Using            hop wireless networks (MWNs) has garnered
          Heterogeneous Smart         significant attention over the last few years.
          Antennas in Multi-hop       While homogeneous MWNs with all nodes
          Wireless Networks           having the same antenna capabilities will
                                      have certain applications, we argue that
                                      MWNs with nodes
                                      having heterogeneous antenna capabilities
                                      are more likely to be the norm due to a
                                      variety of motivating factors.
YJM07     Local Greedy                In recent years, there has been a significant    IEEE 2011
          Approximation for           amount of work done in developing low-
          Scheduling in Multi-hop     complexity schedulingschemes to achieve
          Wireless Networks           high performance in multi-
                                      hop wireless networks. A centralized sub-
                                      optimal schedulingpolicy,
                                      called Greedy Maximal Scheduling (GMS) is
                                      a good candidate because its empirically
                                      observed performance is close to
                                      optimal in a variety of network settings.
YJM08     Network Connectivity        We investigate the communication                 IEEE 2011
          with a Family of Group      range of the nodes necessary
          Mobility Models             for network connectivity, which we call bi-
                                      directional connectivity, in a simple setting.
                                      Unlike in most of existing studies, however,
                                      the locations ormobilities of the nodes may
                                      be correlated through group mobility: Nodes
                                      are broken
                                      into groups, with each groupcomprising the
                                      same number of nodes, and lie on a unit
                                      circle. The locations of the nodes in the
                                      same group are not mutually independent,
                                      but are instead conditionally independent
                                      given the location of the group. We examine
                                      the distribution of the smallest
                                      communication

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


YJM09     Towards Reliable Data       This paper addresses the problem of              IEEE 2011
          Delivery for Highly         delivering data packets for highly dynamic m
          Dynamic Mobile Ad Hoc       obile ad hoc networks in areliable and timely
          Networks                    manner. Most existing ad hoc routing
                                      protocols are susceptible to node mobility,
                                      especially forlarge-scale networks. Driven by
                                      this issue, we propose an efficient Position
                                      based Opportunistic Routing protocol (POR)
                                      which takes advantage of the stateless
                                      property of geographic routing and the
                                      broadcast nature of wireless medium.
YJM10     Local Broadcast             There are two main approaches, static and        IEEE 2011
          Algorithms in Wireless Ad   dynamic, in broadcast algorithms in wireless
          Hoc Networks: Reducing       ad hoc networks. In thestatic
          the Number of               approach, local algorithms determine the sta
          Transmissions               tus (forwarding/non-forwarding) of each
                                      node proactively based on local topology
                                      information and a globally known priority
                                      function. In this paper, we first show
                                      that localbroadcast algorithms based
                                      on the static approach cannot achieve a
                                      good approximation factor to the optimum
                                      solution (an NP-hard problem).
YJM11     A Privacy-Preserving        Monitoring personal locations with a potentia    IEEE 2011
          Location Monitoring         lly untrusted server poses privacy threats to
          System for Wireless         the monitored individuals. To this end, we
          Sensor Networks             propose a privacy-
                                      preserving location monitoring system for wi
                                      reless sensornetworks. In our system, we
                                      design two in-
                                      network location anonymization algorithms,
                                      namely, resource and quality-aware
                                      algorithms, that aim to enable the system to
                                      provide high-
                                      quality location monitoring services forsyste
                                      m users,
                                      while preserving personal location privacy
YJM12     Optimal Stochastic          We consider                                      IEEE 2011
          Location Updates in         the location service in a mobile ad-
          Mobile Ad Hoc Networks      hoc network (MANET), where each node
                                      needs to maintain itslocation information by
                                      1) frequently updating
                                      its location information within its
                                      neighboring region, which is called
                                      neighborhood update (NU), and 2)
                                      occasionally updating its location information
                                      to certain
                                      distributedlocation server in the network,
                                      which is called location server update (LSU).

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                     Final year projects by IT professionals


YJM13     Supporting Efficient and       Group communications are important              IEEE 2011
          Scalable Multicasting over     in Mobile Ad hoc Networks (MANETs).
          Mobile Ad Hoc Networks         Multicast is an efficient method for
                                         implementing group communications.
                                         However, it is challenging to
                                         implement efficient and scalable multicast in
                                         MANET due to the difficulty in group
                                         membership management and multicast
                                         packet forwarding over a dynamic topology.
                                         We propose a novel Efficient Geographic
                                         Multicast Protocol (EGMP).




                   JAVA - DOMAIN : KNOWLEDGE AND DATA ENGINEERING

CODE         PROJECT TITLE                           DESCRIPTION                         REFERENCE

YJK01        Motion Segmentation            Group communications are important           IEEE 2011
             using the Hadamard             in Mobile Ad hoc Networks (MANETs).
             Product and Spectral           Multicast is an efficient method for
             Clustering                     implementing group communications.
                                            However, it is challenging to
                                            implement efficient and scalable multicas
                                            t in MANET due to the difficulty in group
                                            membership management and multicast
                                            packet forwarding over a dynamic
                                            topology

YJK02        A Unified Probabilistic        In this paper, we formalize the              IEEE 2011
             Framework for Name             problem in a unified probabilisticframewo
             Disambiguation in Digital      rk, which incorporates both attributes
             Library                        and relationships. Specifically, we
                                            define a disambiguationobjective
                                            function for the problem and
                                            propose a two-step parameter estimation
                                            algorithm. We also investigate adynamic
                                            approach for estimating the number of
                                            people K.
YJK03        Improving Aggregate            In this paper, we introduce and explore a    IEEE 2011
             Recommendation                 number of item ranking techniques that
             Diversity                      can generate recommendations that
             Using Ranking-Based            have substantially
             Techniques                     higher aggregate diversity across all
                                            users while maintaining comparable
                                            levels of recommendation accuracy.
                                            Comprehensive empirical evaluation
                                            consistently shows the diversity gains of

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          the proposed techniques using several
                                          real-world rating datasets and different
                                          rating prediction algorithms.

YJK04        Publishing Search Logs –     In this paper we analyze algorithms           IEEE 2011
             A Comparative Study of       for publishing frequent keywords, queries
             Privacy Guarantees           and clicks of a search log. We first show
                                          how methods that achieve variants of k-
                                          anonymity are vulnerable to active
                                          attacks. We then demonstrate that the
                                          stronger guarantee ensured by epsilon-
                                          differential privacy unfortunately does
                                          not provide any utility for this problem.
                                          We then propose a novel algorithm
                                          ZEALOUS and show how to set its
                                          parameters to achieve (epsilon, delta)-
                                          probabilistic privacy.
YJK05        Cluster Oriented             This paper presents a                         IEEE 2011
             Ensemble Classifier:         novel cluster oriented ensemble classifier
             Impact of Multi-cluster      . The proposed ensemble classifier is
             Characterization on          based onoriginal concepts such
             Ensemble Classifier          as learning of cluster boundaries by the
             Learning.                    base classifiers and
                                          mapping of clusterconfidences to class
                                          decision using a fusion classifier. The
                                          categorised data set is characterised into
                                          multipleclusters and fed to a
                                          number of distinctive base classifiers.
YJK06        Visual Role Mining: A        This paper offers a new role engineering      IEEE 2011
             Picture Is Worth a           approach to Role-Based Access Control
             Thousand Roles               (RBAC), referred to as visualrole mining.
                                          The key idea is to graphically represent
                                          user-permission assignments to enable
                                          quick analysis and elicitation of
                                          meaningful roles. First, we formally
                                          define the problem by
                                          introducing a metric for the quality of the
                                          visualization.
YJK07        A Knowledge-Driven           This paper introduces a knowledge-            IEEE 2011
             Approach to Activity         driven approach to real-time,
             Recognition in Smart         continuous activity recognition based on
             Homes                        multi-sensor data
                                          streams in smart homes.
                                          The approach goes beyond the
                                          traditional data-centric methods
                                          for activityrecognition in three ways.
                                          Firstly, it makes extensive use of
                                          domain knowledge in the lifecycle
                                          of activityrecognition. Secondly, it uses

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          ontologies for explicit context
                                          and activity modeling and
                                          representation. Thirdly and finally, it
                                          exploits semantic reasoning and
                                          classification for activity inferencing, thus
                                          enabling both coarse-grained and fine-
                                          grained activity recognition.
YJK08        Finding Top-k Answers in     in this paper, we study how to integrate        IEEE 2011
             Keyword Search over          multiple related tuple units to
             Relational Databases         effectively answerkeyword queries. To
             Using Tuple Units            achieve a high performance, we devise
                                          two novel indexes, single-keyword-based
                                          structure-aware index and keyword-pair-
                                          based structure-aware index, and
                                          incorporate structural relationships
                                          between different tuple units into the
                                          indexes. We use the indexes to efficiently
                                          identify the answers of
                                          integrated tupleunits.
YJK09        Efficient Iceberg Query              In this paper, we exploited the         IEEE 2011
             Evaluation using                     property of bitmap index and
             Compressed Bitmap Index              developed a very
                                                  effective bitmappruning strategy
                                                  for processing iceberg queries.
                                                  Our index-pruning based
                                                  approach eliminates the need of
                                                  scanning and processing the
                                                  entire data set (table) and thus
                                                  speeds up
                                                  the iceberg query processing
                                                  significantly. Experiments show
                                                  that our approach is much
                                                  more efficient than existing
                                                  algorithms commonly used in
                                                  row-oriented and column-oriented
                                                  databases


YJK10        Improving Security and       in this study, we propose a novel CP-ABE        IEEE 2011
             Efficiency in Attribute-     scheme for a data sharing system by
             Based Data Sharing           exploiting the characteristic of the
                                          system architecture. The proposed
                                          scheme features the following
                                          achievements: (1) the key escrow
                                          problem could be solved by escrow-free
                                          key issuing protocol, (2) fine-grained
                                          user revocation per each attribute could

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          be done by proxy encryption which takes
                                          advantage of the
                                          selective attribute group key distribution
                                          on top of the ABE.
YJK11        Clustering with Multi-       In this paper, we introduce a                  IEEE 2011
             Viewpoint based              novel multi-
             Similarity Measure           viewpoint based similarity measure and
                                          two related clustering methods. The
                                          major difference between a traditional
                                          dissimilarity/similarity measure and ours
                                          is that the former uses only a
                                          single viewpoint, which is the origin,
                                          while the latter utilizes many different
                                          viewpoints, which are objects assumed
                                          to not be in the same cluster with the
                                          two objects being measured. Using
                                          multiple viewpoints, more informative
                                          assessment of similarity could be
                                          achieved.
YJK12        Manifold Adaptive            In this paper, we propose a novel active       IEEE 2011
             Experimental Design for      learning algorithm which is performed in
             Text Categorization          the data manifold adaptive kernel space.
                                          The manifold structure is incorporated
                                          into the kernel space by using graph
                                          Laplacian. This way,
                                          the manifold adaptive kernel space
                                          reflects the underlying geometry of the
                                          data.
YJK13        Multi-resolution Web link     In this paper, we generalize the              IEEE 2011
             analysis using generalised   multiresolution popularity analysis to use
             link relations               any form of Web page link relations. We
                                          provide results for both the
                                          PageRank relations and the In-
                                          degree relations. By utilizing the
                                          multiresolution popularity lists, we
                                          achieve a 13 percent and 25 percent
                                          improvement in mean average precision
                                          over In-degree and PageRank,
                                          respectively.
YJK14        Distributed Processing of    In this paper, we introduce the                IEEE 2011
             Probabilistic Top-k          notion of sufficient set and necessary set
             Queries in Wireless          for distributed processing ofprobabilistic t
             Sensor Networks              op-k queries in cluster-
                                          based wireless sensor networks. These
                                          two concepts have very nice properties
                                          that can facilitate localized data
                                          pruning in clusters. Accordingly, we
                                          develop a suite of algorithms, namely,
                                          sufficient set-based (SSB), necessary

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          set-based (NSB) and boundary-based
                                          (BB), for inter-
                                          cluster queryprocessing with bounded
                                          rounds of communications.
YJK15        Cost-aware rank join with    We address the problem of joining              IEEE 2011
             random and sorted access     ranked results produced by two or more
                                          services on the Web. We consider
                                          services endowed with two kinds
                                          of access that are often available:
                                          i) sorted access, which returns
                                          tuplessorted by score; ii) random access,
                                          which returns tuples matching a
                                          given join attribute
                                          value. Rank joinoperators combine
                                          objects of multiple relations and output
                                          the K combinations with the highest
                                          aggregate score.
YJK16        Joint Top-K Spatial          Web users and content are increasingly         IEEE 2011
             Keyword Query                being geo-positioned, and increased
             Processing                   focus is being given to serving local
                                          content in response to web queries. This
                                          development calls
                                          for spatial keyword queries that take into
                                          account both the locations and textual
                                          descriptions of content. We study the
                                          efficient, joint processing of multiple top-
                                          kspatial keyword queries.
                                          Such joint processing is attractive during
                                          high query loads and also occurs when
                                          multiplequeries are used to obfuscate a
                                          user's true query.
YJK17        Adaptive Provisioning of                                                    IEEE 2011
             Human Expertise
             in Service-oriented
             Systems
YJK18        Improving Aggregate          In this paper, we introduce and explore a      IEEE 2011
             Recommendation               number of item ranking techniques that
             Diversity Using Ranking-     can generate recommendations that
             Based Techniques             have substantially
                                          higher aggregate diversity across all
                                          users while maintaining comparable
                                          levels of recommendation accuracy.
                                          Comprehensive empirical evaluation
                                          consistently shows the diversity gains of
                                          the proposed techniques using several
                                          real-world rating datasets and different
                                          rating prediction algorithms.
YJK19        Publishing Search Logs –     In this paper we analyze algorithms            IEEE 2011
             A Comparative Study of       for publishing frequent keywords, queries

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


             Privacy Guarantees           and clicks of a search log. We first show
                                          how methods that achieve variants of k-
                                          anonymity are vulnerable to active
                                          attacks. We then demonstrate that the
                                          stronger guarantee ensured by epsilon-
                                          differential privacy unfortunately does
                                          not provide any utility for this problem.
YJK20        A Link-Analysis Extension    This work                                     IEEE 2011
             of Correspondence            introduces a link analysis procedure for d
             Analysis for Mining          iscovering relationships
             Relational Databases         in a relational database or a graph,
                                          generalizing both simple and
                                          multiple correspondence analysis. It is
                                          based on a random walk model through
                                          thedatabase defining a Markov chain
                                          having as many states as elements in
                                          the database. Suppose we are interested
                                          in analyzing the relationships between
                                          some elements (or records) contained in
                                          two different
                                          tables ofthe relational database
YJK21        Adaptive Cluster Distance    We consider approaches for similarity         IEEE 2011
             Bounding for High            search in correlated, high-
             Dimensional Indexing         dimensional data sets, which are derived
                                          within a clustering framework. We note
                                          that indexing by “vector approximation”
                                          (VA-File), which was proposed as a
                                          technique to combat the “Curse of
                                          Dimensionality,” employs scalar
                                          quantization, and hence necessarily
                                          ignores dependencies across dimensions,
                                          which represents a source of
                                          suboptimality.
YJK22        Discovering Conditional      In this paper, we present the BioNav          IEEE 2011
             Functional Dependencies      system, a novel search interface that
                                          enables the user to navigate large
                                          number of query results by organizing
                                          them using the MeSH concept hierarchy.
                                          First, the query results are organized into
                                          a navigation tree. At each node
                                          expansion step, BioNav reveals only a
                                          small subset of the concept nodes,
                                          selected such that the expected
                                          user navigationcost is minimized.
YJK23        Effective Navigation of      In this paper, we propose a novel             IEEE 2011
             Query Results Based on       algorithm, called Semisupervised Semi-
             Concept Hierarchies          RiemannianMetric Map (S3RMM),
                                          following the geometric framework
                                          of semi Riemannian manifolds. S3RMM

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          maximizes the discrepancy of the
                                          separability and similarity measures of
                                          scatters formulated by using semi-
                                          Riemannian metric tensors.
YJK24        Learning Semi-               In this paper, we propose a novel            IEEE 2011
             Riemannian Metrics for       algorithm, called Semisupervised Semi-
             Semi supervised Feature      RiemannianMetric Map (S3RMM),
             Extraction                   following the geometric framework
                                          of semi Riemannian manifolds. S3RMM
                                          maximizes the discrepancy of the
                                          separability and similarity measures of
                                          scatters formulated by using semi-
                                          Riemannian metric tensors. The metric
                                          tensor of each sample is learned via
                                          semisupervised regression
YJK25        Load Shedding in Mobile                                                   IEEE 2011
             Systems with Mobi Qual
YJK26        Ranking Spatial Data by      A spatial preference query ranks objects     IEEE 2011
             Quality Preferences          based on the qualities of features in
                                          their spatial neighborhood. For example,
                                          using a real estate agency database of
                                          flats for lease, a customer may want to
                                          rank the flats with respect to the
                                          appropriateness of their location, defined
                                          after aggregating the qualities of other
                                          features (e.g., restaurants, cafes,
                                          hospital, market, etc.) within
                                          their spatial neighborhood. Such a
                                          neighborhood concept can be
                                          specified by the user via different
                                          functions




                                 DOMAIN : NETWORK SECURITY

CODE         PROJECT TITLE                           DESCRIPTION                       REFERENCE

YJS01        Secret Key Agreement                                                      IEEE 2011
             from Vector Gaussian         We investigate
             Sources by Rate Limited      the secret key agreement from correlate
             Public Communication         d vector Gaussian sources in which
                                          legitimate parties can
                                          use public communication with limited ra
                                          te. For the class of protocols with one-
                                          way public communication, we show that

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          the optimal trade-off between
                                          the rate of key generation and
                                          the rate of the publiccommunication is
                                          characterized as an optimization problem
                                          of a Gaussian random variable.
YJS02        Detecting Recompression      In this paper, we present a new              IEEE 2011
             of JPEG Images via           technique to discover traces caused
             Periodicity Analysis of      by recompression. We assume all
             Compression Artifacts for    source images are in JPEG format and
             Tampering Detection          propose to formulate the periodic
                                          characteristics of JPEG images both in
                                          spatial and transform domains. Using
                                          theoretical analysis, we design a
                                          robust detection approach which is able
                                          to detect either block-aligned or
                                          misaligned recompression.
YJS03        Privacy-Preserving ECG       The paper deals with all the                 IEEE 2011
             Classification With          requirements anddifficulties related to
             Branching Programs and       working with data that must stay
             Neural Networks              encrypted during all the computation
                                          steps, including the necessity of
                                          working with fixed point
                                          arithmetic with no truncation while
                                          guaranteeing the same performance of a
                                          floating point implementation in the plain
                                          domain.
YJS04        Restoring Degraded Face      The purpose of this paper is to illustrate   IEEE 2011
             Images: A Case Study in      the complexity
             Matching Faxed, Printed,     of face recognition in such realistic
             and Scanned Photos           scenarios and to provide a viable solution
                                          to it. The contributions of this work are
                                          two-fold. First, a database
                                          of face images is assembled and used to
                                          illustrate the challenges associated
                                          with matching severely degraded face im
                                          ages. Second, a preprocessing scheme
                                          with low computational complexity is
                                          developed in order to eliminate the noise
                                          present in degraded images and restore
                                          their quality.
YJS05        Keys Through ARQ:            This paper develops a novel framework        IEEE 2011
             Theory and Practice          for sharing secret keys using the
                                          Automatic Repeat reQuest (ARQ)
                                          protocol. We first characterize the
                                          underlying information theoretic limits,
                                          under different assumptions on the
                                          channel spatial and temporal correlation
                                          function. Our analysis reveals a novel
                                          role of “dumb antennas” in overcoming

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                           the negative impact of spatial correlation
                                           on the achievable secrecy rates.
YJS06        Digital Image                 It is often desirable to determine if         IEEE 2011
             Authentication From JPEG      an image has been modified in any
             Headers                       way from its original recording.
                                           The JPEGformat affords engineers many
                                           implementation trade-offs which give rise
                                           to widely varying JPEG headers. We
                                           exploit these variations
                                           for image authentication.
YJS07        A Message-Passing             We propose a new paradigm for blind           IEEE 2011
             Approach to Combating         watermark decoding in the presence
             Desynchronization Attacks     of desynchronization attacks. Employing
                                           Forney-style factor graphs to model the
                                           watermarking system, we cast the blind
                                           watermark decoding problem
                                           as a probabilistic inference problem
                                           on a graph, and solve it via message-
                                           passing.
YJS08        Nonlinearity Estimation       We present a radio frequency (RF) front-      IEEE 2011
             for Specific Emitter          end nonlinearity estimator that is based
             Identification in Multipath   on the knowledge of a training sequence
             Channels                      to
                                           perform specific emitter identification (SE
                                           I), which discerns radio emitters of
                                           interest. Design and fabrication
                                           variations provide unique signal
                                           signatures for each emitter, and we
                                           extract those characteristics through
                                           the estimation of
                                           transmitter nonlinearity coefficients.
YJS09        Physical-Layer Secret Key     In thissystem, Alice and Bob                  IEEE 2011
             Agreement in Two-Way          share secret keys generated from
             Wireless Relaying             measured radio propagation
             Systems                       characteristics with the help of the
                                           relay in the presence of an
                                           eavesdropper. We present
                                           four secret key agreement schemes: an
                                           amplify-and-forward (AF) scheme, a
                                           signal-combining amplify-and-forward
                                           (SC-AF) scheme, a multiple-access
                                           amplify-and-forward (MA-AF) scheme,
                                           and an amplify-and-forward with artificial
                                           noise (AF with AN) scheme
YJS10        Secure Type-Based             We consider data confidentiality in a         IEEE 2011
             Multiple Access               distributed detection scenario with
                                           a type-based multiple-access (TBMA)
                                           protocol where a large set of sensors
                                           sends local measurements to an ally

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                          fusion center (FC) over an insecure
                                          wireless medium called the main
                                          channel.
YJS11        Key Agreement Over           In this paper, a                             IEEE 2011
             Multiple Access Channel      generalized multiple access channel (MA
                                          C) model for secret key sharing between
                                          three terminals is considered. In this
                                          model, there are two transmitters and a
                                          receiver where all three terminals receive
                                          noisychannel outputs.
YJS12        Strongly Secure              We consider the problem                      IEEE 2011
             Communications Over the      of secure communications over the two-
             Two-Way Wiretap              way wiretap channel under a strong
             Channel                      secrecy criterion. We improve existing
                                          results by developing an achievable
                                          region based on strategies that exploit
                                          boththe interference
                                          at the eavesdropper's terminal and
                                          cooperation between legitimate users.
YJS13        Using a Knowledge-Based      In this paper, a knowledge-                  IEEE 2011
             Approach to Remove           based (KB) approach, which
             Blocking Artifacts in Skin   simultaneouslyremoves JPEG blocking art
             Images                       ifacts, and recovers skin features, is
             for Forensic Analysis        proposed. Given a training set containing
                                          both original and
                                          compressed skin images, the relationship
                                          between original blocks and compressed
                                          blocks can be established. This prior
                                          information is used to infer the original
                                          blocks of compressed evidence images.
YJS14        Improved Differential        Differential Fault Analysis (DFA) finds      IEEE 2011
             Fault Analysis               the key of a block cipher
             on AES Key Schedule          using differential information between
                                          correct and faulty ciphertexts obtained
                                          by inducing faults during the
                                          computation of ciphertexts. Among many
                                          ciphers Advanced Encryption Standard
                                          (AES) has been the main target of DFA
                                          due to its popularity.
YJS15        Blind Forensics of Median    This paper proposes a novel approach for     IEEE 2011
             Filtering                    detecting median filtering in digitalimage
             in Digital Images            s, which can 1) accurately
                                          detect median filtering in arbitrary image
                                          s, even reliably
                                          detect median filteringin low-resolution
                                          and JPEG compressed images; 2) reliably
                                          detect tampering when part of a median-
                                          filtered imageis inserted into a non-
                                          median-filtered image, or vice versa.

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


YJS16        Improved Radiometric          This paper experimentally                   IEEE 2011
             Identification of             demonstratesimproved identification acc
             Wireless Devices using        uracy and reduced sensitivity
             MIMO Transmission             to identification parameters when such
                                           techniques are applied to the multiple
                                           transmitters within multiple-input
                                           multiple-output devices. It further
                                           studies an information theoretic
                                           technique for determining
                                           which radiometric features are most
                                           effective in discriminating devices and
                                           analyzes the identification performance
                                           as a function of the number of features
                                           used.
YJS17        Robust Image                  We propose a robust quantization-           IEEE 2011
             Watermarking Based on         based image watermarking scheme,
             Multi scale Gradient          called
             Direction Quantization        the gradient direction watermarking(GD
                                           WM), based on the
                                           uniform quantization of
                                           the direction of gradient vectors. In
                                           GDWM, the watermark bits are
                                           embedded by quantizing the angles of
                                           significant gradient vectors at multiple
                                           wavelet scales.


                                      DOMAIN : NETWORKING




CODE    PROJECT TITLE                                                                  REFERENCE

YJS01   Cluster-Based Back-Pressure        the back-pressure algorithmrequires         IEEE 2011
        Routing Algorithm                  routers to maintain a separate queue
                                           for each destination, which precludes its
                                           implementation in large-scale networks.
                                           In this paper, we propose a
                                           distributed cluster-based back-
                                           pressure routing algorithm that retains
                                           the adaptability of back-
                                           pressure routing while significantly
                                           reducing the number of queues that
                                           have to be maintained at each node.
YJS02   Impact of Correlated Mobility on   We extend the analysis of the scaling       IEEE 2011
        Delay-Throughput                   laws of wireless ad hoc networks to the
        Performance in Mobile Ad-Hoc       case of correlated nodes movements,
        Networks                           which are commonly
                                           found in real mobility processes. We

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                           consider a simple version of the
                                           Reference Point
                                           Group Mobility model, in which nodes
                                           belonging to the same group are
                                           constrained to lie in a disc area, whose
                                           center moves uniformly across
                                           the network

YJS03   On the Price of Security in        In this paper, based on a general            IEEE 2011
        Large-Scale Wireless Ad Hoc        random network model, theasymptotic
        Networks                           behaviors of secure throughput and
                                           delay with the common transmission
                                           range rn and the probability
                                           pf of neighboring nodes having a
                                           primary security association are
                                           quantified when the network size n is
                                           sufficiently large. The costs and
                                           benefits of secure-link-augmentation
                                           operations on the secure throughput
                                           and delay are also analyzed.

YJS04   Cross-Layer Designs in Coded       A cross-layer design along with an           IEEE 2011
        Wireless Fading                    optimal resource allocation framework is
        Networks With Multicast            formulated for wireless fadingnetworks,
                                           where the nodes are allowed to
                                           perform network coding. The aim is to
                                           jointly optimize end-to-end transport-
                                           layer rates, network code design variabl
                                           es, broadcast link flows, link capacities,
                                           average power consumption, and short-
                                           term power allocation policies.


YJS05   Link-State Routing With Hop-       This paper settles an open                   IEEE 2011
        by-Hop Forwarding Can Achieve      question with a positive
        Optimal Traffic Engineering        answer: Optimal traffic engineering (or
                                           optimalmulticommodity flow) can be
                                           realized using just link-
                                           state routing protocols with hop-by-
                                           hop forwarding. Today's typical versions
                                           of these protocols, Open Shortest Path
                                           First (OSPF) and Intermediate System-
                                           Intermediate System (IS-IS),
                                           split traffic evenly over shortest paths
                                           based on link weights.



YJS06   Stability and Benefits of          Network utility maximization has been        IEEE 2011

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


        Suboptimal Utility Maximization    widely used to model resource
                                           allocation and network architectures.
                                           However, in practice, often it cannot be
                                           solved optimally due to complexity
                                           reasons. Thus motivated, we address
                                           the following two questions in this
                                           paper: 1)
                                           Can suboptimal utility maximization mai
                                           ntain queue stability? 2) Can
                                           underoptimization of utility objective
                                           function in fact benefit other network
                                           design objectives?

YJS07   A New Estimation Scheme for        Many congestion control protocols have        IEEE 2011
        the Effective Number               been recently proposed in order to
        of Users in Internet Congestion    alleviate the problems encountered by
        Control                            TCP in high-speed networks and
                                           wireless links. Protocols utilizing an
                                           architecture that is in the same spirit
                                           asthe ABR service in ATM networks
                                           require
                                           estimates of the effective number of use
                                           rs utilizing each link in thenetwork to
                                           maintain
                                           stability in the presence of delays. In thi
                                           s paper, we
                                           propose a novel estimation algorithm
                                           that is based on online parameter
                                           identification techniques and is shown
                                           through analysis and simulations to
                                           converge
                                           to the effective number of users utilizing
                                           each link
YJS08   Multichannel Scheduling and        In this paper, we utilize multiple            IEEE 2011
        Spanning Trees: Throughput–        frequency channels and design an
        Delay Tradeoff for Fast            efficient link scheduling protocol that
        DataCollection in Sensor           gives a constant factor approximation
        Networks                           on the optimal throughput in delivering
                                           aggregated data from all the nodes to
                                           the sink. To minimize the
                                           maximum delay subject to a
                                           given throughput bound, we also design
                                           an $(alpha, beta)$-bicriteria
                                           approximation algorithm to construct a
                                           Bounded-Degree Minimum-
                                           Radius Spanning Tree, with the radius
                                           of thetree at most $beta$ times the
                                           minimum possible radius for a given
                                           degree bound $Delta^*$, and the

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                           degree of any node at most $Delta^* +
                                           alpha$ , where $alpha$ and $beta$ are
                                           positive constants.

YJS09   DAC: Generic and Automatic         In this paper, we present DAC,               IEEE 2011
        Address Configuration for Data     a generic andautomatic Data center Add
        Center Networks                    ress Configuration system. With an
                                           automatically generated blueprint that
                                           defines the connections of
                                           servers and switches labeled by logical
                                           IDs, e.g., IP addresses, DAC first learns
                                           the physical topology labeled by device
                                           IDs, e.g., MAC addresses.

YJS10   Distributed -Optimal User          In this paper, we develop a framework        IEEE 2011
        Association and Cell Load          for user association in infrastructure-
        Balancing in Wireless Networks     based wireless networks, specifically
                                           focused on flow-
                                           level cell load balancing under spatially
                                           inhomogeneous traffic distributions. Our
                                           work encompasses several
                                           different user association policies: rate-
                                           optimal, throughput-optimal, delay-
                                           optimal, andload-equalizing, which we
                                           collectively denote $alpha$-
                                           optimal user association.

YJS11   MeasuRouting: A Framework for      Monitoring transit traffic at one or more    IEEE 2011
        Routing Assisted Traffic           points in a network is of interest to
        Monitoring                         network operators for reasons
                                           oftraffic accounting, debugging or
                                           troubleshooting, forensics,
                                           and traffic engineering. Previous
                                           research in the area has focused on
                                           deriving a placement of monitors across
                                           the network toward the end of
                                           maximizing the monitoringutility of the
                                           network
                                           operator for a given traffic routing.
                                           However, both traffic characteristics and
                                           measurement objectives can
                                           dynamically change over time,
                                           rendering a previously optimal
                                           placement of monitors suboptimal.


YJS12   Automatic Generation of            System level modeling is widely              IEEE 2011
        Assertions from System Level       employed at early
        Design Using Data Mining           stages of system development for

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                            simplifying designverification and
                                            architectural
                                            exploration. Assertion based verification
                                            has become a well established
                                            part of RTL verification methodology. In
                                            the traditional assertion based
                                            verification flow, assertions are
                                            manually written. In this paper, we
                                            generate assertions from system level d
                                            esigns using GoldMine,
                                            an automatic assertion generationengin
                                            e that uses data mining and static
                                            analysis.

YJS13   Spatial Correlation and Mobility-   In this paper, a                             IEEE 2011
        Aware Traffic Modeling for          novel trafficmodeling scheme for capturi
        Wireless Sensor Networks            ng these dynamics is proposed that
                                            takes into account the statistical
                                            patterns of
                                            node mobility and spatial correlation.
                                            The contributions made in this paper are
                                            twofold. First, it is shown that the joint
                                            effects
                                            of mobility and spatial correlation can
                                            lead to bursty traffic. More specifically,
                                            high mobilityvariance and small spatial c
                                            orrelation can give rise to pseudo-long-
                                            range-dependent (LRD) traffic (high
                                            burstytraffic), whose autocorrelation
                                            function decays
                                            slowly and hyperbolically up to a certain
                                            cutoff time lag.

YJS14   Jamming-Aware Traffic               Multiple-path source routing protocols       IEEE 2011
        Allocation for Multiple-Path        allow a data source node to distribute
        Routing Using Portfolio             the total traffic among available paths.
        Selection                           In this paper, we consider the problem
                                            of jamming-aware source routing in
                                            which the source node
                                            performs traffic allocation based on
                                            empirical jamming statistics at
                                            individual network nodes. We formulate
                                            thistraffic allocation as a lossy network
                                            flow optimization
                                            problem using portfolio selection theory
                                            from financial statistics.
YJS15   A Unified Approach to               In this work, we develop the                 IEEE 2011
        Optimizing Performance in           mathematical framework and novel
        Networks serving                    design methodologies needed to support

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


        Heterogeneous Flows                such heterogeneous requirements and
                                           propose provably
                                           optimal network algorithms that account
                                           for the multilevel interactions between
                                           the flows. To that end, we first
                                           formulate a network optimization
                                           problem that incorporates the above
                                           throughput and service prioritization
                                           requirements of the two traffic types.
                                           We, then develop a distributed joint
                                           load-balancing and congestion control
                                           algorithm that achieves the dual goal of
                                           maximizing the aggregate utility gained
                                           by the elastic flows while satisfying the
                                           fixed throughput and prioritization
                                           requirements of the inelastic flows

YJS16   Delay Analysis and Optimality      This paper focuses on                       IEEE 2011
        of Scheduling Policies for         designing and analyzing throughput-
        Multi-Hop Wireless Networks        optimal scheduling policies that avoid
                                           using per-flow or per-destination
                                           information, maintain a single data
                                           queue for each link, exploit only local
                                           information, andpotentially improve
                                           the delay performance, for multi-
                                           hop wireless networks under general
                                           interference constraints

YJS17   Selfish Overlay Network            In this paper, we unify the                 IEEE 2011
        Creation and Maintenance           aforementioned thrusts by
                                           defining and studying
                                           the selfish neighbor selection (SNS)
                                           game and its application
                                           to overlay routing. At the heart of SNS
                                           stands the restriction that peers are
                                           allowed up to a certain number of
                                           neighbors. This makes SNS substantially
                                           different from existingnetwork formation
                                           games that impose no bounds on peer
                                           degrees. Having bounded degrees has
                                           important practical consequences as it
                                           permits
                                           the creation of overlay structures that
                                           require $O(n)$ instead of $O(n^2)$link
                                           monitoring overhead.




        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals



                DOMAIN : PARALLEL DISTRIBUTION




CODE      PROJECT TITLE                                                               REFERENCE


YJP01     EBRP: Energy-Balanced            n this paper, enlightened by the           IEEE 2011
          Routing Protocol for Data        concept of potential in common
          Gathering in Wireless Sensor     physics, we design an Energy-
          Networks                         Balanced Routing Protocol (EBRP) by
                                           constructing a mixed virtual potential
                                           field, including depth, energy density
                                           and residual energy to force packets to
                                           move towards the sink through the
                                           dense energy area so as to protect the
                                           nodes with relatively low
                                           residual energy. The design principle
                                           and guidelines are presented in detail.

YJP02     Effective Delay-Controlled       This paper proposes a                      IEEE 2011
          Load Distribution over           new load distribution model aiming to
          Multipath Networks               minimize the difference among end-to-
                                           end delays, thereby reducing
                                           packet delay variation and risk of
                                           packet reordering without
                                           additional network overhead. In
                                           general, the lower the risk of packet
                                           reordering, the smaller
                                           the delay induced by the packet
                                           reordering recovery process, i.e.,
                                           extra delay induced by the packet
                                           reordering recovery process is
                                           expected to decrease.

YJP03     Tracking Dynamic Boundaries      We examine the problem                     IEEE 2011
          using Sensor Network             of tracking dynamic boundaries occurri
                                           ng in natural
                                           phenomena using a network of
                                           range sensors. Two main challenges of
                                           the boundary tracking problem are
                                           accurate boundary estimation from
                                           noisy observations and
                                           continuous tracking of the boundary.
                                           We
                                           propose Dynamic Boundary Tracking (
                                           DBTR), an algorithm that combines the
                                           spatial estimation and temporal

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                           estimation techniques.


YJP04     CACAO: Distributed Client-       In CACAO, the clients feed back traffic     IEEE 2011
          Assisted Channel Assignment      information to their APs. This leads to
          Optimizationfor                  better network condition knowledge
          Uncoordinated WLANs              and
                                           betterchannel assignment decisions at
                                           the APs. We conduct extensive
                                           simulation study and comparisons
                                           using Network Simulator 2 (NS2). Our
                                           results show that CACAO outperforms
                                           other traditional and recent schemes in
                                           terms of TCP and UDP throughputs
                                           with a similar level of fairness.


YJP05     Athanasia: A User-               This article presents Athanasia, a user-    IEEE 2011
          Transparent and Fault-           transparent and fault-
          Tolerant System                  tolerant system, for parallel application
          for Parallel Applications        s running on large-scale
                                           cluster systems. Cluster systems have
                                           been regarded as a de facto standard
                                           to achieve multitera-flop computing
                                           power. These cluster systems, as we
                                           know, have an inherent failure factor
                                           that can cause computation failure. The
                                           reliability issue
                                           in parallel computing systems,
                                           therefore, has been
                                           studied for arelatively long time in the
                                           literature, and we have seen many
                                           theoretical promises arise from the
                                           extensive research.

YJP06     BECAN: A Bandwidth-Efficient     Inthis paper, we                            IEEE 2011
          Cooperative Authentication       propose a novel bandwidth-
          Scheme for Filtering Injected    efficient cooperative authentication (BE
          False Data in Wireless Sensor    CAN) scheme for filteringinjected false
          Networks                         data. Based on the random graph
                                           characteristics of sensor node
                                           deployment and the cooperativebit-
                                           compressed authentication technique,
                                           the proposed BECAN scheme can save
                                           energy by early detecting
                                           andfiltering the majority
                                           of injected false data with minor extra
                                           overheads at the en-route nodes.



        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


YJP07     Delay Constrained Subtree        Virtual world and other                      IEEE 2011
          Homeomorphism Problem            collaborative applications are
          with Applications                increasingly becoming popular among
                                           Internet users. In such applications,
                                           users interact with each other through
                                           digital entities or avatars. In order to
                                           preserve the user experience, it is
                                           important that certain Quality of
                                           Service (QoS) requirements
                                           (e.g. delay, bandwidth) are satisfied by
                                           the interactions. These QoS
                                           requirements are usually defined by
                                           the application designer.
                                           Whenapplications with such QoS
                                           requirements are being deployed on a
                                           network of servers, an appropriate set
                                           of servers capable of satisfying the QoS
                                           constraints of the interactions must be
                                           identified.

YJP08     Efficient communication          In this article we show                      IEEE 2011
          algorithms in hexagonal          the hexagonal mesh networks develope
          mesh interconnection             d in the early 1990s are a special case
          networks                         of the EJnetworks that have been
                                           considered more recently. Using a node
                                           addressing scheme based on the EJ
                                           number system, we give a shortest
                                           path
                                           routing algorithm for hexagonal mesh n
                                           etworks.

YJP09     An Efficient Prediction-based    This paper proposes predict and relay        IEEE 2011
          Routing in Disruption-           (PER), an efficient routing algorithm for
          Tolerant Networks                DTNs, where nodes determine the
                                           probability distribution of future contact
                                           times and choose a proper next-
                                           hop in order to improve the end-to-end
                                           delivery probability. The algorithm
                                           is based on two observations: one is
                                           that nodes usually move around a set
                                           of well-visited landmark points instead
                                           of moving randomly; the other is that
                                           node mobility behavior is semi-
                                           deterministic and could be predicted
                                           once there is sufficient mobility history
                                           information.


YJP10     Bounding the Impact of           Self-stabilization is a versatile approach   IEEE 2011

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


          Unbounded Attacks                to fault-tolerance since it permits a
          in Stabilization                 distributed system to recover from any
                                           transient fault that arbitrarily
                                           corrupts the contents of all
                                           memories in the system. Byzantine
                                           tolerance is an attractive
                                           feature of distributed systems that
                                           permits to cope with arbitrary
                                           malicious behaviors. Combining these
                                           two properties proved difficult: it is
                                           impossible to
                                           contain the spatial impact of Byzantine
                                           nodes in a self-stabilizing context for
                                           global tasks such as tree orientation
                                           and tree construction.

YJP11     Stability Analysis of            In this paper, we propose a policy that     IEEE 2011
          Reservation-Based                allows links to transmit data in any
          Scheduling Policies in           future frame by means of frame
          Wireless Networks                reservations. The new, reservation-
                                           based distributed scheduling approach
                                           will improve the capacity of the system
                                           and provide greater throughput.

YJP12     Fast Secure Communications       This paper proposes three                   IEEE 2011
          in Shared Memory                 authentication schemes to remove
          Multiprocessor Systems           those security vulnerabilities. First, we
                                           prevent replay attacks on data
                                           messages by inserting Request Counter
                                           (RC) into request messages. Second,
                                           we also use RC to detect integrity
                                           attacks on control messages. Third, we
                                           propose a new counter, referred to as
                                           GCC Counter (GC), to protect the
                                           global counter messages. We simulated
                                           our design with SPLASH-2 benchmarks
                                           on up to 16-
                                           processor sharedmemory multiprocess
                                           or systems by using Simics with
                                           Wisconsin multifacet General
                                           Execution-
                                           drivenMultiprocessor Simulator
                                           (GEMS).




        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                 DOMAIN : IMAGE PROCESSING

CODE      PROJECT TITLE                    DESCRIPTION                                 REFERENCE

YJI01     A Generalized Accelerated           This paper                               IEEE 2011
          Proximal Gradient Approach          proposes a generalized accelerated
          for Total Variation-Based           proximal gradient (GAPG) approach
          Image Restoration                    for solving total variation(TV)-
                                              based image restoration problems.
                                              The GAPG algorithm generalizes the
                                              original APG algorithm by replacing
                                              the Lipschitz constant with an
                                              appropriate positive-definite matrix,
                                              resulting in faster
                                              convergence. For TV-
                                              basedimage restoration problems,
                                              we further introduce two auxiliary
                                              variables that approximate the
                                              partial derivatives. Constraints on
                                              the variables can easily be imposed
                                              without modifying the algorithm
                                              much, and the TV regularization
                                              can be either isotropic or
                                              anisotropic.

YJI02     Residues Cluster Based              In this paper,                           IEEE 2011
          Segmentation and Outlier-           the phase unwrappingproblem is
          Detection Method for Large-         abstracted as solving a large-
          Scale Phase Unwrapping              scale system of inconsistent linear
                                              equations. With the difficulties
                                              oflarge-
                                              scale phase unwrapping analyzed, L
                                              0
                                               -norm criterion is found to have
                                              potentials in efficient image
                                              tiling andsplicing. Making use of the
                                              clustering characteristic
                                              of residue distribution, a tiling
                                              strategy is proposed for L0-norm
                                              criterion. Unfortunately, L0-norm is
                                              an NP-hard problem, which is very
                                              difficult to find an exact solution in
                                              a polynomial time.

YJI03     An a priori shading correction   Digital imaging devices are increasingly    IEEE 2011
          technique for contact imaging    used for color measurements in fields
          devices                          such as forensics, the food industry,
                                           and ecological and medical research.
                                           Especially concerning the skin, in the
                                           follow-up of benign or malignant

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


                                           lesions, it is crucial to ensure that the
                                           measured colors are accurate and
                                           reproducible. Several color calibration
                                           methods having been presented over
                                           the last few years
YJI04     Spread Spectrum Image                Efficient image watermark calls for     IEEE 2011
          Watermarking Based on                full exploitation of
          Perceptual Quality Metric            the perceptual distortion constraint.
                                               Second-order statistics of visual
                                               stimuli are regarded as critical
                                               features for perception. This paper
                                               proposes a second-order statistics
                                               (SOS) based image quality metric,
                                               which considers the texture
                                               masking effect and the contrast
                                               sensitivity in Karhunen-Loève
                                               transform domain.

YJI05     Memory-Efficient Architecture       Hysteresis thresholding is a method      IEEE 2011
          for Hysteresis Thresholding         that offers
          and Object Feature Extraction       enhanced object detection. Due to
                                              its recursive nature, it is time
                                              consuming and requires a lot
                                              of memory resources. This makes it
                                              avoided in streaming processors
                                              with limitedmemory. We propose
                                              two versions of a memory-
                                              efficient and fast architecture for hy
                                              steresis thresholding: a high-
                                              accuracy pixel-
                                              based architecture and a faster
                                              block-based one at the expense of
                                              some loss in the accuracy.

YJI06     Generalized Random Walks            In this paper, we propose a novel        IEEE 2011
          for Fusion of Multi-Exposure        probabilistic model-
          Images                              based fusion technique for multi-
                                              exposure images. Unlike
                                              previousmulti-
                                              exposure fusion methods, our
                                              method aims to achieve an optimal
                                              balance between two quality
                                              measures, i.e., local contrast and
                                              color consistency, while combining
                                              the scene details revealed under
                                              different exposures.

YJI07     Edge Strength Filter Based          We propose an orientation-               IEEE 2011
          Color Filter Array                  free edge strength lter and apply it

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


          Interpolation                       to the demosaicing
                                              problem. Edge strength lter output
                                              is utilized both to improve the initial
                                              green channel interpolation and to
                                              apply the constant color dierence
                                              rule adaptively. This
                                              simple edge directed method yields
                                              visually pleasing results with high
                                              CPSNR.

YJI08     Towards a Unified Color             mage processing methods that              IEEE 2011
          Space for Perception-Based          utilize characteristics of the human
          Image Processing                    visual system
                                              require color spaces with certain
                                              properties to operate effectively.
                                              After analyzing different types
                                              of perception-
                                              based image processingproblems,
                                              we present a list of
                                              properties a unified color space sho
                                              uld have. Due to contradictory
                                              perceptual phenomena and
                                              geometric
                                              issues a color space cannot
                                              incorporate all these properties.

YJI09     Model-guided Adaptive            In compressive sensing (CS) a                IEEE 2011
          Recovery of Compressive          challenge is to find a space in which
          Sensing                          the signal is sparse and hence
                                           recoverable faithfully. Since many
                                           natural signals such as images have
                                           locally varying statistics, the sparse
                                           space varies in time/spatial domain. As
                                           such, CS recovery should be conducted
                                           in locally adaptive, signal-dependent
                                           spaces to counter the fact that the CS
                                           measurements are global and
                                           irrespective of signal structures


DOMAIN : MOBILE COMPUTING

CODE      PROJECT TITLE                                                                 REFERENCE

YDM01     Providing Secure Integrity in    IEEE
          Peer-to-peer Oriented Mobile
          Environments
YDM02     RAM: Rate Adaptation in          IIEEE
          Mobile Environments

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
TTA                                                    Final year projects by IT professionals


YDM03     Robust Relative Location         IEEE
          Estimation in Wireless Sensor
          Networks with Inexact
          Position Problems
YDM04     On the Cost of Knowledge of      IEEE
          Mobility in
          Dynamic Networks: An
          Information-Theoretic
          Approach
YDM05     A Novel MAC Scheme for           IEEE
          Multi-Channel Cognitive Radio
          Ad Hoc Networks
YDM06     Efficient Virtual Backbone       IEEE
          Construction with Routing
          Cost Constraint in Wireless
          Networks using Directional
          Antennas
YDM07     Color Based Fruits               IIEEE
          Classification Using GPU
YDM08     Wireless Multicast               IEEE
          Optimization : A Cross-Layer
          Approach
YDM09     Web Content Recommender          IEEE
          System based on Consumer
          Behavior Modeling
YDM10     STORM: A Framework for           IEEE
          Integrated Routing,
          Scheduling and Traffic
          Management in Ad Hoc
          Networks
YDM11     Throughput Optimization in       IEEE
          Mobile Backbone Networks


DOMAIN : KNOWLEDGE AND DATA ENGINEERING

CODE      PROJECT TITLE                    DESCRIPTION                                REFERENCE

YDK01     Motion Segmentation in the       IEEE
          Presence of Outlying,
          Incomplete, or Corrupted
          Trajectories
YDK02     Segmentation and Sampling        IIEEE
          of Moving Object
          Trajectories based on
          Representativeness
YDK03     A Query Formulation              IEEE
          Language for the Data Web
YDK04     Optimizing Multiway Joins in     IEEE

        For base paper and detailed discussion, call 89397   22135 |
        89397 22145 | 044 4218 1385
        Web: www.talhunt.co.in
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download
 Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download

More Related Content

What's hot

Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Random access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocellRandom access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocellIJECEIAES
 

What's hot (6)

Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
J0525460
J0525460J0525460
J0525460
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network Environment
 
Ss Ton 2008 Final
Ss Ton 2008 FinalSs Ton 2008 Final
Ss Ton 2008 Final
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Random access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocellRandom access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocell
 

Viewers also liked

A signature based indexing method for efficient content-based retrieval of re...
A signature based indexing method for efficient content-based retrieval of re...A signature based indexing method for efficient content-based retrieval of re...
A signature based indexing method for efficient content-based retrieval of re...Mumbai Academisc
 
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...
Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...guest0bcdde
 
App indexing at #SMXParis 2015
App indexing at #SMXParis 2015App indexing at #SMXParis 2015
App indexing at #SMXParis 2015Alexandre Jubien
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexingDaryl Superio
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentationlmartin8
 

Viewers also liked (9)

A signature based indexing method for efficient content-based retrieval of re...
A signature based indexing method for efficient content-based retrieval of re...A signature based indexing method for efficient content-based retrieval of re...
A signature based indexing method for efficient content-based retrieval of re...
 
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...
Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...
 
App indexing at #SMXParis 2015
App indexing at #SMXParis 2015App indexing at #SMXParis 2015
App indexing at #SMXParis 2015
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexing
 
Indexing
IndexingIndexing
Indexing
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
 
What is Document Indexing? A tutorial for intelligent data capture.
What is Document Indexing? A tutorial for intelligent data capture.What is Document Indexing? A tutorial for intelligent data capture.
What is Document Indexing? A tutorial for intelligent data capture.
 
Types of indexes
Types of indexesTypes of indexes
Types of indexes
 

Similar to Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access NetworksRANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networksijwmn
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networksIEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEEMEMTECHSTUDENTPROJECTS
 
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...SBGC
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK IJORCS
 
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...SBGC
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkIJASCSE
 
emulation of wireless networks
emulation of wireless networksemulation of wireless networks
emulation of wireless networkssubhishanu
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 

Similar to Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download (20)

Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
27 30
27 3027 30
27 30
 
Ms2420992102
Ms2420992102Ms2420992102
Ms2420992102
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access NetworksRANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
RANSlicing: Towards Multi-Tenancy in 5G Radio Access Networks
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
Mobile computing java ieee projects 2012 Seabirds ( Chennai, Pondicherry, Vel...
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
 
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
05173187
0517318705173187
05173187
 
emulation of wireless networks
emulation of wireless networksemulation of wireless networks
emulation of wireless networks
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 

More from Suresh Radhakrishnan

Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...Suresh Radhakrishnan
 
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
IEEE final year projects  in chennai,MATLAB projects in chennai,Engineering P...IEEE final year projects  in chennai,MATLAB projects in chennai,Engineering P...
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...Suresh Radhakrishnan
 
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...Suresh Radhakrishnan
 
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...Suresh Radhakrishnan
 
Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...
Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...
Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...Suresh Radhakrishnan
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project....Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...Suresh Radhakrishnan
 
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...Suresh Radhakrishnan
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project....Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...Suresh Radhakrishnan
 
Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...Suresh Radhakrishnan
 
Final year projects in chennai,IEEE 2011 projects titles,TTA
Final year projects in chennai,IEEE 2011 projects titles,TTAFinal year projects in chennai,IEEE 2011 projects titles,TTA
Final year projects in chennai,IEEE 2011 projects titles,TTASuresh Radhakrishnan
 

More from Suresh Radhakrishnan (13)

Project titles abstract
Project titles abstractProject titles abstract
Project titles abstract
 
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
 
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
IEEE final year projects  in chennai,MATLAB projects in chennai,Engineering P...IEEE final year projects  in chennai,MATLAB projects in chennai,Engineering P...
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
 
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
 
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
 
Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...
Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...
Ns2 projects in chennai,.Net projects in chennai,IEEE 2011 titles,IEEE 2012 t...
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project....Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...
 
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
 
Project titles abstract
Project titles abstractProject titles abstract
Project titles abstract
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project....Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...
 
Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...
 
Java J2ee project IEEE titles
Java J2ee project IEEE titlesJava J2ee project IEEE titles
Java J2ee project IEEE titles
 
Final year projects in chennai,IEEE 2011 projects titles,TTA
Final year projects in chennai,IEEE 2011 projects titles,TTAFinal year projects in chennai,IEEE 2011 projects titles,TTA
Final year projects in chennai,IEEE 2011 projects titles,TTA
 

Recently uploaded

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

Java J2EE project titles, .NET project titles with abstract,Java J2EE project titles with abstract,Mobile computing projects in chennai,Knowledge and Data engineering projects,IEEE Network security projects in chennai,IEEE 2011 titles base paper download

  • 1. TTA FINAL YEAR PROJECTS TITLES WITH ABSTRACT IEEE 2011, 2010, 2009, 2008 , etc… Projects for B.E/B.Tech/M.E/Bsc/Msc For complete base paper, call now and talk to our expert 89397 22135 | 89397 22145 | 044 4218 1385
  • 2. TTA Final year projects by IT professionals JAVA - DOMAIN : MOBILE COMPUTING CODE PROJECT TITLE DESCRIPTION REFERENCE YJM01 Reliability Improvement A new interference management scheme is Using Receive Mode proposed to improve the reliability of Selection in the Device- a device-to-device (D2D) to-Device Uplink Period communication in the uplink (UL) period wit IEEE 2011 Under laying Cellular hout reducing the power of cellular user Networks equipment (UE). To improve the reliability of the D2D receiver, two conventional receive techniques and one proposed method are introduced. One YJM02 Map-Based Location and Technical enhancements IEEE 2011 Tracking in Multipath of mobile technologies are paving the way to Outdoor Mobile Networks the definition of high-quality and accurate geolocation solutions based on data collected and managed by GSM/3G networks. We present a technique that provides geolocation and mobility prediction both at network and service level, does not require any change to the existing mobile network infrastructure, and i s entirely performed on the mobile network side YJM03 Distributed lgorithms for A widely applied strategy for workload IEEE 2011 Environment Partitioning sharing is to equalize the workload assigned in Mobile Robotic to each resource. In mobilemultiagent Networks systems, this principle directly leads to equitable partitioning policies whereby: 1) the environment is equitably divided into subregions of equal measure; 2) one agent is assigned to each subregion; and 3) each agent is responsible for service requests originating within its own subregion. YJM04 Photo Retrieval based on In this paper IEEE 2011 Spatial Layout with new photo retrieval system for mobile device Hardware Acceleration for s is proposed. The system can be used to Mobile Devices search for photos withsimilar spatial layouts efficiently, and it adopts an image segmentation algorithm that extracts features of image regions based on K-Means clustering. Since K-Means is computationally intensive for real-time applications and prone to generate clustering For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 3. TTA Final year projects by IT professionals results with local optima, parallel hardware architectures are designed to meet the real-time requirement of the retrieval process. YJM05 Hop-by-hop Routing in Wireless Mesh Network (WMN) has become IEEE 2011 Wireless Mesh Networks an important edge network to provide with Bandwidth Internet access to remote areas Guarantees and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of- service in WMNs YJM06 Cooperating with The use of smart antennas in multi- IEEE 2011 Smartness: Using hop wireless networks (MWNs) has garnered Heterogeneous Smart significant attention over the last few years. Antennas in Multi-hop While homogeneous MWNs with all nodes Wireless Networks having the same antenna capabilities will have certain applications, we argue that MWNs with nodes having heterogeneous antenna capabilities are more likely to be the norm due to a variety of motivating factors. YJM07 Local Greedy In recent years, there has been a significant IEEE 2011 Approximation for amount of work done in developing low- Scheduling in Multi-hop complexity schedulingschemes to achieve Wireless Networks high performance in multi- hop wireless networks. A centralized sub- optimal schedulingpolicy, called Greedy Maximal Scheduling (GMS) is a good candidate because its empirically observed performance is close to optimal in a variety of network settings. YJM08 Network Connectivity We investigate the communication IEEE 2011 with a Family of Group range of the nodes necessary Mobility Models for network connectivity, which we call bi- directional connectivity, in a simple setting. Unlike in most of existing studies, however, the locations ormobilities of the nodes may be correlated through group mobility: Nodes are broken into groups, with each groupcomprising the same number of nodes, and lie on a unit circle. The locations of the nodes in the same group are not mutually independent, but are instead conditionally independent given the location of the group. We examine the distribution of the smallest communication For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 4. TTA Final year projects by IT professionals YJM09 Towards Reliable Data This paper addresses the problem of IEEE 2011 Delivery for Highly delivering data packets for highly dynamic m Dynamic Mobile Ad Hoc obile ad hoc networks in areliable and timely Networks manner. Most existing ad hoc routing protocols are susceptible to node mobility, especially forlarge-scale networks. Driven by this issue, we propose an efficient Position based Opportunistic Routing protocol (POR) which takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. YJM10 Local Broadcast There are two main approaches, static and IEEE 2011 Algorithms in Wireless Ad dynamic, in broadcast algorithms in wireless Hoc Networks: Reducing ad hoc networks. In thestatic the Number of approach, local algorithms determine the sta Transmissions tus (forwarding/non-forwarding) of each node proactively based on local topology information and a globally known priority function. In this paper, we first show that localbroadcast algorithms based on the static approach cannot achieve a good approximation factor to the optimum solution (an NP-hard problem). YJM11 A Privacy-Preserving Monitoring personal locations with a potentia IEEE 2011 Location Monitoring lly untrusted server poses privacy threats to System for Wireless the monitored individuals. To this end, we Sensor Networks propose a privacy- preserving location monitoring system for wi reless sensornetworks. In our system, we design two in- network location anonymization algorithms, namely, resource and quality-aware algorithms, that aim to enable the system to provide high- quality location monitoring services forsyste m users, while preserving personal location privacy YJM12 Optimal Stochastic We consider IEEE 2011 Location Updates in the location service in a mobile ad- Mobile Ad Hoc Networks hoc network (MANET), where each node needs to maintain itslocation information by 1) frequently updating its location information within its neighboring region, which is called neighborhood update (NU), and 2) occasionally updating its location information to certain distributedlocation server in the network, which is called location server update (LSU). For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 5. TTA Final year projects by IT professionals YJM13 Supporting Efficient and Group communications are important IEEE 2011 Scalable Multicasting over in Mobile Ad hoc Networks (MANETs). Mobile Ad Hoc Networks Multicast is an efficient method for implementing group communications. However, it is challenging to implement efficient and scalable multicast in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology. We propose a novel Efficient Geographic Multicast Protocol (EGMP). JAVA - DOMAIN : KNOWLEDGE AND DATA ENGINEERING CODE PROJECT TITLE DESCRIPTION REFERENCE YJK01 Motion Segmentation Group communications are important IEEE 2011 using the Hadamard in Mobile Ad hoc Networks (MANETs). Product and Spectral Multicast is an efficient method for Clustering implementing group communications. However, it is challenging to implement efficient and scalable multicas t in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology YJK02 A Unified Probabilistic In this paper, we formalize the IEEE 2011 Framework for Name problem in a unified probabilisticframewo Disambiguation in Digital rk, which incorporates both attributes Library and relationships. Specifically, we define a disambiguationobjective function for the problem and propose a two-step parameter estimation algorithm. We also investigate adynamic approach for estimating the number of people K. YJK03 Improving Aggregate In this paper, we introduce and explore a IEEE 2011 Recommendation number of item ranking techniques that Diversity can generate recommendations that Using Ranking-Based have substantially Techniques higher aggregate diversity across all users while maintaining comparable levels of recommendation accuracy. Comprehensive empirical evaluation consistently shows the diversity gains of For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 6. TTA Final year projects by IT professionals the proposed techniques using several real-world rating datasets and different rating prediction algorithms. YJK04 Publishing Search Logs – In this paper we analyze algorithms IEEE 2011 A Comparative Study of for publishing frequent keywords, queries Privacy Guarantees and clicks of a search log. We first show how methods that achieve variants of k- anonymity are vulnerable to active attacks. We then demonstrate that the stronger guarantee ensured by epsilon- differential privacy unfortunately does not provide any utility for this problem. We then propose a novel algorithm ZEALOUS and show how to set its parameters to achieve (epsilon, delta)- probabilistic privacy. YJK05 Cluster Oriented This paper presents a IEEE 2011 Ensemble Classifier: novel cluster oriented ensemble classifier Impact of Multi-cluster . The proposed ensemble classifier is Characterization on based onoriginal concepts such Ensemble Classifier as learning of cluster boundaries by the Learning. base classifiers and mapping of clusterconfidences to class decision using a fusion classifier. The categorised data set is characterised into multipleclusters and fed to a number of distinctive base classifiers. YJK06 Visual Role Mining: A This paper offers a new role engineering IEEE 2011 Picture Is Worth a approach to Role-Based Access Control Thousand Roles (RBAC), referred to as visualrole mining. The key idea is to graphically represent user-permission assignments to enable quick analysis and elicitation of meaningful roles. First, we formally define the problem by introducing a metric for the quality of the visualization. YJK07 A Knowledge-Driven This paper introduces a knowledge- IEEE 2011 Approach to Activity driven approach to real-time, Recognition in Smart continuous activity recognition based on Homes multi-sensor data streams in smart homes. The approach goes beyond the traditional data-centric methods for activityrecognition in three ways. Firstly, it makes extensive use of domain knowledge in the lifecycle of activityrecognition. Secondly, it uses For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 7. TTA Final year projects by IT professionals ontologies for explicit context and activity modeling and representation. Thirdly and finally, it exploits semantic reasoning and classification for activity inferencing, thus enabling both coarse-grained and fine- grained activity recognition. YJK08 Finding Top-k Answers in in this paper, we study how to integrate IEEE 2011 Keyword Search over multiple related tuple units to Relational Databases effectively answerkeyword queries. To Using Tuple Units achieve a high performance, we devise two novel indexes, single-keyword-based structure-aware index and keyword-pair- based structure-aware index, and incorporate structural relationships between different tuple units into the indexes. We use the indexes to efficiently identify the answers of integrated tupleunits. YJK09 Efficient Iceberg Query In this paper, we exploited the IEEE 2011 Evaluation using property of bitmap index and Compressed Bitmap Index developed a very effective bitmappruning strategy for processing iceberg queries. Our index-pruning based approach eliminates the need of scanning and processing the entire data set (table) and thus speeds up the iceberg query processing significantly. Experiments show that our approach is much more efficient than existing algorithms commonly used in row-oriented and column-oriented databases YJK10 Improving Security and in this study, we propose a novel CP-ABE IEEE 2011 Efficiency in Attribute- scheme for a data sharing system by Based Data Sharing exploiting the characteristic of the system architecture. The proposed scheme features the following achievements: (1) the key escrow problem could be solved by escrow-free key issuing protocol, (2) fine-grained user revocation per each attribute could For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 8. TTA Final year projects by IT professionals be done by proxy encryption which takes advantage of the selective attribute group key distribution on top of the ABE. YJK11 Clustering with Multi- In this paper, we introduce a IEEE 2011 Viewpoint based novel multi- Similarity Measure viewpoint based similarity measure and two related clustering methods. The major difference between a traditional dissimilarity/similarity measure and ours is that the former uses only a single viewpoint, which is the origin, while the latter utilizes many different viewpoints, which are objects assumed to not be in the same cluster with the two objects being measured. Using multiple viewpoints, more informative assessment of similarity could be achieved. YJK12 Manifold Adaptive In this paper, we propose a novel active IEEE 2011 Experimental Design for learning algorithm which is performed in Text Categorization the data manifold adaptive kernel space. The manifold structure is incorporated into the kernel space by using graph Laplacian. This way, the manifold adaptive kernel space reflects the underlying geometry of the data. YJK13 Multi-resolution Web link In this paper, we generalize the IEEE 2011 analysis using generalised multiresolution popularity analysis to use link relations any form of Web page link relations. We provide results for both the PageRank relations and the In- degree relations. By utilizing the multiresolution popularity lists, we achieve a 13 percent and 25 percent improvement in mean average precision over In-degree and PageRank, respectively. YJK14 Distributed Processing of In this paper, we introduce the IEEE 2011 Probabilistic Top-k notion of sufficient set and necessary set Queries in Wireless for distributed processing ofprobabilistic t Sensor Networks op-k queries in cluster- based wireless sensor networks. These two concepts have very nice properties that can facilitate localized data pruning in clusters. Accordingly, we develop a suite of algorithms, namely, sufficient set-based (SSB), necessary For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 9. TTA Final year projects by IT professionals set-based (NSB) and boundary-based (BB), for inter- cluster queryprocessing with bounded rounds of communications. YJK15 Cost-aware rank join with We address the problem of joining IEEE 2011 random and sorted access ranked results produced by two or more services on the Web. We consider services endowed with two kinds of access that are often available: i) sorted access, which returns tuplessorted by score; ii) random access, which returns tuples matching a given join attribute value. Rank joinoperators combine objects of multiple relations and output the K combinations with the highest aggregate score. YJK16 Joint Top-K Spatial Web users and content are increasingly IEEE 2011 Keyword Query being geo-positioned, and increased Processing focus is being given to serving local content in response to web queries. This development calls for spatial keyword queries that take into account both the locations and textual descriptions of content. We study the efficient, joint processing of multiple top- kspatial keyword queries. Such joint processing is attractive during high query loads and also occurs when multiplequeries are used to obfuscate a user's true query. YJK17 Adaptive Provisioning of IEEE 2011 Human Expertise in Service-oriented Systems YJK18 Improving Aggregate In this paper, we introduce and explore a IEEE 2011 Recommendation number of item ranking techniques that Diversity Using Ranking- can generate recommendations that Based Techniques have substantially higher aggregate diversity across all users while maintaining comparable levels of recommendation accuracy. Comprehensive empirical evaluation consistently shows the diversity gains of the proposed techniques using several real-world rating datasets and different rating prediction algorithms. YJK19 Publishing Search Logs – In this paper we analyze algorithms IEEE 2011 A Comparative Study of for publishing frequent keywords, queries For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 10. TTA Final year projects by IT professionals Privacy Guarantees and clicks of a search log. We first show how methods that achieve variants of k- anonymity are vulnerable to active attacks. We then demonstrate that the stronger guarantee ensured by epsilon- differential privacy unfortunately does not provide any utility for this problem. YJK20 A Link-Analysis Extension This work IEEE 2011 of Correspondence introduces a link analysis procedure for d Analysis for Mining iscovering relationships Relational Databases in a relational database or a graph, generalizing both simple and multiple correspondence analysis. It is based on a random walk model through thedatabase defining a Markov chain having as many states as elements in the database. Suppose we are interested in analyzing the relationships between some elements (or records) contained in two different tables ofthe relational database YJK21 Adaptive Cluster Distance We consider approaches for similarity IEEE 2011 Bounding for High search in correlated, high- Dimensional Indexing dimensional data sets, which are derived within a clustering framework. We note that indexing by “vector approximation” (VA-File), which was proposed as a technique to combat the “Curse of Dimensionality,” employs scalar quantization, and hence necessarily ignores dependencies across dimensions, which represents a source of suboptimality. YJK22 Discovering Conditional In this paper, we present the BioNav IEEE 2011 Functional Dependencies system, a novel search interface that enables the user to navigate large number of query results by organizing them using the MeSH concept hierarchy. First, the query results are organized into a navigation tree. At each node expansion step, BioNav reveals only a small subset of the concept nodes, selected such that the expected user navigationcost is minimized. YJK23 Effective Navigation of In this paper, we propose a novel IEEE 2011 Query Results Based on algorithm, called Semisupervised Semi- Concept Hierarchies RiemannianMetric Map (S3RMM), following the geometric framework of semi Riemannian manifolds. S3RMM For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 11. TTA Final year projects by IT professionals maximizes the discrepancy of the separability and similarity measures of scatters formulated by using semi- Riemannian metric tensors. YJK24 Learning Semi- In this paper, we propose a novel IEEE 2011 Riemannian Metrics for algorithm, called Semisupervised Semi- Semi supervised Feature RiemannianMetric Map (S3RMM), Extraction following the geometric framework of semi Riemannian manifolds. S3RMM maximizes the discrepancy of the separability and similarity measures of scatters formulated by using semi- Riemannian metric tensors. The metric tensor of each sample is learned via semisupervised regression YJK25 Load Shedding in Mobile IEEE 2011 Systems with Mobi Qual YJK26 Ranking Spatial Data by A spatial preference query ranks objects IEEE 2011 Quality Preferences based on the qualities of features in their spatial neighborhood. For example, using a real estate agency database of flats for lease, a customer may want to rank the flats with respect to the appropriateness of their location, defined after aggregating the qualities of other features (e.g., restaurants, cafes, hospital, market, etc.) within their spatial neighborhood. Such a neighborhood concept can be specified by the user via different functions DOMAIN : NETWORK SECURITY CODE PROJECT TITLE DESCRIPTION REFERENCE YJS01 Secret Key Agreement IEEE 2011 from Vector Gaussian We investigate Sources by Rate Limited the secret key agreement from correlate Public Communication d vector Gaussian sources in which legitimate parties can use public communication with limited ra te. For the class of protocols with one- way public communication, we show that For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 12. TTA Final year projects by IT professionals the optimal trade-off between the rate of key generation and the rate of the publiccommunication is characterized as an optimization problem of a Gaussian random variable. YJS02 Detecting Recompression In this paper, we present a new IEEE 2011 of JPEG Images via technique to discover traces caused Periodicity Analysis of by recompression. We assume all Compression Artifacts for source images are in JPEG format and Tampering Detection propose to formulate the periodic characteristics of JPEG images both in spatial and transform domains. Using theoretical analysis, we design a robust detection approach which is able to detect either block-aligned or misaligned recompression. YJS03 Privacy-Preserving ECG The paper deals with all the IEEE 2011 Classification With requirements anddifficulties related to Branching Programs and working with data that must stay Neural Networks encrypted during all the computation steps, including the necessity of working with fixed point arithmetic with no truncation while guaranteeing the same performance of a floating point implementation in the plain domain. YJS04 Restoring Degraded Face The purpose of this paper is to illustrate IEEE 2011 Images: A Case Study in the complexity Matching Faxed, Printed, of face recognition in such realistic and Scanned Photos scenarios and to provide a viable solution to it. The contributions of this work are two-fold. First, a database of face images is assembled and used to illustrate the challenges associated with matching severely degraded face im ages. Second, a preprocessing scheme with low computational complexity is developed in order to eliminate the noise present in degraded images and restore their quality. YJS05 Keys Through ARQ: This paper develops a novel framework IEEE 2011 Theory and Practice for sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits, under different assumptions on the channel spatial and temporal correlation function. Our analysis reveals a novel role of “dumb antennas” in overcoming For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 13. TTA Final year projects by IT professionals the negative impact of spatial correlation on the achievable secrecy rates. YJS06 Digital Image It is often desirable to determine if IEEE 2011 Authentication From JPEG an image has been modified in any Headers way from its original recording. The JPEGformat affords engineers many implementation trade-offs which give rise to widely varying JPEG headers. We exploit these variations for image authentication. YJS07 A Message-Passing We propose a new paradigm for blind IEEE 2011 Approach to Combating watermark decoding in the presence Desynchronization Attacks of desynchronization attacks. Employing Forney-style factor graphs to model the watermarking system, we cast the blind watermark decoding problem as a probabilistic inference problem on a graph, and solve it via message- passing. YJS08 Nonlinearity Estimation We present a radio frequency (RF) front- IEEE 2011 for Specific Emitter end nonlinearity estimator that is based Identification in Multipath on the knowledge of a training sequence Channels to perform specific emitter identification (SE I), which discerns radio emitters of interest. Design and fabrication variations provide unique signal signatures for each emitter, and we extract those characteristics through the estimation of transmitter nonlinearity coefficients. YJS09 Physical-Layer Secret Key In thissystem, Alice and Bob IEEE 2011 Agreement in Two-Way share secret keys generated from Wireless Relaying measured radio propagation Systems characteristics with the help of the relay in the presence of an eavesdropper. We present four secret key agreement schemes: an amplify-and-forward (AF) scheme, a signal-combining amplify-and-forward (SC-AF) scheme, a multiple-access amplify-and-forward (MA-AF) scheme, and an amplify-and-forward with artificial noise (AF with AN) scheme YJS10 Secure Type-Based We consider data confidentiality in a IEEE 2011 Multiple Access distributed detection scenario with a type-based multiple-access (TBMA) protocol where a large set of sensors sends local measurements to an ally For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 14. TTA Final year projects by IT professionals fusion center (FC) over an insecure wireless medium called the main channel. YJS11 Key Agreement Over In this paper, a IEEE 2011 Multiple Access Channel generalized multiple access channel (MA C) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisychannel outputs. YJS12 Strongly Secure We consider the problem IEEE 2011 Communications Over the of secure communications over the two- Two-Way Wiretap way wiretap channel under a strong Channel secrecy criterion. We improve existing results by developing an achievable region based on strategies that exploit boththe interference at the eavesdropper's terminal and cooperation between legitimate users. YJS13 Using a Knowledge-Based In this paper, a knowledge- IEEE 2011 Approach to Remove based (KB) approach, which Blocking Artifacts in Skin simultaneouslyremoves JPEG blocking art Images ifacts, and recovers skin features, is for Forensic Analysis proposed. Given a training set containing both original and compressed skin images, the relationship between original blocks and compressed blocks can be established. This prior information is used to infer the original blocks of compressed evidence images. YJS14 Improved Differential Differential Fault Analysis (DFA) finds IEEE 2011 Fault Analysis the key of a block cipher on AES Key Schedule using differential information between correct and faulty ciphertexts obtained by inducing faults during the computation of ciphertexts. Among many ciphers Advanced Encryption Standard (AES) has been the main target of DFA due to its popularity. YJS15 Blind Forensics of Median This paper proposes a novel approach for IEEE 2011 Filtering detecting median filtering in digitalimage in Digital Images s, which can 1) accurately detect median filtering in arbitrary image s, even reliably detect median filteringin low-resolution and JPEG compressed images; 2) reliably detect tampering when part of a median- filtered imageis inserted into a non- median-filtered image, or vice versa. For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 15. TTA Final year projects by IT professionals YJS16 Improved Radiometric This paper experimentally IEEE 2011 Identification of demonstratesimproved identification acc Wireless Devices using uracy and reduced sensitivity MIMO Transmission to identification parameters when such techniques are applied to the multiple transmitters within multiple-input multiple-output devices. It further studies an information theoretic technique for determining which radiometric features are most effective in discriminating devices and analyzes the identification performance as a function of the number of features used. YJS17 Robust Image We propose a robust quantization- IEEE 2011 Watermarking Based on based image watermarking scheme, Multi scale Gradient called Direction Quantization the gradient direction watermarking(GD WM), based on the uniform quantization of the direction of gradient vectors. In GDWM, the watermark bits are embedded by quantizing the angles of significant gradient vectors at multiple wavelet scales. DOMAIN : NETWORKING CODE PROJECT TITLE REFERENCE YJS01 Cluster-Based Back-Pressure the back-pressure algorithmrequires IEEE 2011 Routing Algorithm routers to maintain a separate queue for each destination, which precludes its implementation in large-scale networks. In this paper, we propose a distributed cluster-based back- pressure routing algorithm that retains the adaptability of back- pressure routing while significantly reducing the number of queues that have to be maintained at each node. YJS02 Impact of Correlated Mobility on We extend the analysis of the scaling IEEE 2011 Delay-Throughput laws of wireless ad hoc networks to the Performance in Mobile Ad-Hoc case of correlated nodes movements, Networks which are commonly found in real mobility processes. We For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 16. TTA Final year projects by IT professionals consider a simple version of the Reference Point Group Mobility model, in which nodes belonging to the same group are constrained to lie in a disc area, whose center moves uniformly across the network YJS03 On the Price of Security in In this paper, based on a general IEEE 2011 Large-Scale Wireless Ad Hoc random network model, theasymptotic Networks behaviors of secure throughput and delay with the common transmission range rn and the probability pf of neighboring nodes having a primary security association are quantified when the network size n is sufficiently large. The costs and benefits of secure-link-augmentation operations on the secure throughput and delay are also analyzed. YJS04 Cross-Layer Designs in Coded A cross-layer design along with an IEEE 2011 Wireless Fading optimal resource allocation framework is Networks With Multicast formulated for wireless fadingnetworks, where the nodes are allowed to perform network coding. The aim is to jointly optimize end-to-end transport- layer rates, network code design variabl es, broadcast link flows, link capacities, average power consumption, and short- term power allocation policies. YJS05 Link-State Routing With Hop- This paper settles an open IEEE 2011 by-Hop Forwarding Can Achieve question with a positive Optimal Traffic Engineering answer: Optimal traffic engineering (or optimalmulticommodity flow) can be realized using just link- state routing protocols with hop-by- hop forwarding. Today's typical versions of these protocols, Open Shortest Path First (OSPF) and Intermediate System- Intermediate System (IS-IS), split traffic evenly over shortest paths based on link weights. YJS06 Stability and Benefits of Network utility maximization has been IEEE 2011 For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 17. TTA Final year projects by IT professionals Suboptimal Utility Maximization widely used to model resource allocation and network architectures. However, in practice, often it cannot be solved optimally due to complexity reasons. Thus motivated, we address the following two questions in this paper: 1) Can suboptimal utility maximization mai ntain queue stability? 2) Can underoptimization of utility objective function in fact benefit other network design objectives? YJS07 A New Estimation Scheme for Many congestion control protocols have IEEE 2011 the Effective Number been recently proposed in order to of Users in Internet Congestion alleviate the problems encountered by Control TCP in high-speed networks and wireless links. Protocols utilizing an architecture that is in the same spirit asthe ABR service in ATM networks require estimates of the effective number of use rs utilizing each link in thenetwork to maintain stability in the presence of delays. In thi s paper, we propose a novel estimation algorithm that is based on online parameter identification techniques and is shown through analysis and simulations to converge to the effective number of users utilizing each link YJS08 Multichannel Scheduling and In this paper, we utilize multiple IEEE 2011 Spanning Trees: Throughput– frequency channels and design an Delay Tradeoff for Fast efficient link scheduling protocol that DataCollection in Sensor gives a constant factor approximation Networks on the optimal throughput in delivering aggregated data from all the nodes to the sink. To minimize the maximum delay subject to a given throughput bound, we also design an $(alpha, beta)$-bicriteria approximation algorithm to construct a Bounded-Degree Minimum- Radius Spanning Tree, with the radius of thetree at most $beta$ times the minimum possible radius for a given degree bound $Delta^*$, and the For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 18. TTA Final year projects by IT professionals degree of any node at most $Delta^* + alpha$ , where $alpha$ and $beta$ are positive constants. YJS09 DAC: Generic and Automatic In this paper, we present DAC, IEEE 2011 Address Configuration for Data a generic andautomatic Data center Add Center Networks ress Configuration system. With an automatically generated blueprint that defines the connections of servers and switches labeled by logical IDs, e.g., IP addresses, DAC first learns the physical topology labeled by device IDs, e.g., MAC addresses. YJS10 Distributed -Optimal User In this paper, we develop a framework IEEE 2011 Association and Cell Load for user association in infrastructure- Balancing in Wireless Networks based wireless networks, specifically focused on flow- level cell load balancing under spatially inhomogeneous traffic distributions. Our work encompasses several different user association policies: rate- optimal, throughput-optimal, delay- optimal, andload-equalizing, which we collectively denote $alpha$- optimal user association. YJS11 MeasuRouting: A Framework for Monitoring transit traffic at one or more IEEE 2011 Routing Assisted Traffic points in a network is of interest to Monitoring network operators for reasons oftraffic accounting, debugging or troubleshooting, forensics, and traffic engineering. Previous research in the area has focused on deriving a placement of monitors across the network toward the end of maximizing the monitoringutility of the network operator for a given traffic routing. However, both traffic characteristics and measurement objectives can dynamically change over time, rendering a previously optimal placement of monitors suboptimal. YJS12 Automatic Generation of System level modeling is widely IEEE 2011 Assertions from System Level employed at early Design Using Data Mining stages of system development for For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 19. TTA Final year projects by IT professionals simplifying designverification and architectural exploration. Assertion based verification has become a well established part of RTL verification methodology. In the traditional assertion based verification flow, assertions are manually written. In this paper, we generate assertions from system level d esigns using GoldMine, an automatic assertion generationengin e that uses data mining and static analysis. YJS13 Spatial Correlation and Mobility- In this paper, a IEEE 2011 Aware Traffic Modeling for novel trafficmodeling scheme for capturi Wireless Sensor Networks ng these dynamics is proposed that takes into account the statistical patterns of node mobility and spatial correlation. The contributions made in this paper are twofold. First, it is shown that the joint effects of mobility and spatial correlation can lead to bursty traffic. More specifically, high mobilityvariance and small spatial c orrelation can give rise to pseudo-long- range-dependent (LRD) traffic (high burstytraffic), whose autocorrelation function decays slowly and hyperbolically up to a certain cutoff time lag. YJS14 Jamming-Aware Traffic Multiple-path source routing protocols IEEE 2011 Allocation for Multiple-Path allow a data source node to distribute Routing Using Portfolio the total traffic among available paths. Selection In this paper, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate thistraffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. YJS15 A Unified Approach to In this work, we develop the IEEE 2011 Optimizing Performance in mathematical framework and novel Networks serving design methodologies needed to support For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 20. TTA Final year projects by IT professionals Heterogeneous Flows such heterogeneous requirements and propose provably optimal network algorithms that account for the multilevel interactions between the flows. To that end, we first formulate a network optimization problem that incorporates the above throughput and service prioritization requirements of the two traffic types. We, then develop a distributed joint load-balancing and congestion control algorithm that achieves the dual goal of maximizing the aggregate utility gained by the elastic flows while satisfying the fixed throughput and prioritization requirements of the inelastic flows YJS16 Delay Analysis and Optimality This paper focuses on IEEE 2011 of Scheduling Policies for designing and analyzing throughput- Multi-Hop Wireless Networks optimal scheduling policies that avoid using per-flow or per-destination information, maintain a single data queue for each link, exploit only local information, andpotentially improve the delay performance, for multi- hop wireless networks under general interference constraints YJS17 Selfish Overlay Network In this paper, we unify the IEEE 2011 Creation and Maintenance aforementioned thrusts by defining and studying the selfish neighbor selection (SNS) game and its application to overlay routing. At the heart of SNS stands the restriction that peers are allowed up to a certain number of neighbors. This makes SNS substantially different from existingnetwork formation games that impose no bounds on peer degrees. Having bounded degrees has important practical consequences as it permits the creation of overlay structures that require $O(n)$ instead of $O(n^2)$link monitoring overhead. For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 21. TTA Final year projects by IT professionals DOMAIN : PARALLEL DISTRIBUTION CODE PROJECT TITLE REFERENCE YJP01 EBRP: Energy-Balanced n this paper, enlightened by the IEEE 2011 Routing Protocol for Data concept of potential in common Gathering in Wireless Sensor physics, we design an Energy- Networks Balanced Routing Protocol (EBRP) by constructing a mixed virtual potential field, including depth, energy density and residual energy to force packets to move towards the sink through the dense energy area so as to protect the nodes with relatively low residual energy. The design principle and guidelines are presented in detail. YJP02 Effective Delay-Controlled This paper proposes a IEEE 2011 Load Distribution over new load distribution model aiming to Multipath Networks minimize the difference among end-to- end delays, thereby reducing packet delay variation and risk of packet reordering without additional network overhead. In general, the lower the risk of packet reordering, the smaller the delay induced by the packet reordering recovery process, i.e., extra delay induced by the packet reordering recovery process is expected to decrease. YJP03 Tracking Dynamic Boundaries We examine the problem IEEE 2011 using Sensor Network of tracking dynamic boundaries occurri ng in natural phenomena using a network of range sensors. Two main challenges of the boundary tracking problem are accurate boundary estimation from noisy observations and continuous tracking of the boundary. We propose Dynamic Boundary Tracking ( DBTR), an algorithm that combines the spatial estimation and temporal For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 22. TTA Final year projects by IT professionals estimation techniques. YJP04 CACAO: Distributed Client- In CACAO, the clients feed back traffic IEEE 2011 Assisted Channel Assignment information to their APs. This leads to Optimizationfor better network condition knowledge Uncoordinated WLANs and betterchannel assignment decisions at the APs. We conduct extensive simulation study and comparisons using Network Simulator 2 (NS2). Our results show that CACAO outperforms other traditional and recent schemes in terms of TCP and UDP throughputs with a similar level of fairness. YJP05 Athanasia: A User- This article presents Athanasia, a user- IEEE 2011 Transparent and Fault- transparent and fault- Tolerant System tolerant system, for parallel application for Parallel Applications s running on large-scale cluster systems. Cluster systems have been regarded as a de facto standard to achieve multitera-flop computing power. These cluster systems, as we know, have an inherent failure factor that can cause computation failure. The reliability issue in parallel computing systems, therefore, has been studied for arelatively long time in the literature, and we have seen many theoretical promises arise from the extensive research. YJP06 BECAN: A Bandwidth-Efficient Inthis paper, we IEEE 2011 Cooperative Authentication propose a novel bandwidth- Scheme for Filtering Injected efficient cooperative authentication (BE False Data in Wireless Sensor CAN) scheme for filteringinjected false Networks data. Based on the random graph characteristics of sensor node deployment and the cooperativebit- compressed authentication technique, the proposed BECAN scheme can save energy by early detecting andfiltering the majority of injected false data with minor extra overheads at the en-route nodes. For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 23. TTA Final year projects by IT professionals YJP07 Delay Constrained Subtree Virtual world and other IEEE 2011 Homeomorphism Problem collaborative applications are with Applications increasingly becoming popular among Internet users. In such applications, users interact with each other through digital entities or avatars. In order to preserve the user experience, it is important that certain Quality of Service (QoS) requirements (e.g. delay, bandwidth) are satisfied by the interactions. These QoS requirements are usually defined by the application designer. Whenapplications with such QoS requirements are being deployed on a network of servers, an appropriate set of servers capable of satisfying the QoS constraints of the interactions must be identified. YJP08 Efficient communication In this article we show IEEE 2011 algorithms in hexagonal the hexagonal mesh networks develope mesh interconnection d in the early 1990s are a special case networks of the EJnetworks that have been considered more recently. Using a node addressing scheme based on the EJ number system, we give a shortest path routing algorithm for hexagonal mesh n etworks. YJP09 An Efficient Prediction-based This paper proposes predict and relay IEEE 2011 Routing in Disruption- (PER), an efficient routing algorithm for Tolerant Networks DTNs, where nodes determine the probability distribution of future contact times and choose a proper next- hop in order to improve the end-to-end delivery probability. The algorithm is based on two observations: one is that nodes usually move around a set of well-visited landmark points instead of moving randomly; the other is that node mobility behavior is semi- deterministic and could be predicted once there is sufficient mobility history information. YJP10 Bounding the Impact of Self-stabilization is a versatile approach IEEE 2011 For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 24. TTA Final year projects by IT professionals Unbounded Attacks to fault-tolerance since it permits a in Stabilization distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. Combining these two properties proved difficult: it is impossible to contain the spatial impact of Byzantine nodes in a self-stabilizing context for global tasks such as tree orientation and tree construction. YJP11 Stability Analysis of In this paper, we propose a policy that IEEE 2011 Reservation-Based allows links to transmit data in any Scheduling Policies in future frame by means of frame Wireless Networks reservations. The new, reservation- based distributed scheduling approach will improve the capacity of the system and provide greater throughput. YJP12 Fast Secure Communications This paper proposes three IEEE 2011 in Shared Memory authentication schemes to remove Multiprocessor Systems those security vulnerabilities. First, we prevent replay attacks on data messages by inserting Request Counter (RC) into request messages. Second, we also use RC to detect integrity attacks on control messages. Third, we propose a new counter, referred to as GCC Counter (GC), to protect the global counter messages. We simulated our design with SPLASH-2 benchmarks on up to 16- processor sharedmemory multiprocess or systems by using Simics with Wisconsin multifacet General Execution- drivenMultiprocessor Simulator (GEMS). For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 25. TTA Final year projects by IT professionals DOMAIN : IMAGE PROCESSING CODE PROJECT TITLE DESCRIPTION REFERENCE YJI01 A Generalized Accelerated This paper IEEE 2011 Proximal Gradient Approach proposes a generalized accelerated for Total Variation-Based proximal gradient (GAPG) approach Image Restoration for solving total variation(TV)- based image restoration problems. The GAPG algorithm generalizes the original APG algorithm by replacing the Lipschitz constant with an appropriate positive-definite matrix, resulting in faster convergence. For TV- basedimage restoration problems, we further introduce two auxiliary variables that approximate the partial derivatives. Constraints on the variables can easily be imposed without modifying the algorithm much, and the TV regularization can be either isotropic or anisotropic. YJI02 Residues Cluster Based In this paper, IEEE 2011 Segmentation and Outlier- the phase unwrappingproblem is Detection Method for Large- abstracted as solving a large- Scale Phase Unwrapping scale system of inconsistent linear equations. With the difficulties oflarge- scale phase unwrapping analyzed, L 0 -norm criterion is found to have potentials in efficient image tiling andsplicing. Making use of the clustering characteristic of residue distribution, a tiling strategy is proposed for L0-norm criterion. Unfortunately, L0-norm is an NP-hard problem, which is very difficult to find an exact solution in a polynomial time. YJI03 An a priori shading correction Digital imaging devices are increasingly IEEE 2011 technique for contact imaging used for color measurements in fields devices such as forensics, the food industry, and ecological and medical research. Especially concerning the skin, in the follow-up of benign or malignant For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 26. TTA Final year projects by IT professionals lesions, it is crucial to ensure that the measured colors are accurate and reproducible. Several color calibration methods having been presented over the last few years YJI04 Spread Spectrum Image Efficient image watermark calls for IEEE 2011 Watermarking Based on full exploitation of Perceptual Quality Metric the perceptual distortion constraint. Second-order statistics of visual stimuli are regarded as critical features for perception. This paper proposes a second-order statistics (SOS) based image quality metric, which considers the texture masking effect and the contrast sensitivity in Karhunen-Loève transform domain. YJI05 Memory-Efficient Architecture Hysteresis thresholding is a method IEEE 2011 for Hysteresis Thresholding that offers and Object Feature Extraction enhanced object detection. Due to its recursive nature, it is time consuming and requires a lot of memory resources. This makes it avoided in streaming processors with limitedmemory. We propose two versions of a memory- efficient and fast architecture for hy steresis thresholding: a high- accuracy pixel- based architecture and a faster block-based one at the expense of some loss in the accuracy. YJI06 Generalized Random Walks In this paper, we propose a novel IEEE 2011 for Fusion of Multi-Exposure probabilistic model- Images based fusion technique for multi- exposure images. Unlike previousmulti- exposure fusion methods, our method aims to achieve an optimal balance between two quality measures, i.e., local contrast and color consistency, while combining the scene details revealed under different exposures. YJI07 Edge Strength Filter Based We propose an orientation- IEEE 2011 Color Filter Array free edge strength lter and apply it For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 27. TTA Final year projects by IT professionals Interpolation to the demosaicing problem. Edge strength lter output is utilized both to improve the initial green channel interpolation and to apply the constant color dierence rule adaptively. This simple edge directed method yields visually pleasing results with high CPSNR. YJI08 Towards a Unified Color mage processing methods that IEEE 2011 Space for Perception-Based utilize characteristics of the human Image Processing visual system require color spaces with certain properties to operate effectively. After analyzing different types of perception- based image processingproblems, we present a list of properties a unified color space sho uld have. Due to contradictory perceptual phenomena and geometric issues a color space cannot incorporate all these properties. YJI09 Model-guided Adaptive In compressive sensing (CS) a IEEE 2011 Recovery of Compressive challenge is to find a space in which Sensing the signal is sparse and hence recoverable faithfully. Since many natural signals such as images have locally varying statistics, the sparse space varies in time/spatial domain. As such, CS recovery should be conducted in locally adaptive, signal-dependent spaces to counter the fact that the CS measurements are global and irrespective of signal structures DOMAIN : MOBILE COMPUTING CODE PROJECT TITLE REFERENCE YDM01 Providing Secure Integrity in IEEE Peer-to-peer Oriented Mobile Environments YDM02 RAM: Rate Adaptation in IIEEE Mobile Environments For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in
  • 28. TTA Final year projects by IT professionals YDM03 Robust Relative Location IEEE Estimation in Wireless Sensor Networks with Inexact Position Problems YDM04 On the Cost of Knowledge of IEEE Mobility in Dynamic Networks: An Information-Theoretic Approach YDM05 A Novel MAC Scheme for IEEE Multi-Channel Cognitive Radio Ad Hoc Networks YDM06 Efficient Virtual Backbone IEEE Construction with Routing Cost Constraint in Wireless Networks using Directional Antennas YDM07 Color Based Fruits IIEEE Classification Using GPU YDM08 Wireless Multicast IEEE Optimization : A Cross-Layer Approach YDM09 Web Content Recommender IEEE System based on Consumer Behavior Modeling YDM10 STORM: A Framework for IEEE Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks YDM11 Throughput Optimization in IEEE Mobile Backbone Networks DOMAIN : KNOWLEDGE AND DATA ENGINEERING CODE PROJECT TITLE DESCRIPTION REFERENCE YDK01 Motion Segmentation in the IEEE Presence of Outlying, Incomplete, or Corrupted Trajectories YDK02 Segmentation and Sampling IIEEE of Moving Object Trajectories based on Representativeness YDK03 A Query Formulation IEEE Language for the Data Web YDK04 Optimizing Multiway Joins in IEEE For base paper and detailed discussion, call 89397 22135 | 89397 22145 | 044 4218 1385 Web: www.talhunt.co.in