2013 b tech projects list

Upload: padma-joel

Post on 03-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 2013 b Tech Projects List

    1/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Knowledge and Data Engineering

    Sl.No Project Title Year

    1. Anonymous Qury Processing in Road Networks 2013

    2. Closing the Loop in Webpage Understanding 2013

    3. Closeness: A New Privacy Measure for Data Publishing 2013

    4. Deriving Concept-Based User Profiles from SearchEngine Logs

    2013

    5. False Negative Problem of Counting Bloom Filter 2013

    6. Filtering Data Streams for Entity-Based ContinuousQueries

    2013

    7. Iso-Map: Energy-Efficient Contour Mapping in WirelessSensor Networks

    2013

    8. Incremental and General Evaluation of Reverse NearestNeighbors

    2013

    9. Incremental Evaluation of Visible Nearest NeighborQueries

    2013

    10. Logic-Based Pattern Discovery 201311. Learning with Positive and Unlabeled Examples Using

    Topic-Sensitive PLSA2013

    12. LIGHT: A Query-Efficient Yet Low-Maintenance IndexingScheme over DHTs

    2013

    13. P2P Reputation Management Using DistributedIdentities and Decentralized Recommendation Chains

    2013

    14. Projective Distribution of XQuery with Updates 2013

    15. Ranked Query Processing in Uncertain Databases 2013

    16. Record Matching over Query Results from Multiple WebDatabases 2013

    17. The Dynamic Bloom Filters 2013

    18. The Tiled Bitmap Forensic Analysis Algorithm 2013

    19. Towards an Effective XML Keyword Search 2013

    20. ViDE: A Vision-Based Approach for Deep Web DataExtraction

    2013

    1

  • 7/28/2019 2013 b Tech Projects List

    2/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 201321. XCDSearch: An XML Context-Driven Search Engine 2013

    22. Interactive Correction And Recommendation ForComputer Language Learning And Training

    2013/.NET

    23. Learning Image-Text Associations 2013/.NET

    24. A Relation-Based Page Rank Algorithm For SemanticWeb Search Engines

    2013/.NET

    25. English To Spanish Translation Of Signboard ImagesFrom Mobile Phone Camera

    2013/.NET

    26. GLIP: A Concurrency Control Protocol For ClippingIndexing

    2013/JAVA

    27. Histogram-Based Global Load Balancing In StructuredPeer-To-Peer Systems

    2013/JAVA

    28. A Generic Local Algorithm For Mining Data Streams 2013/JAVA

    29. Predicting Missing Items In Shopping Carts 2013/JAVA

    30. Distributional Features For Text Categorization 2013/JAVA

    2

  • 7/28/2019 2013 b Tech Projects List

    3/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Mobile Computing

    Sl.No Project Title Year

    1. A Scalable and Energy-Efficient Context MonitoringFramework for Mobile Personal Sensor Networks

    2013

    2. A Multichannel Scheduler for High-Speed WirelessBackhaul Linkswith Packet Concatenation

    2013

    3. BSMR: Byzantine-Resilient Secure Multicast Routing inMultihop Wireless Networks

    2013

    4. Distributed Localization Scheme for Mobile SensorNetworks

    2013

    5. Energy-Efficient Reprogramming of a Swarm of Mobile

    Sensors

    2013

    6. Energy-Efficient VoIP over Wireless LANs 2013/.NET

    7. Efficient Load-Aware Routing Scheme for Wireless MeshNetworks

    2013

    8. Exploiting and Defending Opportunistic Scheduling inCellular Data Networks

    2013

    3

  • 7/28/2019 2013 b Tech Projects List

    4/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 20139. Fault-Tolerant Relay Node Placement in Heterogeneous

    WSN2013

    10. Joint Routing, Channel Assignment, and Scheduling forThroughput Maximization in General InterferenceModels

    2013

    11. Local Barrier Coverage in Wireless Sensor Networks 2013

    12. MABS: Multicast Authentication Based on BatchSignature

    2013/JAVA

    13. Maximizing the Lifetime of Wireless Sensor Networkswith Mobile Sink in Delay-Tolerant Applications

    2013

    14. Radio Tomographic Imaging with Wireless Networks 2013

    15. Secure Data Collection in Wireless Sensor NetworksUsing Randomized Dispersive Routes

    2013

    16. VEBEK: Virtual Energy-Based Encryption and Keying forWireless Sensor Networks

    2013

    17. Message Authentication In ComputationallyConstrained Environment

    2013/.NET

    18. Biased Random Walks in Uniform Wireless Networks 2013/.NET

    19. Energy Maps for Mobile Wireless Networks: CoherenceTime versus Spreading Period

    2013/.NET

    20. Greedy Routing with Anti-Void Traversal for WSN 2013/.NET

    21. On the Security of Route Discovery in MANETs 2013/.NET

    22. Route Stability in MANETs under the Random DirectionMobility Model

    2013/.NET

    23. Multicasting With Localized Control In Wireless Ad HocNetworks

    2013/.NET

    24. A Flexible Privacy-Enhanced Location-Based Services

    System Framework and Practice

    2013/.NET

    25. Localized Sensor Area Coverage with LowCommunication Overhead

    2013/.NET

    26. Efficient Resource Allocation For Wireless Multicast 2013/.NET

    27. A Gen2 Based RFID Authentication Protocol for Securityand Privacy

    2013/.NET

    4

  • 7/28/2019 2013 b Tech Projects List

    5/18

  • 7/28/2019 2013 b Tech Projects List

    6/18

  • 7/28/2019 2013 b Tech Projects List

    7/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Dependable and Secure Computing

    Sl.No Project Title Year

    1. A Puzzle-Based Defense Strategy Against FloodingAttacks Using Game Theory 2013/.NET

    2. A Rigorous, Compositional, and Extensible Frameworkfor Dynamic Fault Tree Analysis

    2013

    3. A Survey on the Encryption of Convergecast Traffic withIn-Network Processing

    2013/.NET

    4. An Advanced Hybrid Peer-to-Peer Botnet 2013

    5. Conformance Testing of Temporal Role-Based AccessControl Systems

    2013

    6. Dual-Quorum: A Highly Available and Consistent

    Replication System for Edge Services

    2013

    7. In-Depth Packet Inspection Using a Hierarchical PatternMatching Algorithm

    2013

    8. KTR: An Efficient Key Management Scheme for SecureData Access Control in Wireless Broadcast Services

    2013

    9. Layered Approach Using Conditional Random Fields forIntrusion Detection

    2013

    10. On the Survivability of Wireless Ad Hoc Networks withNode Misbehaviors and Failures

    2013

    11. On the Thermal Attack in Instruction Caches 201312. Opportunities in White-Box Cryptography 2013

    13. Secure Data Objects Replication in Data Grid 2013

    14. Shifting Inference Control to User Side: Architectureand Protocol

    2013

    15. SigFree: A Signature-Free Buffer Overflow AttackBlocker

    2013

    7

  • 7/28/2019 2013 b Tech Projects List

    8/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 201316. Using Web-Referral Architectures to Mitigate Denial-of-

    Service Threat2013

    17. The Effectiveness of Checksums for Embedded ControlNetworks

    2013/.NET

    18. Credit card fraud detection using hidden Markov model 2013/.NET

    19. Evaluating the Vulnerability of Network Traffic UsingJoint Security and Routing Analysis

    2013/JAVA

    20. Flexible Rollback Recovery in Dynamic Heterogeneous

    Grid Computing

    2013/JAVA

    21.Securit Analysis of the SASI Protocol 2013/JAVA

    22. Cryptanalysis Of A Generalized Ring Signature Scheme 2013/JAVA

    23. Security In Open Source Web Content ManagementSystems

    2013/JAVA

    8

  • 7/28/2019 2013 b Tech Projects List

    9/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Software Engineering

    Sl.No Project Title Year

    1. A Framework for Programming Robust Context-AwareApplications

    2013

    2. An Experience in Testing the Security of Real-WorldElectronic Voting Systems

    2013

    3. An Attack Surface Metric 2013

    4. Better Debugging via Output Tracing and Callstack-Sensitive Slicing

    2013

    5. DECOR: A Method for the Specification and Detection of 2013/.NET

    9

  • 7/28/2019 2013 b Tech Projects List

    10/18

  • 7/28/2019 2013 b Tech Projects List

    11/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 20131. Anchor-Free Localization through Flip-Error-Resistant

    Map Stitching in Wireless Sensor Network2013

    2. A Dynamic Performance-Based Flow Control Method forHigh-Speed Data Transfer

    2013

    3. A Queuing Model for Evaluating the Transfer Latency ofPeer-to-Peer Systems

    2013

    4. An ISP-Friendly File Distribution Protocol: Analysis,Design, and Implementation

    2013

    5. An Analytical Approach to Optimizing Parallel ImageRegistration/Retrieval

    2013

    6. Cooperative Secondary Authorization Recycling 2013

    7. Detecting Application Denial-of-Service Attacks: AGroup-Testing-Based Approach

    2013

    8. Flexible Cache Consistency Maintenance over WirelessAd Hoc Networks

    2013

    9. Impact of Feature Reduction on the Efficiency ofWireless Intrusion Detection Systems

    2013

    10. Improving Reliability for Application-Layer MulticastOverlays

    2013

    11. Optimal Resource Placement in Structured Peer-to-PeerNetworks

    2013

    12. Predictable High Performance Computing usingFeedback Control and Admission Control

    2013

    13. Robust Load Delegation in Service Grid Environments 2013

    14. Secure Synchronization of Periodic Updates in Ad HocNetworks

    2013

    15. SocioNet: A Social-Based Multimedia Access System for

    Unstructured P2P Networks

    2013

    16. Toward Systematical Data Scheduling for LayeredStreaming in Peer-to-Peer Networks: Can We GoFarther?

    2013

    17. pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval

    2013/.NET

    18. Dynamic routing with security considerations 2013/JAVA

    11

  • 7/28/2019 2013 b Tech Projects List

    12/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 201319. FDPM: An IP Trace back system to find the real source

    of attacks2013/JAVA

    20. Distributed algorithms for constructing approximateminimum spanning trees in WSN

    2013/JAVA

    21. Building Small-World Peer-to-Peer Networks Based onHierarchical Structures

    2013/JAVA

    22. Detecting Malicious Packet Losses 2013/JAVA

    23. Dynamic Search Algorithm In Unstructured Peer-To-

    Peer Networks

    2013/JAVA

    12

  • 7/28/2019 2013 b Tech Projects List

    13/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Pattern Analysis and Machine Intelligence

    Sl.No Project Title Year

    1. Local-Learning-Based Feature Selection for High-Dimensional Data Analysis

    2013

    2. Object Detection with Discriminatively Trained Part-Based Models

    2013

    3. Online Empirical Evaluation of Tracking Algorithms 2013

    4. Range Flow in Varying Illumination: Algorithms andComparisons

    2013

    5. Resolution Enhancement in Multi-Image Stereo 2013

    6. Stereo Matching with Mumford-Shah Regularization andOcclusion Handling

    2013

    7. Survey of Pedestrian Detection for Advanced DriverAssistance Systems

    2013

    8. Adaptive Multi versioning for Open MP parallelizationvia machine Learning

    2013/.NET

    9. Medical Data Mining Using BGA & RGA For Weighting OfFeatures In Fuzzy K-NN Classification

    2013/JAVA

    13

  • 7/28/2019 2013 b Tech Projects List

    14/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Computers

    Sl.No Project Title Year

    1. A Novel Cryptoprocessor Architecture for the McEliecePublic-Key Cryptosystem

    2013

    2. A Study of k-Coverage and Measures of Connectivity in3D WSN

    2013

    3. Adaptation of Reputation Management Systems toDynamic Network Conditions in Ad Hoc Networks

    2013

    14

  • 7/28/2019 2013 b Tech Projects List

    15/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 20134. Algorithmic Aspects of Hardware/Software Partitioning:

    1D Search Algorithms2013

    5. An Interleaving Structure for Guaranteed QoS in Real-Time Broadcasting Systems

    2013

    6. An Optimal Encoding to Represent a Single Set in anROBDD

    2013

    7. Authenticated Group Key Transfer Protocol Based onSecret Sharing

    2013

    8. An Application-Level Data Transparent AuthenticationScheme withoutCommunication Overhead

    2013

    9. Concurrent Structure-Independent Fault DetectionSchemes for the Advanced Encryption Standard

    2013

    10. Coverage and Detection of a Randomized SchedulingAlgorithm in Wireless Sensor Networks

    2013

    11. Design and Analysis of On-Chip Networks for Large-ScaleCache Systems

    2013

    12. Efficient Microarchitectural Vulnerabilities Prediction

    Using Boosted Regression Trees and Patient RuleInductions

    2013

    13. Minimizing the Maximum Firewall Rule Set in a Networkwith Multiple Firewalls

    2013

    14. PERFECTORY: A Fault-Tolerant Directory MemoryArchitecture

    2013

    15. Predictive Temperature-Aware DVFS 2013

    16. Secure and Efficient Broadcast Authentication in WSN 2013

    17. Trade-Offs between Latency, Complexity, and Load

    Balancing with Multicast Algorithms

    2013

    Learning Technologies

    Sl.No Project Title Year

    1. Deploying a Wearable Computing Platform for 2013

    15

  • 7/28/2019 2013 b Tech Projects List

    16/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013Computing Education

    2. Mobile Learning in School Contexts: Can TeachersAlone Make It Happen?

    2013

    3. To Flow and Not to Freeze: Applying Flow Experience toMobile Learning

    2013

    4. An Enhanced Ant Colony Optimization Applied toCapacitated Vehicle Routing Problem

    2013/.NET

    5. Information System Of Relay Protection For Fault

    Record Analysis

    2013/JAVA

    16

  • 7/28/2019 2013 b Tech Projects List

    17/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013

    Sl.No

    Project Title Domain Year

    1. Network Coding-BasedProtection of Many-to-OneWireless Flows

    WirelessCommunications

    2013/.NET

    2. Increasing Packet Deliveryin Ad Hoc On-DemandDistance Vector RoutingProtocol

    WirelessCommunications

    2013/JAVA

    3. Coding Documents usingAlternative Techniques

    Cryptography 2013/.NET

    4. Investigating Accuracies ofRule Evaluation Models onRandomized Labeling

    GranularComputing

    2013/.NET

    5. Protection of DatabaseSecurity via CollaborativeInference Detection

    KnowledgeDiscovery andData Mining

    2013/JAVA

    6. Applying Data Mining inPrediction and Classificationof Urban Traffic

    Computer Science& Information

    Engg.

    2013/JAVA

    7. A text clustering frameworkfor information retrieval

    InformationAssurance and

    2013/JAVA

    17

    http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5170260
  • 7/28/2019 2013 b Tech Projects List

    18/18

    www.edujobnews.com

    B.TECH PROJECTS LIST 2013Security

    8. Enhancing Privacy andAuthorization ControlScalability in the GridThrough Ontology

    InformationTechnology in

    Biomedicine

    2013/JAVA

    9. End-to-End Service Supportfor Mashups

    ServicesComputing

    2013

    10. Affect Detection:

    Interdisciplinary Review ofModels, Methods, and TheirApplications

    Affective

    Computing

    2013

    11. Predictive Network AnomalyDetection and Visualization

    InformationForensics and

    Security

    2013

    12. Providing WitnessAnonymity Under Peer-to-Peer Settings

    InformationForensics and

    Security

    2013

    18