final year projects - engineeringidolph.com/titles/ieee project titles 2013-2014.pdf · final year...
TRANSCRIPT
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 1
FINAL YEAR PROJECTS
IEEE PROJECTS 2013 – 2014
ANDROID PROJECTS S.NO
PROJECT CODE
TITLE OF THE PAPER YEAR
1 AN1201 Safe Driving Using Mobile Phones 2012
2 AN1202 EduPad- A Tablet Based Educational System for improving adult literacy in rural India.
2012
3 AN1203 Designing Mobile Language Learning Applications using Multimedia: Implications from a Small-scale Prospective Learner Study.
2012
4 AN1204 Research and design of chatting room system based on Android Bluetooth. 2012
5 AN1205 Design and Implementation of Improved Authentication System for Android Smartphone Users
2012
6 AN1206 Learn to Personalized Image Search from the Photo Sharing Websites. 2012
7 AN1207 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
2012
8 AN1208 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
9 AN1209 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.
2012
10 AN1210 Payments for Outsourced Computations 2012
11 AN1211 Outsourced Similarity Search on Metric Data Assets 2012
12 AN1212 A Query Formulation Language for the Data Web 2012
13 AN1213 PMSE A Personalized Mobile Search Engine 2012
14 AN1214 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
2012
15 AN1215 Ranking Model Adaptation for Domain-Specific Search 2012
16 AN1216 Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points
2012
17 AN1217 Efficient audit service outsourcing for data integrity in Clouds 2012
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 2
18 AN1218 Ensuring Distributed Accountability in Data Sharing in the Cloud 2012
19 AN1219 Network Assisted Mobile Computing Optimal Uplink Query Processing 2012
20 AN1220 Tram location and route navigation system using smartphone 2012
21 AN1221 Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.
2012
22 AN1222 A Mobile Application to Access Remote Database using Web Services 2012
23 AN1223 DroidMat: Android Malware Detection through Manifest and API Calls Tracing 2012
24 AN1224 A Framework for Personal Mobile Commerce Pattern Mining and Prediction 2012
25 AN1325 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence 2013
26 AN1326 Dynamic Personalized Recommendation on Sparse Data 2013
27 AN1327 Spatial Query Integrity with Voronoi Neighbors 2013
28 AN1328 MeetYou -- Social Networking on Android 2013
29 AN1329 Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
2013
30 AN1330 PMSE: A Personalized Mobile Search Engine 2013
31 AN1331 Crowdsourced Trace Similarity with Smartphones 2013
32 AN1332 Twitsper: Tweeting Privately 2013
33 AN1333 Review of Behavior Malware Analysis for Android 2013
34 AN1334 Research in Progress - Defending Android Smartphones from Malware Attacks 2013
35 AN1335 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
2013
36 AN1336 CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 2013
37 AN1337 Collaborative Policy Administration 2013
38 AN1338 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
2013
39 AN1339 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2013
40 AN1340 Collaborative Learning Assistant for Android 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 3
FINAL YEAR PROJECTS
IEEE PROJECTS 2013 – 2014
DOTNET PROJECTS CLOUD COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 CCD1101 Data integrity proofs in cloud storage 2011
2 CCD1102 Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data 2011
3 CCD1103 Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
2011
4 CCD1104 Optimal service pricing for a cloud cache 2011
5 CCD1205 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. 2012
6 CCD1206 Cloud Computing Security From Single to Multi-Clouds. 2012
7 CCD1207 Enhanced Data Security Model for Cloud Computing 2012
8 CCD1208 Ensuring Distributed Accountability for Data Sharing in the Cloud. 2012
9 CCD1209 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
2012
10 CCD1210 Outsourced Similarity Search on Metric Data Assets. 2012
11 CCD1211 Privacy-Preserving Public Auditing for Secure Cloud Storage 2012
12 CCD1212 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.
2012
13 CCD1213 Toward Secure and Dependable Storage Services in Cloud Computing. 2012
14 CCD1314 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
2013
15 CCD1315 An Adaptive Cloud Downloading Service 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 4
16 CCD1316 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
2013
17 CCD1317 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
18 CCD1318 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 2013
19 CCD1319 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2013
20 CCD1320 Privacy-Preserving Public Auditing for Secure Cloud Storage 2013
21 CCD1321 QoS Ranking Prediction for Cloud Services 2013
22 CCD1322 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2013
23 CCD1323 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems
2013
24 CCD1324 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 2013
DATA MINING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 DMD1101 A Web Search Engine-Based Approach to Measure Semantic Similarity between
Words. 2011
2 DMD1102 Personalized Ontology Model for Web Information Gathering 2011
3 DMD1103 Efficient Computation of Range Aggregates against uncertain location based
queries 2011
4 DMD1104 Scalable Learning of Collective Behavior 2011
5 DMD1105 The World in a Nutshell Concise Range Queries 2011
6 DMD1106 Publishing Search Logs – A Comparative Study of Privacy Guarantees 2011
7 DMD1107 One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web
Databases 2011
8 DMD1108 Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques 2011
9 DMD1109 Exploring Application-Level Semantics for Data Compression 2011
10 DMD1110 Bridging Socially-Enhanced Virtual Communities 2011
11 DMD1111 Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis 2011
12 DMD1212 A Query Formulation Language for the data web 2012
13 DMD1213 Creating Evolving User Behavior Profiles Automatically 2012
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 5
14 DMD1214 D-Cache: Universal Distance Cache for Metric Access Methods 2012
15 DMD1215 DDD: A New Ensemble Approach for Dealing with Concept Drift 2012
16 DMD1216 Efficient Computation of Range Aggregates against UncertainLocation-Based
Queries 2012
17 DMD1217 Efficient Fuzzy Type-Ahead Search in XML Data 2012
18 DMD1218 Horizontal Aggregations in SQL to Prepare Data Sets for Data MiningAnalysis 2012
19 DMD1219 Improving Aggregate Recommendation Diversity Using Ranking-
BasedTechniques 2012
20 DMD1220 Measuring the Sky: On Computing Data Cubes via Skylining the Measures 2012
21 DMD1221 Mining Web Graphs for Recommendations 2012
22 DMD1222 Organizing User Search Histories 2012
23 DMD1223 Publishing Search Logs—A Comparative Study of Privacy Guarantees 2012
24 DMD1224 Query Planning for Continuous Aggregation Queries over a Network ofData
Aggregators 2012
25 DMD1225 ROAD: A New Spatial Object Search Framework for Road Networks 2012
26 DMD1226 Scalable Learning of Collective Behavior 2012
27 DMD1227 Slicing: A New Approach for Privacy Preserving Data Publishing 2012
28 DMD1228 Tree-Based Mining for Discovering Patterns of Human Interaction inMeetings 2012
29 DMD1229 Efficient Multidimensional Fuzzy Search for Personal Information Management
Systems 2012
30 DMD1230 Ranking Model Adaptation for Domain-Specific Search 2012
31 DMD1231 One Size Does Not Fit All: Toward User- and Query-Dependent Ranking for Web
Databases 2012
32 DMD1232 Continuous Detour Queries in Spatial Networks 2012
33 DMD1333 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013
34 DMD1334 A Survey of XML Tree Patterns 2013
35 DMD1335 Dynamic Personalized Recommendation on Sparse Data 2013
36 DMD1336 Mining User Queries with Markov Chains: Application to Online Image Retrieval 2013
37 DMD1337 TrustedDB: A Trusted Hardware based Database with Privacy and Data
Confidentiality 2013
38 DMD1338 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile
Environments 2013
39 DMD1339 Supporting Search-As-You-Type Using SQL in Databases 2013
40 DMD1340 Secure Mining of Association Rules in Horizontally Distributed Databases 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 6
PARALLEL AND DISTRIBUTED SYSTEMS
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PDD1201 Bounding the Impact of UnboundedAttacks in Stabilization 2012
2 PDD1202 Catching Packet Droppers andModifiers in Wireless Sensor Networks 2012
3 PDD1203 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
4 PDD1204 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs 2012
5 PDD1205 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2012
6 PDD1305 A Secure Payment Scheme with Low Communication and Processing Overhead
for Multihop Wireless Networks 2013
7 PDD1306 Multicast Capacity in MANET with Infrastructure Support 2013
8 PDD1307 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency 2013
9 PDD1308 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013
10 PDD1309 Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor
Networks 2013
11 PDD1310 A Probabilistic Misbehavior Detection Scheme towards Efficient Trust
Establishment in Delay-tolerant Networks 2013
12 PDD1311 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n
Wireless Sensor Networks 2013
NETWORKING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 NW1101 A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor
Networks 2011
2 NW1102 On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless
Networks 2011
3 NW1103 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio
Selection 2011
4 NW1104 Continuous Neighbor Discovery in Asynchronous Sensor Networks 2011
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 7
5 NW1105 Distributed Adaptation of Quantized Feedback for Downlink Network MIMO
Systems 2011
6 NW1106 Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop
Wireless Networks 2011
7 NW1206 A New Cell-Counting-Based Attack Against Tor 2012
8 NW1207 Optimal Source-Based Filtering of Malicious Traffic 2012
9 NW1208 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH
COOPERATIVECOMMUNICATIONS 2012
10 NW1209 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing
Topologies 2012
11 NW1210 Uncoordinated Cooperative Communications in Highly Dynamic Wireless
Networks 2012
12 NW1211 Load-Balancing Multipath Switching System with Flow Slice 2012
13 NW1312 A Distributed Control Law for Load Balancing in Content Delivery Networks 2013
14 NW1313 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013
15 NW1314 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad
Hoc Networks 2013
16 NW1315 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments 2013
17 NW1316 Efficient Algorithms for Neighbor Discovery in Wireless Networks 2013
18 NW1317 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 2013
19 NW1318 Resource Allocation for QoS Support in Wireless Mesh Networks 2013
20 NW1319 A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop
Wireless Networks With Order-Optimal Per-Flow Delay 2013
SECURE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SCD1101 A More Secure Steganography Method in Spatial Domain. 2011
2 SCD1102 Detecting Kernel-Level Rootkits Using Data Structure Invariants 2011
3 SCD1103 NABS Novel Approaches for Biometric Systems. 2011
4 SCD1104 Blind Image Watermarking Using a Sample Projection Approach 2011
5 SCD1105 Data Leakage Detection 2011
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 8
6 SCD1106 Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow
Watermarking. 2011
7 SCD1107 The Geometric Efficient Matching Algorithm for Firewalls 2011
8 SCD1108 Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime
of Query-Based Wireless Sensor Networks 2011
9 SCD1109 Integration of Sound Signature in Graphical Password Authentication System 2011
10 SCD1209 A Secure Intrusion detection system against DDOS attack in WirelessMobile Ad-
hoc Network 2012
11 SCD1210 Design and Implementation of TARF: A Trust-Aware Routing Framework
forWSNs 2012
12 SCD1211 ES-MPICH2: A Message Passing Interface with Enhanced Security 2012
13 SCD1212 On the Security and Efficiency of Content Distribution via NetworkCoding 2012
14 SCD1213 SPOC: A Secure and Privacy-preserving Opportunistic ComputingFramework
forMobile-Healthcare Emergency 2012
15 SCD1214 Revisiting Defenses against Large-Scale Online Password GuessingAttacks 2012
16 SCD1215 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a
Knowledge-Based Authentication Mechanism 2012
17 SCD1216 Automatic Reconfiguration for Large-Scale Reliable Storage Systems 2012
18 SCD1316 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. 2013
19 SCD1317 EAACK—A Secure Intrusion-Detection System for MANETs 2013
20 SCD1318 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing 2013
21 SCD1319 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable
Links 2013
22 SCD1320 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
23 SCD1321 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013
IMAGE PROCESSING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 IPD1101 Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts 2011
2 IPD1102 Adaptive Spectral Transform for Wavelet-Based Color Image Compression 2011
3 IPD1103 Facial Expression Recognition Using Facial Movement Features 2011
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 9
4 IPD1104 A New Color Filter Array With Optimal Properties for Noiseless and Noisy Color
Image Acquisition 2011
5 IPD1105 Histogram Specification: A Fast and Flexible Method to Process Digital Images 2011
6 IPD1205 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2012
7 IPD1206 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 2012
8 IPD1207 Active Visual Segmentation 2012
9 IPD1208 Image Segmentation Based on the Poincaré Map Method 2012
10 IPD1209 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE
USINGRANDOM NUMBER 2012
11 IPD1210 Multiple Exposure Fusion for High Dynamic Range Image Acquisition 2012
12 IPD1211 Semi-supervised Biased Maximum Margin Analysis for Interactive
ImageRetrieval 2012
13 IPD1212 Smile Detection by Boosting Pixel Differences 2012
14 IPD1213 View-invariant action recognition based on Artificial Neural Networks 2012
15 IPD1214 A Novel Anti phishing framework based on visual cryptography 2012
16 IPD1215 Robust Face-Name Graph Matching for Movie Character Identification 2012
17 IPD1216 Low-Complexity Compression Method for Hyperspectral Images Based on
Distributed Source Coding 2012
18 IPD1217 Robustness of Offline Signature Verification Based on Gray Level Features 2012
19 IPD1218 Controllable Secure Watermarking Technique for Tradeoff Between Robustness
and Security 2012
20 IPD1219 A Discriminative Model of Motion and Cross Ratio for View-Invariant Action
Recognition 2012
21 IPD1319 Query-Adaptive Image Search With Hash Codes 2013
22 IPD1320 Reversible Data Hiding With Optimal Value Transfer 2013
23 IPD1321 Reversible Watermarking Based on Invariant Image Classification and Dynamic
Histogram Shifting 2013
24 IPD1322 Local Directional Number Pattern for Face Analysis: Face and Expression
Recognition 2013
25 IPD1323 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet
Transform Shrinkage 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 10
MOBILE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MCD1201 Cooperative Download in Vehicular Environments 2012
2 MCD1202 Distributed Throughput Maximization in Wireless Networks via RandomPower
Allocation 2012
3 MCD1203 Network Assisted Mobile Computing with Optimal Uplink Query Processing 2012
4 MCD1204 Protecting Location Privacy in Sensor Networks against a GlobalEavesdropper 2012
5 MCD1205 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 2012
6 MCD1206 Towards Accurate Mobile Sensor Network Localization in Noisy Environments 2012
7 MCD1207 Leveraging Smartphone Cameras for Collaborative Road Advisories 2012
8 MCD1208 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor
Networks 2012
9 MCD1308 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013
10 MCD1309 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional
Game Approach 2013
11 MCD1310 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc
Networks 2013
12 MCD1311 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2013
13 MCD1312 Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless
Sensor Networks 2013
14 MCD1313 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks 2013
15 MCD1314 Network-Assisted Mobile Computing with Optimal Uplink Query Processing 2013
16 MCD1315 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013
17 MCD1316 On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 2013
18 MCD1317 Toward Accurate Mobile Sensor Network Localization in Noisy Environments 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 11
SERIVCE COMPUTING SOA (WEB SERVICE)
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SRD1101 Monitoring Service Systems from a Language-Action Perspective 2011
2 SRD1102 Vulnerability Analysis in SOA-based Business Processes 2011
3 SRD1302 Cost-Based Optimization of Service Compositions 2013
4 SRD1303 Evolution of Social Networks Based on Tagging Practices 2013
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PAD1101 Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models 2011
2 PAD1202 Exploring Context and Content Links in Social Media: A Latent Space Method 2012
MULTIMEDIA
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MMD1301 Beyond Text QA: Multimedia Answer Generation by Harvesting Web
Information 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 12
FINAL YEAR PROJECTS
IEEE PROJECTS 2013 – 2014
JAVA PROJECTS CLOUD COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 CCJ1101 Enabling Public Auditability and Data Dynamics for Storage Security in Cloud
Computing 2011
2 CCJ1102 Cloud Computing for Agent-Based Urban Transportation Systems 2011
3 CCJ1103 Secure and Practical Outsourcing of Linear Programming in Cloud Computing 2011
4 CCJ1204 A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding. 2012
5 CCJ1205 Cloud Computing Security From Single to Multi-Clouds. 2012
6 CCJ1206 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud
Storage 2012
7 CCJ1207 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control in Cloud Computing. 2012
8 CCJ1208 Outsourced Similarity Search on Metric Data Assets. 2012
9 CCJ1209 Scalable and Secure Sharing of Personal Health Records in Cloud Computing
using Attribute-based Encryption. 2012
10 CCJ1210 Toward Secure and Dependable Storage Services in Cloud Computing. 2012
11 CCJ1311 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective
Privacy Preserving of Intermediate Data Sets in Cloud 2013
12 CCJ1312 An Adaptive Cloud Downloading Service 2013
13 CCJ1313 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 13
14 CCJ1314 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
15 CCJ1315 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 2013
16 CCJ1316 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2013
17 CCJ1317 Privacy-Preserving Public Auditing for Secure Cloud Storage 2013
18 CCJ1318 QoS Ranking Prediction for Cloud Services 2013
19 CCJ1319 Scalable and Secure Sharing of Personal Health Records in Cloud Computing
Using Attribute-Based Encryption 2013
20 CCJ1320 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for
Production Cloud Computing Systems 2013
21 CCJ1321 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 2013
22 CCJ1322 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems 2013
23 CCJ1323 CloudMoV: Cloud-based Mobile Social TV 2013
24 CCJ1324 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment 2013
25 CCJ1325 Error-Tolerant Resource Allocation and Payment Minimization for Cloud
System 2013
26 CCJ1326 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear
Equations 2013
DATA MINING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 DMJ1101 Text Clustering with Seeds Affinity Propagation 2011
2 DMJ1102 Clustering with Multi-Viewpoint based Similarity Measure. 2011
3 DMJ1103 Effective Navigation of Query Results Based on Concept Hierarchies 2011
4 DMJ1104 Discovering Conditional Functional Dependencies 2011
5 DMJ1105 Ranking Spatial Data by Quality Preferences 2011
6 DMJ1106 Extended XML Tree Pattern Matching: Theories and Algorithms 2011
7 DMJ1207 Clustering with Multi-viewpoint-Based Similarity Measure 2012
8 DMJ1208 Efficient Extended Boolean Retrieval 2012
9 DMJ1209 Ranking Model Adaptation for Domain-Specific Search 2012
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 14
10 DMJ1210 Slicing: A New Approach for Privacy Preserving Data Publishing 2012
11 DMJ1211 Efficient Fuzzy Type-Ahead Search in XML Data 2012
12 DMJ1212 Effective Pattern Discovery for Text Mining 2012
13 DMJ1313 A Fast Clustering-Based Feature Subset Selection Algorithm for High-
Dimensional Data 2013
14 DMJ1314 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013
15 DMJ1315 Annotating Search Results from Web Databases 2013
16 DMJ1316 Anomaly Detection via Online Over-Sampling Principal Component Analysis 2013
17 DMJ1317 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor
Networks 2013
18 DMJ1318 m-Privacy for Collaborative Data Publishing 2013
19 DMJ1319 Protecting Sensitive Labels in Social Network Data Anonymization 2013
20 DMJ1320 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting
System Development 2013
21 DMJ1321 Document Clustering for Forensic Analysis: An Approach for Improving
Computer Inspection 2013
22 DMJ1322 A Method for Mining Infrequent Causal Associations and Its Application in
Finding Adverse Drug Reaction Signal Pairs 2013
23 DMJ1323 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering
Algorithm 2013
1 DMJ1101 Text Clustering with Seeds Affinity Propagation 2011
2 DMJ1102 Clustering with Multi-Viewpoint based Similarity Measure. 2011
3 DMJ1103 Effective Navigation of Query Results Based on Concept Hierarchies 2011
4 DMJ1104 Discovering Conditional Functional Dependencies 2011
5 DMJ1105 Ranking Spatial Data by Quality Preferences 2011
6 DMJ1106 Extended XML Tree Pattern Matching: Theories and Algorithms 2011
7 DMJ1207 Clustering with Multi-viewpoint-Based Similarity Measure 2012
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 15
PARALLEL AND DISTRIBUTED SYSTEMS
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PDJ1201 BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P
Networks 2012
2 PDJ1202 Payments for Outsourced Computations 2012
3 PDJ1203 Cut Detection in Wireless Sensor Networks 2012
4 PDJ1204 A Framework for Routing Performance Analysis in Delay Tolerant Networks
with Application 2012
5 PDJ1305 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 2013
6 PDJ1306 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-
Based Encryption Scheme 2013
7 PDJ1307 IP-Geolocation Mapping for Moderately Connected Internet Regions 2013
8 PDJ1308 Optimal Client-Server Assignment for Internet Distributed Systems 2013
NETWORKING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 NWJ1101 A new approach for FEC decoding based on the BP algorithm in LTE and Wi-
MAX systems 2011
2 NWJ1102 Buffer Sizing for 802.11 Based Networks 2011
3 NWJ1103 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless
Networks 2011
4 NWJ1104 ProgME: Towards Programmable Network Measurement 2011
5 NWJ1105 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks 2011
6 NWJ1206 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks 2012
7 NWJ1207 Design, Implementation, and Performance of a Load Balancer for SIP Server
Clusters 2012
8 NWJ1208 Independent Directed Acyclic Graphs for Resilient Multipath Routing 2012
9 NWJ1209 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 2012
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 16
10 NWJ1210 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012
11 NWJ1211 RIHT: A Novel Hybrid IP Traceback Scheme 2012
12 NWJ1212 Router Support for Fine-Grained Latency Measurements 2012
13 NWJ1213 Packet Loss Control Using Tokens at the Network Edge 2012
14 NWJ1314 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013
15 NWJ1315 Delay-Based Network Utility Maximization 2013
16 NWJ1316 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 2013
17 NWJ1317 Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols 2013
18 NWJ1318 On the Node Clone Detection in Wireless Sensor Networks 2013
19 NWJ1319 Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power 2013
20 NWJ1320 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication
Networks 2013
21 NWJ1321 Fast Transmission to Remote Cooperative Groups: A New Key Management
Paradigm 2013
SECURE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SCJ1101 Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 2011
2 SCJ1102 Towards Situational Awareness of Large-Scale Botnet Probing Events 2011
3 SCJ1103 Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective
Embedding 2011
4 SCJ1104 A Competitive Study of Cryptography Techniques over Block Cipher. 2011
5 SCJ1105 Analysis on Credit Card Fraud Detection Methods. 2011
6 SCJ1106 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 2011
7 SCJ1107 Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes 2011
8 SCJ1108 A Unified Approach to Optimizing Performance in Networks Serving
Heterogeneous Flows 2011
9 SCJ1109 Optimal Bandwidth Assignment for Multiple-Description-Coded Video 2011
10 SCJ1110 Caching Strategies Based on Information Density 2011
11 SCJ1111 Nymble- Blocking Misbehaving Users in Anonymizing Networks 2011
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 17
12 SCJ1112 Modeling and Detection of Camouflaging Worm 2011
13 SCJ1113 SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless
Mesh Networks 2011
14 SCJ1214 A Stochastic Model of Multi-virus Dynamics 2012
15 SCJ1215 Design and Implementation of TARF: A Trust-Aware Routing Framework for
WSNs 2012
16 SCJ1216 Detecting and Resolving Firewall Policy Anomalies 2012
17 SCJ1217 Detecting Spam Zombies by Monitoring Outgoing Messages 2012
18 SCJ1218 On the Security of a Ticket-Based Anonymity System with Traceability Property
in Wireless Mesh Networks 2012
19 SCJ1219 Online Modeling of Proactive Moderation System for Auction Fraud Detection 2012
20 SCJ1220 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012
21 SCJ1221 Risk-Aware Mitigation for MANET Routing Attacks 2012
22 SCJ1222 DoubleGuard: Detecting Intrusions in Multitier Web Applications 2012
23 SCJ1323 EAACK—A Secure Intrusion-Detection System for MANETs 2013
24 SCJ1324 Identity-Based Secure Distributed Data Storage Schemes 2013
25 SCJ1325 Modeling the Pairwise Key Predistribution Scheme in the Presence of
Unreliable Links 2013
26 SCJ1326 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual
Network Systems 2013
27 SCJ1327 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
28 SCJ1328 Securing Class Initialization in Java-like Languages 2013
29 SCJ1329 Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks 2013
30 SCJ1330 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013
31 SCJ1331 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in
Twitter Stream 2013
32 SCJ1332 Two tales of privacy in online social networks 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 18
IMAGE PROCESSING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 IPJ1101 Embedded Extended Visual Cryptography Schemes 2011
2 IPJ1102 Computational Perceptual Features for Texture Representation and Retrieval 2011
3 IPJ1103 Subspace-Based Striping Noise Reduction in Hyper-spectral Images 2011
4 IPJ1204 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2012
5 IPJ1205 Improving Various Reversible Data Hiding Schemes Via Optimal Codes for
Binary Covers 2012
6 IPJ1206 Scalable Coding of Encrypted Images 2012
7 IPJ1207 Handwritten Chinese Text Recognition by Integrating Multiple Contexts 2012
8 IPJ1208 Adaptive Membership Functions for Hand-Written Character Recognition by
Voronoi-based Image Zoning 2012
9 IPJ1209 A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group 2012
MOBILE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MCJ1101 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks 2011
2 MCJ1202 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012
3 MCJ1203 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 2012
4 MCJ1204 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions
over Wireless Networks 2012
5 MCJ1205 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees 2012
6 MCJ1206 A Trigger Identification Service for Defending Reactive Jammers in WSN 2012
7 MCJ1307 Content Sharing over Smartphone-Based Delay-Tolerant Networks 2013
8 MCJ1308 DCIM: Distributed Cache Invalidation Method for Maintaining Cache
Consistency in Wireless Mobile Networks 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 19
9 MCJ1309 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 2013
10 MCJ1310 Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-
Period Mobile Users 2013
11 MCJ1311 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013
12 MCJ1312 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 2013
13 MCJ1313 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 2013
14 MCJ1314 Toward Privacy Preserving and Collusion Resistance in a Location Proof
Updating System 2013
SERIVCE COMPUTING SOA (WEB SERVICE)
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SRJ1201 Bootstrapping Ontologies for Web Services 2012
2 SRJ1202 Semantics-Based Automated Service Discovery 2012
3 SRJ1303 A Decentralized Service Discovery Approach on Peer-to-Peer Networks 2013
4 SRJ1304 Personalized QoS-Aware Web Service Recommendation and Visualization 2013
5 SRJ1305 Privacy-Enhanced Web Service Composition 2013
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PAJ1301 A Framework for Mining Signatures from Event Sequences and Its Applications
in Healthcare Data 2013
Contact: 8870006111, 9944192557 Email ID: [email protected]
www.idolph.com
746 / 348 – Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem – 636006 20
SOFTWARE ENGINEERING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SEJ1101 Invariant-Based Automatic Testing of Modern Web Applications 2011
2 SEJ1302 Whole Test Suite Generation 2013
MULTIMEDIA
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MMJ1101 Learn to Personalized Image Search from the Photo Sharing Websites 2011
2 MMJ1202 Understanding the External Links of Video Sharing Sites: Measurement and
Analysis 2012