ieee 2013 project titles, ieee project titles for cse, ieee project titles for it, ieee project...
DESCRIPTION
IEEE PROJECT TITLES IN NETWORKING, IEEE PROJECT TITLES IN NETWORK SECURITY, IEEE PROJECT TITLES IN CLOUD COMPUTING, IEEE PROJECT TITLES IN GRID COMPUTING, IEEE PROJECT TITLES IN MOBILE COMPUTING, IEEE PROJECT TITLES IN DATA MINING, IEEE PROJECT TITLES IN NS2, IEEE 2013 PROJECT TITLES IN JAVA, IEEE 2013 PROJECT TITLES IN DOTNET, IEEE PROJECT 2013 TITLES IN ANDROID,TRANSCRIPT
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
IEEE PRJECT TITLE BOOK2013-14
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
JAVATECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON NETWORKING
SNO P.CODE TITLES DESCRIPTION YEAR
1 ISJNW01 An Error MinimizingFramework for LocalizingJammers in WirelessNetworks
in this paper, we aim to design aframework that can localize oneOr multiple jammers with a highaccuracy. Most of existing jammer-localization schemes utilize indirectmeasurements (e.g.,hearing ranges)affected by jamming attacks, whichmakes it difficult to localize jammersaccurately
2013
2 ISJNW02 Incentive-Driven and Privacy-Preserving MessageDissemination in Large ScaleMobile Networks
In this paper, we propose a new typeof incentive-driven and privacy-preserving systems for large scalemessage dissemination in mobilenetworks. To distribute incentiveswhich encourage forwardingbehaviors, such as monetary rewards,we want to keep track of the forwarderlist.
2013
3 ISJNW03 Understanding Multi-TaskSchedulability in Duty-Cycling Sensor Networks
Here, We investigate a fundamentalscheduling problem of both theoreticaland practical importance,called multi-task schedulabilityproblem, i.e., given multiple dataforwarding tasks, to determine themaximum number of tasks thatcan be scheduled within theirdeadlines and work out such aschedule. We
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
4 ISJNW04 Cluster-Based CertificateRevocation with VindicationCapability for Mobile Ad HocNetworks
In this paper, we focus on the issue ofcertificate revocation to isolateattackers from further participating innetwork activities. For quick andaccurate certificate revocation, wepropose the Cluster-based CertificateRevocation With VindicationCapability (CCRVC) scheme.
2013
5 ISJNW05 Enabling Efficient WiFi-Based Vehicular ContentDistribution
In this paper, we introduceCooperative Content DistributionSystem for Vehicles (CCDSV) whichoperates upon a network ofinfrastructure APs to collaborativelydistribute contents tomoving vehicles.
2013
6 ISJNW06 Balancing the Trade-Offsbetween query Delay and dataavailability in MANETs
In This Project, we propose schemestoBalance the trade –offs between dataavailability and query delay underdifferent system settings andrequirements. Mobile nodes in onepartition are not able to access datahosted by nodes in other partitions,and hence significantly degrade theperformance of data access. To dealwith this problem, we apply datareplication techniques.
2013
7 ISJNW07 Rake: Semantics AssistedNetwork-Based TracingFramework
The ability to trace request executionpaths is critical for diagnosingperformance faults in large-scaledistributed systems. Previous black-box and white-box approaches areeither inaccurate or invasive. Wepresent a novel semantics-assistedgray-box tracing approach, calledRake, which can accurately traceindividual request by observingnetwork traffic.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
8 ISJNW08 MeasuRouting:A FrameworkFor Routing Assisted TrafficMonitoring.
In this paper we present a theoreticalframework for Misrouting.Furthermore, as proofs-of-concept, wepresent synthetic and praticalmonitoring applications to showcasethe utility enhancement achieved withMeasuRouting.
2012
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY
SNO P.CODE TITLES DESCRIPTION YEAR
8 ISJNS01 SORT: A Self-Organizing TrustModel for Peer-to-Peer Systems
This paper presents distributedalgorithms that enable a peer to reasonabout trustworthiness of Other peersbased on past interactions andrecommendations. Peers create theirown trust network in their proximity byusing local Information available and donot try to learn global trust information.
2013
9 ISJNS02 Unprivileged Black-BoxDetection of User-SpaceKeyloggers
We propose a new detection techniquethat simulates carefully craftedkeystroke sequences in input andobserves the behavior of the keyloggerin output to unambiguously identify itamong all the running processes. Wehave prototyped our technique as anunprivileged application, hencematching the same ease of deploymentof a keylogger executing inunprivileged mode
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
10 ISJNS03 Automatic Reconfiguration forLarge-Scale Reliable StorageSystems
In this paper, we present a completesolution for dynamically changingsystem membership in a large-scaleByzantine-fault-tolerant system. Wepresent a service that tracks systemmembership and periodically notifiesother system nodes of changes
2013
11 ISJNS04 On the Security and Efficiencyof Content Distribution viaNetwork Coding
Content distribution via network codinghas received a lot of attention lately.However, direct application of networkcoding may be insecure. In particular,attackers can inject "bogus” data tocorrupt the content distribution processso as to hinder the information dispersalor even deplete the network resource.Therefore, content verification is animportant and practical issue whennetwork coding is employed.
2013
ISJNS05 COKE Crypto-Less Over-the-Air Key Establishment
In this paper, we present a novelprobabilistic protocol (COKE) to allowtwo wireless communicating parties tocommit over-the-air (OTA) on a sharedsecret, even in the presence of aglobally eavesdropping adversary. Theproposed solution leverages no cryptobut just plaintext messages exchange.
2013
ISJNS06 Performance of VirtualMachines Under NetworkedDenial of Service Attacks:Experiments and Analysis
The use of virtual machines (VMs) toprovide computational infrastructureand services to organizations isincreasingly prevalent in the modern ITindustry. The growing use of thistechnology has been driven by a desireto increase utilization of resourcesthrough server consolidation.Virtualization has also made the dreamof such utility computing platforms ascloud computing a reality.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
12 ISJNS07 Packet-Hiding Methods forPreventing Selective JammingAttacks.
In this paper, we address the problemof selective jamming attacks in wirelessnetworks. In these attacks, theadversary is active only for a shortperiod of time, selectively targetingmessages of high importance.
2012
13 ISJNS08 Efficient Network Modificationto Improve QoS Stability atFailures
As real-time traffic such as video orvoice increases on the Internet, ISPs arerequired to provide stable quality aswell as connectivity at failures. ForISPs, how to effectively improve thestability of these qualities at failureswith the minimum investment cost is animportant issue, and they need toeffectively select a limited number oflocations to add link facilities
2011
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON DATA MINING
SNO P.CODE TITLES DESCRIPTION YEAR
14 ISJDM01 Tweet Analysis for Real-TimeEvent Detection and EarthquakeReporting System Development
Twitter has received much attentionrecently. An important characteristic ofTwitter is its real-time nature. Weinvestigate the real-time interaction ofevents such as earthquakes in Twitterand propose an algorithm to monitortweets and to detect a target event. Todetect a target event, we devise aclassifier of tweets based on featuressuch as the keywords in a tweet, thenumber ofWords and their context.
2013
15 ISJDM02 A Fast Clustering-BasedFeature Subset Selection
Feature selection involves identifying asubset of the most useful features that
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
Algorithm for High-Dimensional Data
produces compatible results as theoriginal entire set of features. A featureselection algorithm may be evaluatedfrom both the efficiency andeffectiveness points of view. Whilethe efficiency concerns the timerequired to find a subset of features, theeffectiveness is related to the quality ofthe subset of features.Based on these criteria, a fastclustering-based feature selectionalgorithm (FAST) is proposed andexperimentally evaluated in this paper.
16 ISJDM03 A Genetic ProgrammingApproach to RecordDeduplication
In this paper, we propose a geneticprogramming approach to recorddeduplication that combines severaldifferent pieces of evidenceextracted from the data content to find adeduplication function that is able toidentify whether two entries in arepository are replicas or not.
2013
17 ISJDM04 Clustering Sentence-Level TextUsing a Novel Fuzzy RelationalClustering Algorithm
This paper presents a novel fuzzyclustering algorithm that operates onrelational input data; i.e., data in theform of a square matrix of pairwisesimilarities between dataObjects. The algorithm uses a graphrepresentation of the data, and operatesin an Expectation-Maximizationframework in which the graph centralityof an object in the graph is interpretedas a likelihood.
2013
18 ISJDM05 Dynamic PersonalizedRecommendation on SparseData
In this paper, a novel dynamicpersonalized recommendation algorithmis proposed, in which informationcontained in both ratings and profilecontents are utilized by exploringlatent relations between ratings, a set ofdynamic features are designed to
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
describe user preferences in multiplephases, and finally a recommendation ismade by adaptively weighting thefeatures.
19 ISJDM06 Maximum LikelihoodEstimation from UncertainData in the Belief FunctionFramework
We consider the problem of parameterestimation in statistical models in thecase where data are uncertain andRepresented as belief functions. Theproposed method is based on themaximization of a generalizedlikelihood criterion, which can beInterpreted as a degree of agreementbetween the statistical model and theuncertain observations.
2013
20 ISJDM07 Ranking on Data Manifold withSink Points
In this paper, we introduce a novelApproach, Manifold Ranking with SinkPoints (MRSPs), to address diversity aswell as relevance and importance inranking. Specifically, our approach usesa manifold ranking process over thedata manifold, which can naturally findthe most relevant and Important dataobjects.
2013
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
21 ISJMC01 Channel Assignment forThroughput Optimization inMultichannel MultiradioWireless Mesh Networks UsingNetwork Coding
Compared to single-hop networks suchas Wi-Fi, multihop infrastructurewireless mesh networks (WMNs) canpotentially embrace the broadcastbenefits of a wireless medium in a moreflexible manner. Rather than beingpoint-to-point, links in the WMNsmay originate from a single node andreach more than one other node
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
22 ISJMC02 Discovery and Verification ofNeighbor Positions in MobileAd Hoc Networks
In this paper, we address the issues byproposing a fully distributedcooperative solution that is robustagainst independent and colludingadversaries, and can be impaired onlyby an overwhelming presence ofadversaries. Results show that ourprotocol canthwart more than 99 percent of theattacks under the best possibleconditions for the adversaries, withminimal false positive rates.
2013
23 ISJMC03 Distributed CooperativeCaching in Social WirelessNetworks
This paper introduces cooperativecaching policies for minimizingelectronic content provisioning cost inSocial Wireless Networks (SWNET).SWNETs are formed by mobiledevices, such as data enabled phones,electronic book readers etc., sharingcommon interests in electronic content,and physically gathering together inpublic places
2013
24 ISJMC04 EAACK—A Secure Intrusion-Detection System for MANETs
In this paper, we propose andimplement a new intrusion-detectionsystem named Enhanced Adaptiveacknowledgment (EAACK) speciallydesigned for MANETs. Comparedto contemporary approaches, EAACKdemonstrates higher malicious-Behavior-detection rates in certaincircumstances while does not greatlyaffect the network performances.
2013
25 ISJMC05 EMAP: Expedite MessageAuthentication Protocol forVehicular Ad Hoc Networks
In this paper, we propose anExpedite Message AuthenticationProtocol (EMAP) for VANETs, whichreplaces the time-consuming CRLchecking process by an efficientrevocation checking process. Therevocation check process in EMAP uses
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
a keyed Hash Message AuthenticationCode HMAC, where the key used incalculating the HMAC is shared onlybetween non revoked On-Board Units
26 ISJMC06 Adaptive Mobile CloudComputing to Enable RichMobile MultimediaApplications
In this paper, we look at early trends,and opportunities and benefits for newCMM applications and services. Weanalyze the challenges imposed by mobile cloud computing that need to beaddressed to make CMM applicationsviable, including response time, userexperience, cloud computing cost,mobile network bandwidth, and scalability to large number of CMMusers,besides other important cloudcomputing issues like energyconsumption, privacy, and security.
2013
27 ISJMC07 Pulse Switching: Toward aPacket-Less Protocol Paradigmfor Event Sensing
This paper presents a novel pulseswitching protocol framework for ultralight-weight wireless networkapplications. The key Idea is to abstracta single Ultra Wide Band (UWB) pulseas the information switchinggranularity. Pulse switching is shown tobe sufficient for on-off style eventmonitoring applications for which amonitored parameter can be modeledusing a binary variable.
2013
WiCop: Engineering WiFiTemporal White-Spaces forSafe Operations of WirelessPersonal Area Networks inMedical Applications
This paper exploits the Clear ChannelAssessment (CCA) mechanism in WiFidevices and proposes novel policingframework, WiCop, that can effectivelycontrol the temporal white-spacesbetween WiFi transmissions. Suchtemporal white-spaces can be utilizedfor delivering low duty cycle WPANtraffic. We have implemented andvalidated WiCop on SORA, a softwaredefined radio platform.
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
28 ISJMC08 Quality-Differentiated VideoMulticast in Multirate WirelessNetworks
In this work, we investigate a rate-adaptive video multicast scheme thatcan provide heterogeneous clientsdifferentiated visual qualities matchingtheir channel conditions. We firstpropose a rate scheduling model thatselects the optimal transmission bit ratefor each video frame to maximize thetotal visual quality for a multicast groupsubject to the minimum-visual-quality-guaranteed constraint.
2013
29 ISJMC09 Toward Privacy Preserving andCollusion Resistance in aLocation Proof UpdatingSystem
we propose A Privacy-Preservinglocation proof Updating System(APPLAUS) in which colocatedBluetooth enabled mobile devicesmutually generate location proofs andsend updates to a location proof server.Periodically changed pseudonyms areused by the mobile devices to protectsource location privacy from each other,and from the untrusted location proofserver.
2013
30 ISJMC10 Vampire Attacks: Draining Lifefrom Wireless Ad Hoc SensorNetworks
This paper explores resource depletionattacks at the routing protocol layer,which permanently disable networks byquickly draining nodes’ battery power.These “Vampire” attacks are notspecific to any specific protocol, butrather rely on the properties of manypopular classes of routingProtocols.
2013
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
SNO P.CODE TITLES DESCRIPTION YEAR
61 ISJSE01 Ant Colony Optimization for this paper develops a novel approach 2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
Software Project Schedulingand Staffing with an Event-Based Scheduler
with an event-based Scheduler (EBS)and an ant colony optimization (ACO)algorithm. The proposed approachrepresents a plan by a task list and aPlanned employee allocation matrix.
62 ISJSE02 Identifying and SummarizingSystematic Code Changes viaRule Inference
this paper proposes a rule-basedprogram differencing approach thatautomatically discovers andRepresents systematic changes as logicrules. To demonstrate the viability ofthis approach, we instantiated thisapproach at two Different abstractionlevels in Java: first at the level ofapplication programming interface(API) names and signatures, and secondat the level of code elements andstructural dependences.
2013
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
31 ISJCC01 Dynamic Resource AllocationUsing Virtual Machines forCloud Computing Environment
In this paper, we present a systemthat uses virtualization technology toallocate data center resourcesdynamically based on applicationdemands and support greencomputing by optimizing the number ofservers in use
2013
32 ISJCC02 Scalable and Secure Sharing ofPersonal Health Records inCloud Computing UsingAttribute-Based Encryption
we propose a novel patient-centricframework and a suite of mechanismsfor data access control to PHRs storedin semitrusted servers. To achieve fine-grained and scalable data access controlfor PHRs, we leverage attribute-basedencryption (ABE) techniques to encrypteach patient’s PHR file.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
33 ISJCC03 PACK: Prediction-Based CloudBandwidth and Cost ReductionSystem
In this paper, we present PACK, a novelend-to-end traffic redundancyelimination (TRE) system, designed forcloud computing customers. Cloud-based TRE needs to apply a judicioususe of cloud resources so that thebandwidth cost reduction combinedwith the additional cost of TREcomputation And storage would beoptimized.
2013
34 ISJCC04 ANTELOPE: A Semantic-aware Data Cube Scheme forCloud Data Center Networks
we present ANTELOPE, a scalabledistributed data-centric scheme in clouddata centers, in which we systematicallytake into account both the property ofnetwork architecture andthe optimization of data placement.
2013
35 ISJCC05 Attribute-Based Access toScalable Media in Cloud-Assisted Content SharingNetworks
This paper presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE)technique, and employs the MCP-ABEto design an access control scheme forsharing scalable media based on dataconsumers’ attributes (e.g., age,nationality, or gender) rather than anexplicit list of the consumers’ names.
2013
36 ISJCC06 Dynamic Scheduling andPricing in Wireless CloudComputing
In this paper, we consider a wirelesscloud computing system in which thewireless service provider operates a datacenter and provides cloud services to itssubscribers at dynamic prices. Wepropose a joint optimization ofscheduling and pricing decisions fordelay-tolerant batch services tomaximize the service provider’s long-term profit.
2013
37 ISJCC07 pCloud: A Distributed Systemfor Practical PIR
In this paper we present pCloud, adistributed system that constitutes thefirst attempt towards practical cPIR.Our approach assumes a disk-based
2012
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
architecture that retrieves one page witha single query. Using a stripingtechnique, we distribute the database toa number of cooperative peers, andleverage their computational resourcesto process cPIR queries in parallel. Weimplemented pCloud on the PlanetLabnetwork, and experimented extensivelywith several system parameters results.
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING
SNO P.CODE TITLES DESCRIPTION YEAR
61 ISJIM01 A Novel Joint Data-Hiding andCompression Scheme Based onSMVQ and Image Inpainting
In this paper, we propose a novel jointdata-hiding and compression schemefor digital images using side matchvector quantization (SMVQ) and imageinpainting. The two functions of datahiding and image compression can beintegrated into one single moduleseamlessly.
2013
62 ISJIM02 Image Size Invariant VisualCryptography for GeneralAccess Structures Subject toDisplay Quality Constraints
Conventional visual cryptography (VC)suffers from a pixel-expansionproblem, or an uncontrollable displayquality problem for recovered images,and lacks a general approach toconstruct visual secret sharing schemes(VSSs) for general access structures(GASs).
2013
ISJIM03 Multiview HessianRegularization for ImageAnnotation
The rapid development of computerhardware and Internet technologymakes large scale data dependentmodels computationally tractable, andopens a bright avenue for annotatingimages through innovative machinelearning algorithms.
2013
ISJIM04 Optimized 3D Watermarking This paper proposes a new approach to
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
for Minimal Surface Distortion 3D watermarking by ensuring theoptimal preservation of mesh surfaces.A new 3D surface preservation functionmetric is defined consisting of thedistance of a vertex displaced bywatermarking to the original surface, tothe watermarked object surface as wellas the actual vertex displacement.
TECHNOLOGY: JAVADOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
61 ISJGC01 On the Design of MutuallyAware Optimal Pricing andLoad Balancing Strategies forGrid Computing Systems
Managing resources and cleverlypricing them on computing systems is achallenging task. Resource sharingdemands careful load balancing andoften strives to achieve a win-winsituation between resource providersand users. Toward this goal, weconsider a joint treatment of loadbalancing and pricing.
2013
62 ISJGC02 Multilayer Consensus ECC-Based Password AuthenticatedKey-Exchange (MCEPAK)Protocol for Smart Grid System
This paper aims at providing a keyagreement protocol for smart grid tocope with access control ofappliances/devices located inside aHome Area Network (HAN) by a set ofcontrollers outside the HAN. Thecommands/packets initiated by thecontrollers in crisis cases should bedelivered fast and immune from anyinterruption.
2013
ISJGC03 A Merge-and-Split Mechanismfor Dynamic VirtualOrganization Formation inGrids
Executing large scale applicationprograms in grids requires resourcesfrom several Grid Service Providers(GSPs). These providers form Virtual
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
Organizations (VOs) by pooling theirresources together to provide therequired capabilities to execute theapplication.
JAVA APPLICATION PROJECTS
TECHNOLOGY : JAVADOMAIN : NON IEEE BASED PROJECTS
SNO P.CODE PROJECT TITLE
1 ISNIJ01 Inventory Management System
2 ISNIJ02 Human Capital Management System
3 ISNIJ03 CMS Measures Management System
4 ISNIJ04 MIS For Alumni Students
5 ISNIJ05 A Conceptual View Of Web Based E-Learning System
6 ISNIJ06 Marking large scale deliberation online management system
7 ISNIJ07 Printed Work To Spoken Vibration Converter
8 ISNIJ08 Quiver: Consistent And Scalable Sharing For Edge Services
9 ISNIJ09 Design And Implementation Of Scalable Edge Based Admission
10 ISNIJ10Strong Barrier Coverage For Intrusion Detection In Wireless SensorNetwork
11 ISNIJ11 A Dynamic Path Identification Mechanism To Defend Against Ddos
12 ISNIJ12 Mittigating Performance Degradation In Congested Sensor Networks
13 ISNIJ13 Efficient Dynamic Probabilistic Packet Marking Scheme
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
AANNDDRROOIIDDTECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
1 ISACC01 A Review on DistributedApplication ProcessingFrameworks in Smart MobileDevices for Mobile CloudComputing
It proposes thematic taxonomy ofcurrent DAPFs, reviews currentoffloading frameworks by usingthematic taxonomy and analyzes theimplications and critical aspects ofcurrent offloading frameworks. Further,it investigates commonalities anddeviations in such frameworks on thebasis significant parameters such asoffloading scope, migration granularity,partitioning approach, and migrationpattern. Finally, we put forward openresearch issues in distributed
2013
14 ISNIJ14 Dynamic Adaptation Of Checkpoints And Rescheduling In Grid
15 ISNIJ15Fully Predictable HPC Infrastructure Using Admission Control WithVirtualization
16 ISNIJ16 E Compiler For Java With Security Editor
17 ISNIJ17 Change Point Monitoring For Detection Of Dos Attacks
18 ISNIJ18Bi-Criteria Scheduling With Dynamic Instantiation For WorkflowExecution On Grids
19 ISNIJ19 Eight Times Acceleration Of Geospatial Data Archiving
20 ISNIJ20 Automatic Reconfiguration In Wireless Mesh Networks
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
application processing for MCC thatremain to be addressed.
2 ISACC02 A Network and Device AwareQoS Approach for Cloud-BasedMobile Streaming.
, this study presented a network anddevice-aware Quality of Service (QoS)approach that provides multimedia datasuitable for a terminal unit environmentvia interactive mobile streamingservices, further considering the overallnetwork environment and adjusting theinteractive transmission frequency andthe dynamic multimedia transcoding, toavoid the waste of bandwidth andterminal power.
2013
TECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
3 ISAMC01 Wireless Machine-to-MachineHealthcare Solution UsingAndroid Mobile Devices inGlobal Networks
This paper presents a prototypemachine-to machine (M2M) healthcaresolution that combines mobile and IPv6techniques in a wireless sensor networkto monitor the health condition ofpatients and provide a wide range ofeffective, comprehensive, andconvenient healthcare services.
2013
4 ISAMC02 Traffic Signature-based MobileDevice LocationAuthentication
In this paper, We describe a prototypenon-cryptographic locationauthentication system we constructed,and explain how to design both voiceand data transmissions with distinct,discernible traffic signatures. Usingboth analytical modeling and empiricalresults from our implementation, wedemonstrate that these signatures canbe reliably detected even in thepresence of heavy cross-traffic
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
introduced by other femtocell users
TECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON DATA ENGINEERING
SNO P.CODE TITLES DESCRIPTION YEAR
5 ISADE01 PMSE: A Personalized MobileSearch Engine
In this paper, We propose apersonalized mobile search engine(PMSE) that captures the users’preferences in the form of concepts bymining their click through data. Due tothe importance of location informationin mobile search, PMSE classifies theseconcepts into content concepts andlocation concepts. In addition, users’locations (positioned by GPS) are usedto supplement the location concepts inPMSE.
2013
6 ISADE02 Smartphone-Based IndustrialInformatics Projects andLaboratories
In this paper, smart phones andmultimedia technologies are proposedas an innovative way to tackle theformation of students, at differentlevels, in the Industrial Informatics(II) subject of the IndustrialElectronics Engineering (IEE) degree.II instructs future Engineers in thedesign of IT systems to controlindustrial processes. An application ofthe Smartphone multimedia tool ispresented to show how studentsinteract with the developed system
2013
TECHNOLOGY: ANDROIDDOMAIN : IEEE TRANSACTIONS ON CONTEXT AWARE SERVICES
SNO P.CODE TITLES DESCRIPTION YEAR
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
7 ISACS01 A Survey on Context-AwareMobile and WirelessNetworking: On Networking andComputing Environments’Integration
In this survey paper, we aim toassemble all the ”puzzle-pieces” of theemerging research area of ContextAware Mobile and WirelessNetworking (CAMoWiN) in order toprovide the reader aholisticrepresentation of the work having beendone in the past emphasizing in recentresearch effort.
2013
8 ISACS02 Cloud-Based Augmentation forMobile Devices: Motivation,Taxonomies, and OpenChallenges
This paper comprehensively surveys themobile augmentation domain andpresents taxonomy of CMA approaches.The objectives of this study is tohighlight the effects of remote resourceson the quality and reliability ofaugmentation processes and discuss thechallenges and opportunities ofemploying varied cloud-based.
2013
TECHNOLOGY: MULTIMEDIADOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA
SNO P.CODE TITLES DESCRIPTION YEAR
3 ISJMM01 Learning to Photograph: ACompositional Perspective
In this paper, we present an intelligentphotography system which canrecommend the most user-favored viewrectangle for arbitrary camera input,from a photographic compositionalperspective. Automating this process isdifficult, due to the subjectivity ofhuman’s aesthetics judgment and largevariations of image contents, whereheuristic compositional rules lackgenerality.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
4 ISJMM02 Affective Labeling in a Content-Based Recommender System forImages
Affective labeling of multimedia contenthas proved to be useful in recommendersystems. In this paper we present amethodology for the implicit acquisitionof affective labels for images. It is basedon an emotion detection technique thattakes as input the video sequences of theusers’ facial expressions.
2013
5 ISJMM03 Beyond Text QA: MultimediaAnswer Generation byHarvesting Web Information
In this paper, we propose a scheme thatis able to enrich textual answers in cQAwith appropriate media data. Ourscheme consists of three components:answer medium selection, querygeneration for multimedia sea rch, andmultimedia data selection andpresentation.
2013
DDOOTTNNEETTTECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON NETWORKING
SNO P.CODE TITLES DESCRIPTION YEAR
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
1 ISDNW01 Dynamic Service ContractEnforcement in Service-OrientedNetworks
In this paper, we propose and validateDoWSS, a doubly weighted algorithmfor service traffic shaping. We show viasimulation that Do WSS possessesseveral advantages: It eliminates theapproximation issues, preventsstarvation, and contains the rapid creditconsumption issue in existing credit-based approaches.
2013
2 ISDNW02 Vulnerability of NetworkMechanisms to SophisticatedDDoS Attacks
Our approach is based on proposing ametric that evaluates thevulnerability of a system. We thenuseour vulnerability metric to evaluatea data structure which is commonlyused in network mechanisms-the Hashtable data structure.
2013
Design and PerformanceEvaluation of Overhearing-AidedData Cachingin Wireless Ad Hoc Networks
In this paper, we propose an efficientdata caching algorithm which makes useof the overhearing property of wirelesscommunication to improve cachingperformance.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
IP-Geolocation Mapping forModerately Connected InternetRegions
In this paper, however, we investigate alarge region of moderately connectedInternet and find the delay-distancecorrelation is weak. But we discover amore probable rule—with highprobability the shortest delay comesfrom the closest distance.
2013
3 ISDNW03 Detection and Localization ofMultiple Spoofing Attackers inWireless Networks
In this paper, we propose to use spatialinformation, a physical propertyassociated with each node, hard tofalsify,and not reliant oncryptography, as the basis for 1)detecting spoofing attacks; 2)determining the no of attackers whenmultiple adversaries masquerading asthe same nodeidentity; and 3)localizing multiple adversaries.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
4 ISDNW04 Robust Tracking of Small-ScaleMobile Primary User inCognitive Radio Networks
In this paper, we propose a newframework, called Sequential MonteCarlo combined with shadow-fadingestimation (SOLID), for accurate,attack/fault-tolerant tracking of small-scale mobile primary users. The key ideaunderlying SOLID is to exploit thetemporal shadow fadingcorrelation in sensing results induced bythe primary user's mobility. Specifically,SOLID augments conventionalSequential Monte Carlo (SMC)-basedtarget tracking with shadow-fadingestimation.
2013
5 ISDNW05 Attacks and Defenses in the DataPlane of Networks
We demonstrate-to ourknowledge the first-practical attack that exploits avulnerability in packet processingsoftware to launch a devastatingdenial-of-service attack fromwithin the network infrastructure.This attack uses only asingle attack packet to consume the fulllink bandwidth of the router's outgoinglink.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
6. IDSNW06 A Decentralized PrivacyPreserving Reputation Protocolfor the Malicious AdversarialModel
In this paper,Wepresent a privacy preservingreputation protocol for the malicious adversarial model. The malicious users in this modelactively attempt to learn the privatefeedback values of honest users as wellas to disrupt the protocol.Our protocol does not require centralizedentities, trusted third parties, orspecialized platforms, such asanonymous networks and trustedhardware.
2013
IDSNW07 Privacy Vulnerability ofPublished Anonymous MobilityTraces
In this paper, we investigate how anadversary ,when equipped with a smallamount of the snapshot informationtermed as side information, can infer anextended view of the whereabouts of avictim node appearing in an anonymoustrace. Our results quantify the loss ofvictim nodes’ privacy as a function ofthe nodal mobility, the inferencestrategies of adversaries, and any noisethat may appear in the trace or the sideinformation.
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
Security Analysis of a SingleSign-On Mechanism forDistributed Computer Networks
In this paper, however, we demonstrativethat their scheme is actually insecure asit fail s to meet credential privacy andsoundness of authentication.Specifically,we present twoimpersonation attacks. The first attackallows a malicious service provider, whohas successfully communicated with alegal user twice, to recover the user’scredential and then to impersonate theuser to access resources and servicesoffered by other service providers.
Identity-Based SecureDistributed Data StorageSchemes
In this paper, we propose two identity-based secure distributed data storage(IBSDDS) schemes. Our schemes cancapture the following properties: (1) Thefile owner can decide the accesspermission independently without thehelp of the private key generator (PKG);(2) For one query, a receiver can onlyaccess one file, instead of all files of theowner; (3) Our schemes are secureagainst the collusion attacks, namelyeven if the receiver can compromise theproxy servers, he cannot obtain theowner’s secret key.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
Detecting Influential Spreaders inComplex, Dynamic Networks
A hybrid of node degree and k-shellindex is more effective at identifyinginfluential spreaders and has lesscomputational overhead than either ofthese traditional measures
2013
Dynamic Authentication withSensory Information for theAccess Control Systems.
In this work, we introduce a dynamicauthentication with sensory informationfor the access control systems. Bycombining sensory information obtainedfrom onboard sensors on the access cardsas well as the original encodedidentification information, we are able toeffectively tackle the problems such asaccess card loss, stolen and duplication.Our solution is backward-compatiblewith existing access
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY
SNO P.CODE TITLES DESCRIPTION YEAR
7 ISDNS01 EAACK—A Secure Intrusion-Detection System for MANETs
In this paper,Access card authentication is critical andessential for manymodern access control systems, whichhave been widely deployed in variousgovernments, commercial andresidential environments. Althoughadvanced biometric authenticationmethods such as fingerprint and irisidentification can further identifythe user who is requesting authorization,they incur high system costs andaccess privileges cannot be transferredamong trusted users.
2013
8 ISDNS02 Cooperative MessageAuthentication in VehicularCyber-Physical Systems
In this paper, we address the issue oflarge computation overhead caused bythe safety message authentication.Specially, a cooperative messageauthentication protocol (CMAP) isdeveloped to alleviate vehicles’computation burden. With CMAP, allthe vehicles share their verificationresults with each other in a cooperativeway, so that the number of safetymessages that each vehicle needs toverify reduces significantly
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
ISDNS03 SORT: A Self-ORganizing TrustModel for Peer-to-Peer Systems
This paper presents distributedalgorithms that enable a peer to reasonabout trustworthiness of other peersbased on past interactions andrecommendations. Peers create theirown trust network in their proximity byusing local information available and donot try to learn global trust information.
2013
ISDNS04 Predicting ArchitecturalVulnerability on MultithreadedProcessors under ResourceContention and Sharing
This paper proposes a scalable two-levelpredictive mechanism capable ofpredicting a program’s AVF on aSMT/CMP architecture from easilymeasured metrics.
ISDNS05 NICE: Network IntrusionDetection and CountermeasureSelection in Virtual NetworkSystems
Cloud security is one of most importantissues that has attracted a lot of researchand development effort in past fewyears. Particularly, attackers can explorevulnerabilities of a cloud system andcompromise virtual machines to deployfurther large-scale Distributed Denial-of-Service (DDoS).
9 ISDNS06 Modeling Propagation Dynamicsof Social Network Worms
Social network worms, such as emailworms and facebook worms, pose acritical security threat to the Internet.Modeling their propagation dynamics isessential to predict their potentialdamages and develop countermeasures.Although several analytical models havebeen proposed for modeling propagationdynamics of social network worms,there are two critical problems unsolved:temporal dynamics and spatialdependence.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
10 ISDNS07 On the Security of End-to-EndMeasurements Based on Packet-Pair Dispersions
In this paper, we explore the security ofmeasurements based on the packet-pairtechnique. We propose lightweightcountermeasures to detect attacks onbandwidth measurements; our techniquecan detect whether delays were insertedwithin t he transmission of a packet-pair(e.g., by bandwidth shapers). We furtherpropose a novel scheme for remote pathidentification using the distribution ofpacket-pair dispersions and we evaluateits accuracy, robustness, and potentialuse.
2013
11 ISDNS08 Authorization Control for aSemantic Data Repositorythrough an Inference PolicyEngine
In this paper, we design an authorizationsecurity model enforced on a semanticmodel’s entities (concepts) and alsopropagate on their individuals in theOWL database through an inferencepolicy engine. We provide TBox accesscontrol for the construction of a TBoxfamily and propagate this based on theconstruction of concept taxonomies.
2013
12 ISDNS09 A large-scale study of the timerequired to compromise acomputer system
The paper also analyzes whether time tocompromise increase for each successfulintrusion of a computer system. Theresults regarding this property suggestthat time to compromise decrease alongthe number of intrusions of a system.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
13 ISDNS10 Secure Encounter-based MobileSocial Networks: Requirements,Designs, andTradeoffs
In this paper, we explore the functionaland security requirements for these newsystems, such as availability, security,and privacy, and present several designoptions for building secure encounter-based social networks. To highlightthese challenges we examine onerecently proposed encounter-basedsocial network design and compare it toa set of idealized security andfunctionality requirements.
2013
14 ISDNS11 Secrecy Capacity EnhancementWith Distributed Precoding inMultirelay Wiretap Systems
In this paper, where an eavesdropper ispresent. Distributed pre coding throughmultiple relay nodes can be used toenhance the received signal power a tthe destination node and to mitigate thesignal leakage to the eavesdropper,simultaneously.
2013
15 ISDNS12 Strong Secrecy in BidirectionalBroadcast Channels WithConfidential Messages
To increase the spectral efficiency offuture wireless networks, it is importantto wisely integrate multiple services atthe physical layer. Here the efficientintegration of confidential services inthethree-node bidirectional relay channel isstudied. A relay node establishesa bidirectionalcommunication betweentwo other nodes using a decode-and-
forward protocol, which is also knownas two-way relaying
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
16 ISDNS13 Entrusting Private Computationand Data to Untrusted Networks
This paper focuses specifically onNP-complete problems anddemonstrates how sTile-basedsystems can solve important real-world problems, such as proteinfolding, image recognition, andresource allocation. We present thealgorithms involved in sTile andformally prove that sTile-basedsystems preserve privacy.
2013
17 ISDNS14 Discovery and Resolution ofAnomalies in Web AccessControl Policies
In this paper, we represent aninnovative policy anomaly analysisapproach for Web access controlpolicies, focusing on XACMLpolicy.We introduce a policybasedsegmentation technique to accuratelyidentify policy anomalies and derive
effective anomaly resolutions, alongwith an intuitive visualizationrepresentation of analysis results.
2013
18 ISDNS15 Extending Attack Graph-BasedSecurity Metrics andAggregating Their Application
The attack graph is an abstraction thatreveals the ways an attacker canleverage vulnerabilities in a networkto violate a security policy. Whenused with attack graph-based securitymetrics, the attack graph may be usedto quantitatively assess securityrelevant aspects of a network.
2012
19 ISDNS16 Dynamic Authentication withSensory Information for theAccess Control Systems
Access card authentication is critical andessential for manymodern access control systems, whichhave been widely deployed in variousgovernment, commercial and residentialenvironments.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem Page27
20 ISDNW17 AMPLE: An AdaptiveTraffic EngineeringSystem Based on VirtualRouting Topologies
In this article, we introduce AMPLE -an efficient traffic engineering andmanagement system that performsadaptive traffic control by usingmultiple virtualized routing topologies
2012
21 ISDNW18 MeasuRouting: AFramework for RoutingAssisted Traffic Monitoring
In this paper we present a theoreticalframework for MeasuRouting.Furthermore, as proofs-of-concept, wepresent synthetic and practicalmonitoring applications to showcasethe utility enhancement achieved withMeasuRouting.
2012
TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON DATAMINING
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR
22 ISDDM01 Transductive MultilabelLearning via Label SetPropagation
In this paper, we study the problemof transductive multilabel learningandpropose a novel solution, calledTrasductive Multilabel Classification(TraM), to effectively assign a set ofmultiple labels to each instance.Different from supervised multilabellearningmethods, we estimatethe label sets of the unlabeled instanceseffectively by utilizing the informationfrom both labeled and unlabeled data.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
23 ISDDM02 Maximum LikelihoodEstimation from Uncertain Datain the Belief FunctionFramework
The proposed method is based on themaximization of ageneralized likelihood criterion, whichcan be interpreted as a degree ofagreement between the statistical modeland the uncertain observations.
2013
24 ISDDM03 Mining User Queries withMarkov Chains: Application toOnline Image Retrieval
We propose a novel method forautomatic annotation, indexing andannotation-based retrievalof images.The new method, that we callMarkovian Semantic Indexing (MSI),is presented in the context ofan online image retrieval system.Geometric interpretations of theproposed distance are provided and itsrelation to a clustering in the keywordspace is investigated.
2013
25 ISDDM04 A Rough-Set-Based IncrementalApproach for UpdatingApproximations under DynamicMaintenance Environments
This paper focuses on a newincremental method for updatingapproximations of VPRS while objects
in the information system dynamicallyalter. It discusses properties ofinformation granulationand approximations under the dynamicenvironment while objects in theuniverse evolve over time.
2013
26 ISDDM05 Radio Database Compressionfor Accurate Energy-EfficientLocalizationin Fingerprinting Systems
The aim of the proposed technique is toreduce the computation cost andtransmission load in the mobile-basedimplementations. The presented methodmay be called Block-based WeightedClustering (BWC) technique, which isapplied in a concatenated location-radio signal space, and attributesdifferent weight factors to the locationand radio components.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
27 ISDDM06 Fuzzy Web Data TablesIntegration Guided by anOntological and TerminologicalResource
In this paper, we present the design ofONDINE system which allows theloading and the querying of a datawarehouse opened on the Web,guided by an Ontological andTerminological Resource (OTR).The data warehouse, composedof data tables extracted fromWeb documents, has been built tosupplement existing local data sources
2013
28 ISDDM07 A New Algorithm for InferringUser Search Goals withFeedback Sessions
we propose a framework to discoverdifferent user search goals for a queryby clustering theproposed feedback sessions. Feedback sessions are constructed from user click-through logs and can efficiently reflectthe information needs of users.
2013
29 ISDDM08 Information-Theoretic OutlierDetection for Large-ScaleCategorical Data
In this paper, we propose a formaldefinition of outliers and an optimizationmodel of outlier detection, via a newconcept of holoentropy that takes bothentropy and total correlation intoconsideration. We propose two practical1-parameter outlier detection methods,named ITB-SS and ITB-SP, whichrequire no user-definedparameters for deciding whether anobject is an outlier.
2013
30 ISDDM09 Efficient Service SkylineComputation for CompositeService Selection
Service composition is emerging as aneffective vehicle for integrating existingweb services to create value-added andpersonalized composite services. Wepropose to exploit the dominancerelationship among service providers tofind a set of “best”possible composite services, referred toas a composite service skyline.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
31 ISDDM10 Secure ProvenanceTransmission for StreamingData
In this paper, we propose a novelapproach to securely transmitprovenance for streaming data byembedding provenance into theinterpacket timing domain whileaddressing the above mentioned issues.As provenance is hidden in another host-medium, our solution can beconceptualized as watermarkingtechnique.
2013
32 ISDDM11 Generative Models for ItemAdoptions Using SocialCorrelation
We propose a social correlationframework that considers a socialcorrelation matrix representing thedegrees of correlation from every userto the users friends, in addition to a setof latent factors representing topics ofinterests of individual users. Based onthe framework, we develop twogenerative models, namely sequentialand unified, and the correspondingparameter estimation approaches.
2013
33
45
ISDDM12 Scalable Evaluation ofTrajectory Queries overImprecise Location Data
In this paper, we study how to efficientlyevaluate trajectory queries overimprecise objects, by proposing a novelconcept, u-bisector, which is anextension of bisector specified forimprecise data..
2013
34 ISDDM13 Optimizing Bloom FilterSettings inPeer-to-Peer Multi keywordSearching
In this paper, we address the problemof optimizing the settings of a BloomFilter (BF). We show that the optimalsetting of BF in terms of traffic costis determined by the statisticalinformation of the involved invertedlists.
2012
TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR
35 ISDCC01 Scalable and Secure Sharing ofPersonal Health Records inCloud Computing UsingAttribute-Based Encryption
In this paper, we propose a novelpatient-centric framework and a suite ofmechanisms for data access control toPHRs stored in semitrusted servers. Toachieve fine-grained and scalable dataaccess control for PHRs, we leverageattribute-based encryption (ABE)techniques to encrypt each patient’sPHR file.
2013
36 ISDCC02 A Hierarchical Approach for theResource Management of VeryLarge Cloud Platforms
The goal of this paper is to deviseresource allocation policies forvirtualized cloud environments thatsatisfy performance and availabilityguarantees and minimize energy costs invery large cloud service centers. Wepresent a scalable distributedhierarchical framework based on amixed-integer non-linear optimization ofresource management acting at multipletime-scales.
2013
37 ISDCC03 Toward Secure MultikeywordTop-kk Retrieval overEncrypted Cloud Data
In this paper, we focus on addressingdata privacy issues using SSE. For thefirst time, we formulate the privacy issuefrom the aspect of similarity relevanceand scheme robustness. We observe thatserver-side ranking based on order-preserving encryption (OPE) inevitablyleaks data privacy.
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
38 ISDCC04 On the Performance ofByzantine Fault-TolerantMapReduce
MapReduce is often used for criticaldata processing, e.g.,in the context of scientific or financialsimulation. However, there is evidencein the literature that there are arbitrary(or Byzantine) faults that maycorrupt the results of MapReduce without being detected.
39 ISDCC05 BtrPlace: A FlexibleConsolidation Manager forHighly Available Applications
The massive amount of resources foundin datacenters makes it possible toprovide high availability to multi-tierapplications. Virtualizing theseapplications makes it possible toconsolidate them on servers, reducingruntime costs. We present BtrPlace, aflexible consolidation manager that iscustomized through configuration scriptswritten by the application and datacenteradministrators.
2013
ISDCC06 Optimal MultiserverConfiguration for ProfitMaximization in CloudComputing
In this paper, we study the problem ofoptimal multiserver configuration forprofit maximization in a cloudcomputing environment. To maximizethe profit, a service provider shouldunderstand both service charges andbusiness costs, and how they aredetermined by the characteristics of theapplications and the configuration of amultiserver system
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
40 ISDCC07 Performance Analysis of CloudComputing CentersUsing M/G/m/m+r Queuing
Systems
In this paper, we requests, we describe anovel approximate analytical model forperformance evaluation of cloud serverfarms and solve it to obtain accurateestimation of the complete probabilitydistribution of the request response timeand other important performanceindicators.
2012
TECHNOLOGY: DOTNETDOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING
SNO P.CODE TITLES DESCRIPTION YEAR
61 ISDIM01 Colorization-BasedCompression UsingOptimization
In this paper, we formulate thecolorization-based coding problem intoan optimization problem, i.e., an Lminimization problem. In colorization-based coding, the encoder chooses a fewrepresentative pixels (RP) for which thechrominance values and the positionsare sent to the decoder, whereas in thedecoder, the chrominance values for allthe pixels are reconstructed bycolorization methods.
2013
62 ISDIM02 Image Denoising WithDominant Sets by a CoalitionalGame Approach
Dominant sets are a new graph partitionmethod for pairwise data clusteringproposed by Pavan and Pelillo. Weaddress the problem of dominant setswith a coalitional game model, in whicheach data point is treated as a player andsimilar data points are encouraged togroup together for cooperation.
2013
ISDIM03 Hierarchical super-resolution-based inpainting
This paper introduces a novelframework for examplar-basedinpainting. It consists in performing first
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
the inpainting on a coarse version of theinput image. A hierarchical super-resolution algorithm is then used torecover details on the missing areas.
ISDIM04 Personal Photo Enhancementusing Internet Photo Collections
In this paper, we propose a frameworkto overcome the imperfections ofpersonal photos of tourist sites using therich information provided by large scaleInternet photo collections. Our methoddeploys state-of-the-art techniques forconstructing initial 3D models fromphoto collections. The same techniquesare then used to register personal photosto these models, allowing us to augmentpersonal 2D images with 3Dinformation.
2013
TECHNOLOGY: DOTNETDOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
61 ISDGC01 Evolving Smart GridInformation ManagementCloudward: A CloudOptimization Perspective
In this paper, we study an optimizationproblem of leveraging the cloud domainto reduce the cost of informationmanagement in the SG. We propose acloud-based SG informationmanagement model and present a cloudand network resource optimizationframework to solve the cost reductionproblem in cloud-based SG informationstorage and computation.
2013
62 ISDGC02 Swarm Fuzzy Systems:Knowledge Acquisition inFuzzy Systems and its
This work proposes the use of bio-inspired knowledge acquisition forFuzzy Systems founded on Swarm
2013
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
Applications in Grid Computing Intelligence Particle SwarmOptimization (SI-PSO). Swarm-basedmodels consider knowledge entities asparticles that move in the space to reachthe higher quality..
TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
SNO P.CODE PROJECT TITLES DESCRIPTION YEAR
78 ISDSE01
Self-Organizing Roles on AgileSoftware Development Teams
79 ISDSE02The Human Element in SocialNetworking
80 ISDSE03Generating Test Cases forReal-Time Systems Basedon Symbolic Models
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
81 ISDSE04Beyond Data Mining
82 ISDSE05A Theoretical and EmpiricalAnalysis of the Role of TestSequence Length in SoftwareTesting for Structural Coverage
In this paper, we analyze the role thatthe length plays in software testing, inparticular branch coverage. We showthat, on “difficult” software testingBench marks, longer test sequencesmake their testing trivial. Hence, weargue that the choice of the length of thetest sequences is very important insoftware testing.
2012
83 ISDSE06 Automatic Detection ofUnsafe DynamicComponent Loadings
In this paper, we present the firstautomated technique to detect vulnerableand unsafe dynamic componentloadings. Our analysis has two phases:1) apply dynamic binary instrumentationto collect runtime information oncomponent loading and2) analyze the collected information todetect vulnerable component loadings
2012
TECHNOLOGY : DOTNETDOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA
SNO P.CODE PROJECT TITLES DESCRIPTION YEAR
78 ISDMM01
Group Delay based Methods forSpeaker Segregation and itsApplication in Multi-mediInformation Retrieval
A novel method of single channel speakersegregation using the group delay crosscorrelation function is proposed in thispaper. The group delay function, which isthe negative derivative of the phasespectrum yields robust spectral estimates.
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
79 ISDMM02
Query-Adaptive Image SearchWith Hash Codes
This paper introduces an approach thatenables query-adaptive ranking of thereturned images with equal Hammingdistances to the queries. This is achievedby firstly offline learning bitwise weightsof the hash codes for a diverse set ofpredefined semantic concept classes.
80 ISDMM03
Robust Spatial ConsistencyGraph Model for PartialDuplicate Image Retrieval
Partial duplicate images often have largenon-duplicate regions and small duplicateregions with random rotation, which leadto the following problems: 1) large numberof noisy features from the nonduplicateregions; 2) small number of representativefeatures from the duplicate regions; 3)randomly rotated or deformed duplicateregions.
DOTNET APPLICATION PROJECTS
TECHNOLOGY : DOTNETDOMAIN : NON IEEE BASED PROJECTS
SNO P.CODE PROJECT TITLE
1 ISNID01 Security Evaluation For Graphical Password
2 ISNID02 Multi Level Authentication Method For Banking Applications
3 ISNID03 Spoken Vibration To Access Personal Computer
4 ISNID04Effective Software Merging In The Presence Of Object-OrientedRefactoring
5 ISNID05 Electronic Money Market Management System
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
6 ISNID06 Website Positioning System.
7 ISNID07 Online Financial Protection Management System
8 ISNID08The Effect Of Virtual Community Culture And Group Cohesion OnKnowledge Sharing
9 ISNID09 Knowledge-Based Integrated Financial Forecasting System
10 ISNID10 Multi Track Trading Sytem.
11 ISNID11Grid Accounting Services Architecture (Gasa) For Distributed SystemsSharing And Integration
12 ISNID12Reducing Transfer Time In Wireless Networks By SimultaneousMultiple Packet Transmission
13 ISNID13 Detecting Lost Items In Shopping Carts
14 ISNID14 Systematized Collection Of Student Using Internet And Intranet
15 ISNID15Load Balancing In Parallel Computers
16 ISNID16Supervised Neighborhood Topology Learning For Human ActionRecognition
17 ISNID17 Enhancing Download Performance In An Intranet
18 ISNID18Synthesis Of Few-Layer Gase Nanosheets For High Performance Photodetectors.
19 ISNID19 The Color Blindness Removal Technique In Image
20 ISNID20 The Color Blindness Removal Technique In Image
21 ISNID21 Enhanced Security Control System In The Online Exam
22 ISNID22 Webpage Understanding Beyond Page Level Search
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
23 ISNID23A Novel Framework For Semantic Annotation And PersonalizedRetrieval Of Sports Video
24 ISNID24Anticipating Digitized Pictures From Cracks Based On EdgeDetection Method
25 ISNID25 Enhanced Hierarchical Multi Pattern Matching Algorithm
26 ISNID26 Characterizing Files In The Modern Gnutella Network
27 ISNID27 Semantics-Based Access Control Approach For Web Service
28 ISNID28 Web Services Such As E-Commerce Applications
29 ISNID29Detecting Traffic Anomalies Through Aggregate Analysis Of PacketHeader Data
30 ISNID30 Managing Central Monitoring In Distributed Systems
31 ISNID31 Semantic Web Technologies For E-Learning
32 ISNID32 Bridging Information Gap
33 ISNID33Downlink Performance Of Wireless Networks Using MPT [MultiplePacket Transmission]
34 ISNID34 Mobility Reduces Uncertainty In Manets
35 ISNID35 Post-Mining Of Association Rules Using Ontologies
36 ISNID36 Authentication Protocol For Wireless Sensor Networks
37 ISNID37Keyword Ranking Analysis For Orthogonal Data Embedding ForBinary Images In Morphological Transform Domain A High CapacityApproach
38 ISNID38 Identification And Removal Of Cracks In Digital Images
39 ISNID39 Proactive Data Quality Management For Data Warehouse Systems .
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
NS2TECHNOLOGY : NS2DOMAIN : IEEE BASED PROJECTS
40 ISNID40 Path-History-Based Access Control For Mobile Agents41 ISNID41 Distributed Collaborative Distributed Editing System
42 ISNID42 Web Ranking Software43 ISNID43
Evaluating The Scalability Of P2P Based Video On Demand ServiceUsing Real Traces
44 ISNID44 Efficient Learning-Based Image Enhancement45 ISNID45 Virtual Observers In A Mobile Surveillance System46 ISNID46 Image Watermarking Systems
47 ISNID47 Content-Based Routing In Mobile Ad Hoc Networks
48 ISNID48 Human Resources Software Systems
49 ISNID49 A Path Identification Mechanism To Defend Against DDos Attacks
50 ISNID50The Effect Of Pairs In Program Design Tasks
01 ISNS01 Cluster –Based Certificate Revocation Woith Vindication Capability For MobileAd- Hoc Networks
02 ISNS02 Eaack- A Secure Intrusion –Detecion System For Manets
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
SNO P.CODE TITLES
16 Vampire Attacks:Draining Life From Wireless Ad Hoc Sensor Networks
17 Classification And Experimental Analysis For Clone Detection Approaches InWireless Sensor Networks
03 ISNS03 Genetic Algorithm For Energy Efficient Qos Multicast Routing
04 ISNS04 Evolving Network Model With Local –Area Preference For Mobile Ad-HocNetwork
05 ISNS05 Light Weight Sybil Attack Detection In Manets
06 ISNS06 Self –Organising Seamless Multimedia Streaming In Dense Manets
07 ISNS07 A Neighbor Coverage – Based Probabilistic Rebroadcast For Reducing RoutingOverhead In Mobile Ad –Hoc Networks
08 ISNS08 Routing Protocol Based On Grover’s Searching Algorithm For Mobile Ad- HocNetworks
09 ISNS09 New Approach For Mobile Ad- Hoc Networks Unity Issue In AsuspiciousEnvironment
09 ISNS09 New Approach For Mobile Ad- Hoc Networks Unity Issue In AsuspiciousEnvironment
10 ISNS10 New Power –Aware Multicast Algorithm For Mobile Ad –Hoc Networks
11 ISNS11 Enhanced Olsr For Defense Against Dos Attack In Ad Hoc Networks
12 ISNS12 An Adaptive Hello Messaging Scheme For Neighbor Discovery In On-DemandManet Routing Protocols
13 ISNS13 Hybrid Flooding Scheme For Mobile Ad Hoc Networks –March 2013eight SybilAttack Detection In Manets
14 ISNS14 Self –Organising Seamless Multimedia Streaming In Dense Manets
15 ISNS15 A Neighbor Coverage – Based Probabilistic Rebroadcast For Reducing RoutingOverhead In Mobile Ad –Hoc Networks
Iris Solutions
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660Mail: [email protected] website: www.irisprojects.com,
Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai,Nellai, Erode, Salem
18 Channel Aware Encryption And Decision Fusion For Wireless Sensor Networks
19 Energy Efficient Transmission Scheme For Mobile Data Gathering In WirelessSensor Networks
20 .Path Planning Algorithm For Mobile Anchor –Based Localization In WirelessSensor Net Works
21 Decentralised Hypothesis Testing In Wireless Sensor Networks In The Presence OfMisbehaving Nodes
22 Tour Planning For Mobile Data- Gathering Mechanisms In Wireless SensorNetworks
23 Joint Contention And Sleep Control For Lifetime Maximization In Wireless SensorNetworks
24 Exploiting Ubiquitious Data Collection For Mobile Users In Wireless SensorNetworks
25 Clustering Algorithm For Non - Uniformly Distributed Nodes Inwireless SensorNetworks
26 Energy –Efficient Routing Protocols In Wireless Sensor Networks :A Survey
27 Load Balanced Clustering Algorithm With Distributed Self – OrganisationforWireless Sensor Networks
28 Ldts:A Light Weight And Dependable Trust System For Clustered Wireless SensorNetworks
SNO P.CODE TITLES
29 Emap:Expedite Message Authentication Protocol For Vehicular Ad Hoc Networks
30 Evaluation Of The Use Of Guard Nodes For Securing The Routing In Vanet
31 Team:Trust Extended Authentication Mechanismfor Vehicular Ad Hoc Networks
32 Discovery And Verification Of Neighbor Positions In Mobile Ad Hoc Networks
33 Investigating A Junction –Based Multipath Source Routing Algorithm For Vanet