World Class Projects From SRM Infotech
Having these titles on your resume can attract recruiters like magnets!
2012 IEEE Projects JAVA & .NET TITLES
|
Domain
|
Platform
|
|||
1
|
PSF Estimation via Gradient Domain Correlation
|
Image Processing
|
DOTNET
|
2011 IEEE JAVA & .NET TITLES
|
DOMAIN
|
|
1
|
A
Web Search Engine-Based Approach to Measure Semantic Similarity between Words
|
DOTNET
|
2
|
Adaptive
Provisioning of Human Expertise in Service-oriented Systems
|
DOTNET
|
3
|
Bridging
Socially-Enhanced Virtual Communities
|
DOTNET
|
4
|
Combining
HAAR Feature and Skin Color Based Classifiers for Face
|
DOTNET
|
5
|
Data
integrity proofs in cloud storage
|
DOTNET
|
6
|
Delay
Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless
Networks
|
DOTNET
|
7
|
Efficient
Computation of Range Aggregates against uncertain location based queries
|
DOTNET
|
8
|
Efficient
Multi-dimensional Fuzzy Search for Personal Information Management Systems
|
DOTNET
|
9
|
Exploiting
Dynamic Resource Allocation for Efficient Parallel Data Processing in the
Cloud
|
DOTNET
|
10
|
Exploring
Application-Level Semantics for Data Compression
|
DOTNET
|
11
|
Improving
Aggregate Recommendation Diversity Using Ranking-Based Techniques
|
DOTNET
|
12
|
Monitoring
Service Systems from a Language-Action Perspective
|
DOTNET
|
13
|
One
Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web
Databases
|
DOTNET
|
14
|
Optimal
service pricing for a cloud cache
|
DOTNET
|
15
|
Personalized
Ontology Model for Web Information Gathering
|
DOTNET
|
16
|
Publishing
Search Logs – A Comparative Study of Privacy Guarantees
|
DOTNET
|
17
|
Scalable
Learning of Collective Behavior
|
DOTNET
|
18
|
The
Awareness Network, To Whom Should I Display My Actions And, Whose Actions
|
DOTNET
|
19
|
The
World in a Nutshell Concise Range Queries
|
DOTNET
|
20
|
Distributed
Adaptation of Quantized Feedback for Downlink Network MIMO Systems
|
DOTNET
|
21
|
Adaptive Fault Tolerant QoS Control Algorithms for
Maximizing System Lifetime of Query-Based Wireless Sensor Networks
|
DOTNET
|
22
|
The Geometric Efficient Matching Algorithm
for Firewalls
|
DOTNET
|
23
|
Jamming-Aware Traffic Allocation for
Multiple-Path Routing Using Portfolio Selection
|
DOTNET
|
24
|
Integration of Sound Signature in Graphical
Password Authentication System
|
DOTNET
|
25
|
Jamming-Aware Traffic Allocation for
Multiple-Path Routing Using Portfolio Selection
|
DOTNET
|
26
|
Continuous Neighbor Discovery in Asynchronous Sensor
Networks
|
DOTNET
|
27
|
Unified
Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
|
DOTNET
|
28
|
1D
- Transforms for the Motion Compensation Residual
|
DOTNET
|
29
|
A Competitive Study of Cryptography
Techniques over Block Cipher
|
JAVA
|
30
|
A
Foundation for Stochastic Bandwidth Estimation of Networks with Random
Service
|
JAVA
|
31
|
Anti-Forensics
of Digital Image Compression
|
JAVA
|
32
|
A
Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
|
JAVA
|
33
|
A
Link-Analysis Extension Of Correspondence Analysis For Mining Relational
Databases
|
JAVA
|
34
|
A
Machine Learning Approach for Identifying Disease-Treatment Relations in
Short Texts
|
JAVA
|
35
|
A
New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX
Systems
|
JAVA
|
36
|
Analysis
on Credit Card Fraud Detection Methods
|
JAVA
|
37
|
Caching
Strategies Based on Information Density Estimation in Wireless Ad Hoc
Networks
|
JAVA
|
38
|
Clustering
with Multi-Viewpoint based Similarity Measure
|
JAVA
|
39
|
Dynamic
Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
|
JAVA
|
40
|
Dynamics
of Malware Spread in Decentralized Peer-to-Peer Networks
|
JAVA
|
41
|
Effective
Navigation of Query Results Based on Concept Hierarchies
|
JAVA
|
42
|
Embedded
Extended Visual Cryptography Schemes
|
JAVA
|
43
|
Fast
Simulation of services availability in mesh network with dynamic path
restoration
|
JAVA
|
44
|
Going
Back and Forth Efficient Multideployment and Multisnapshotting on Clouds
|
JAVA
|
45
|
Improving
the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
|
JAVA
|
46
|
A
Novel 3-D Color Histogram Equalization Method with Uniform 1-D Gray Scale
Histogram
|
JAVA
|
47
|
Intrusion
detection An Energy efficient approach in Heterogeneous WSN
|
JAVA
|
48
|
Live
Streaming With Receiver-Based Peer-Division Multiplexing
|
JAVA
|
49
|
MANET
Routing Protocols vs Mobility Models A Performance Evaluation
|
JAVA
|
50
|
Modeling
and Detection of Camouflaging Worm
|
JAVA
|
51
|
Nymble
Blocking Misbehaving Users in Anonymizing Networks
|
JAVA
|
52
|
Online
Intrusion Alert Aggregation with Generative Data Stream Modeling
|
JAVA
|
53
|
Optimal
Bandwidth Assignment for Multiple Description Coded Video
|
JAVA
|
54
|
Optimal
Stochastic Location Updates in Mobile Ad Hoc Networks
|
JAVA
|
55
|
Scalable
and Cost-Effective Interconnection of Data-Center Servers Using Dual Server
Ports
|
JAVA
|
56
|
Sketch4Match
– Content-based Image Retrieval System Using Sketches
|
JAVA
|
57
|
A
Dual Framework and Algorithms for Targeted Online Data Delivery
|
JAVA
|
58
|
Robust Video Data Hiding Using Forbidden
Zone Data Hiding and Selective Embedding
|
JAVA
|
59
|
Decision
Trees for Uncertain Data
|
JAVA
|
60
|
Discovering Conditional Functional
Dependencies
|
JAVA
|
61
|
Extended XML Tree Pattern Matching Theories
and Algorithms
|
JAVA
|
62
|
More Secure
Steganography Method in Spatial Domain
|
JAVA
|
63
|
Ranking Spatial Data by Quality Preferences
|
JAVA
|
64
|
SAT A Security Architecture Achieving
Anonymity and Traceability in Wireless Mesh Networks
|
JAVA
|
65
|
Secure High-Throughput Multicast Routing in
Wireless Mesh Networks
|
JAVA
|
66
|
A User Oriented Image Retrieval System
Based on Interactive Genetic Algorithm
|
JAVA
|
**********THE
END**********
|
||
2011 IEEE JIST (Java) TITLES
|
DOMAIN
|
|
1
|
Secure High
Through Put In Multicast Routing In Wireless
Mesh Network
|
JiST
|
2
|
An Adaptive Network Coded
Retransmission Scheme For Single Hop
Wireless Multicast Broadcast
Services
|
JiST
|
3
|
Energy Efficient Multicast Protocol
For Cooperative Network
|
JiST
|
4
|
Efficient Data Collection In
Wireless Sensor Networks
With Path Constrained Mobile
Sink
|
JiST
|
5
|
Stochastic Model And Connectivity Dynamics For
VANETs In Signalized Road Systems
|
JiST
|
6
|
A Policy Based Trust Aware Adaptive Monitoring
Scheme To Enhance WiMAX Qos
|
JiST
|
7
|
Towards On Effective Risk
Conscious Collaborative Vehicular Collision Avoidance
System
|
JiST
|
8
|
Time And
Location Critical Emergency Messages
Dissemination For Vehicular Ad
-Hoc Networks
|
JiST
|
9
|
Improving Cooperative Positioning For
Vehicular Networks
|
JiST
|
10
|
Fast
Detection Of Mobile Replica Node Attacks In
Wireless Sensor Networks Using Sequential Hypothesis
Testing
|
JiST
|
2011 IEEE CLOUDSIM (Java) TITLES
DOMAIN
|
||
1
|
Enabling Public Auditability And
Data Dynamics For Storage Security In Cloud Computing
|
CLOUDSIM
|
2
|
Achieving Efficient Agreement
Within A Dual Failure Cloud Computing Environment
|
CLOUDSIM
|
3
|
Towards A Load
Balancing Ina Three Level Cloud Computing
|
CLOUDSIM
|
4
|
Secure Outsourcing Data With Linear
Programming In The Cloud
|
CLOUDSIM
|
5
|
Scheduling Work Flow Service Cost
Optimization In Hybrid Cloud
|
CLOUDSIM
|
6
|
Online Scheduling For Real Time
System In Cloud Computing
|
CLOUDSIM
|
7
|
Fuzzy Key Ward Search Over Encrypted
Data In Cloud Computing
|
CLOUDSIM
|
8
|
Secure And Practical Outstanding Of
Linear Programming In Cloud Computing
|
CLOUDSIM
|
9
|
Resource Management in
Data-Intensive Clouds: Opportunities and Challenges
|
CLOUDSIM
|
10
|
The CoQUOS Approach to Continuous
Queries in Unstructured Overlays
|
CLOUDSIM
|
2011 IEEE NS2 TITLES
|
DOMAIN
|
|
1
|
Forward
Correction and Fountain Codes in Delay Tolerant Networks
|
NS2
|
2
|
Continuous
Neighbor Discovery in Asynchronous Sensor Networks
|
NS2
|
3
|
Throughput
Optimization in High Speed Downlink Packet Access
|
NS2
|
4
|
Improving
the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
|
NS2
|
5
|
Distributed Adaptation of Quantized Feedback
for Downlink Network MIMO Systems
|
NS2
|
6
|
Secure High-Throughput Multicast Routing in
Wireless Mesh Networks
|
NS2
|
7
|
Throughput Optimization in Mobile Backbone
Networks
|
NS2
|
8
|
Energy-Efficient
Multicasting of Scalable Video Streams Over WiMAX Networks
|
NS2
|
9
|
MANET
Routing Protocols vs Mobility Models: A Performance Evaluation
|
NS2
|
10
|
CACO-Distributed
Client-Assisted Channel Assignment Optimization for Uncoordinated WLANs
|
NS2
|
11
|
Live Streaming With Receiver-Based
Peer-Division Multiplexing
|
NS2
|
2011 IEEE MATLAB TITLES
PRICE
|
DOMAIN
|
|
1
|
A Hybrid Approach to Detect and Localize
Texts in Natural Scene Images
|
MATLAB
|
2
|
A New Supervised Method for Blood Vessel
Segmentation in Retinal Images
|
MATLAB
|
3
|
An
Improved Image Compression Algorithm Using Binary Space Partition Scheme and
Geometric Wavelets
|
MATLAB
|
4
|
An
Interpolated Phase Adjustment by Contrast Enhancement Algorithm for SAR
|
MATLAB
|
5
|
Automatic
Discovery of Personal Name Aliases from the Web
|
MATLAB
|
6
|
Boosting
Color Feature Selection for Color Face Recognition
|
MATLAB
|
7
|
Computerized
Classification of Intraductal Breast
Lesions Using Histopathological Images
|
MATLAB
|
8
|
Contactless
and Pose Invariant Biometric Identification Using Hand Surface
|
MATLAB
|
9
|
Design
of an Error-Tolerance Scheme for Discrete Wavelet Transform in JPEG 2000
Encoder
|
MATLAB
|
10
|
Evaluation
of DSP based Numerical Relay for Overcurrent Protection
|
MATLAB
|
11
|
HAIRIS
A Method for Automatic Image Registration Through Histogram-Based Image
Segmentation
|
MATLAB
|
12
|
On
the Effects of Filterbank Design and Energy Computation on Robust Speech
Recognition
|
MATLAB
|
13
|
Performance
Analysis of Burst Transmission Mechanism for IEEE 802.11-Based Multi-Hop
Wireless LANs
|
MATLAB
|
14
|
Text
Clustering with Seeds Affinity Propagation
|
MATLAB
|
15
|
X-ray
Categorization and Retrieval on the Organ and Pathology Level, Using
Patch-Based Visual Words
|
MATLAB
|
16
|
Automated
Detection of White Matter Changes in Elderly People Using Fuzzy,
Geostatistical, and Information Combining Models
|
MATLAB
|
17
|
Tissue-Specific
Compartmental Analysis for Dynamic Contrast-enhanced MR Imaging of Complex
Tumors
|
MATLAB
|
18
|
A Robust And Fast Video Copy
Detection System Using Content Based Finger Printing
|
MATLAB
|
19
|
Local
Frequency Descriptor for Low-Resolution Face Recognition
|
MATLAB
|
20
|
Text Segmentation for MRC Document
Compression
|
MATLAB
|
21
|
Multifeature-Based
High-Resolution Palmprint Recognition
|
MATLAB
|
22
|
Adaptive Coded MIMO Systems with Near Full
Multiplexing Gain Using Outdated CSI
|
MATLAB
|
2011 IEEE ANDROID TITLES
PRICE
|
DOMAIN
|
|
1
|
A
Machine Learning Approach for Identifying Disease-Treatment Relations in
Short Texts
|
ANDROID
|
2
|
A
Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
|
ANDROID
|
3
|
A
Query Formulation Language for the data web
|
ANDROID
|
4
|
Cloud
Computing for Agent-Based Urban Transportation Systems
|
ANDROID
|
5
|
Dynamic
Audit Services for Integrity Verification of Outsourced Storages in Clouds
|
ANDROID
|
6
|
A
Link-Analysis Extension Of Correspondence Analysis For Mining Relational
Databases
|
ANDROID
|
7
|
Efficient
Multi-dimensional Fuzzy Search for Personal Information Management Systems
|
ANDROID
|
8
|
Extended
XML Tree Pattern Matching Theories and Algorithms
|
ANDROID
|
9
|
Going
Back and Forth Efficient Multideployment and Multisnapshotting on Clouds
|
ANDROID
|
10
|
Jamming-Aware
Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
|
ANDROID
|
11
|
Learning
Semi-Riemannian Metrics for Semisupervised Feature Extraction
|
ANDROID
|
12
|
Live
Streaming With Receiver-Based Peer-Division Multiplexing
|
ANDROID
|
13
|
Locating
Equivalent Servants over P2P Networks
|
ANDROID
|
14
|
Monitoring
Service Systems from a Language-Action Perspective
|
ANDROID
|
15
|
Optimal
Stochastic Location Updates in Mobile Ad Hoc Networks
|
ANDROID
|
16
|
Privacy-Preserving
Multi-keyword Ranked Search over Encrypted Cloud Data
|
ANDROID
|
17
|
Ranking
Spatial Data by Quality Preferences
|
ANDROID
|
18
|
Secure
and Practical Outsourcing of Linear Programming in Cloud Computing
|
ANDROID
|
19
|
Service-Centric
Framework for a Digital Government Application
|
ANDROID
|
20
|
Supporting
Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
|
ANDROID
|
21
|
The
Geometric Efficient Matching Algorithm for Firewalls
|
ANDROID
|
22
|
Effective
Navigation of Query Results Based on Concept Hierarchies
|
ANDROID
|
23
|
Modeling and Detection of Camouflaging Worm
|
ANDROID
|
24
|
Nymble
Blocking Misbehaving Users in Anonymizing Networks
|
ANDROID
|