Full Source Code, Abstract, IEEE Basepaper,review ppt slides,video,complete documentation
|
|||
S.NO.
|
2010
IEEE PROJECT TITLES
|
YEAR
|
DOMAIN
|
1
|
DOTNET- Maximizing Rewards in Wireless Networks with Energy
|
2010
|
WIRELESS NETWORKING
|
2
|
DOTNET- Slow Adaptive OFDMA Systems Through Chance
Constrained Programming
|
2010
|
WIRELESS NETWORKING
|
3
|
DOTNET- Toward Optimal Network Fault Correction in
Externally Managed Overlay Networks
|
2010
|
WIRELESS NETWORKING
|
4
|
DOTNET- Anonymous Query Processing in Road Networks
|
2010
|
DATA MINING
|
5
|
DOTNET- Multicast Multi-path Power Efficient Routing in
Mobile ADHOC Networks
|
2010
|
MOBIE COMPUTING
|
6
|
DOTNET- VEBEK Virtual Energy-Based Encryption and Keying for
Wireless Sensor Networks
|
2010
|
NETWORK SECURITY
|
7
|
DOTNET- Minimizing Delay and Maximizing Lifetime for
Wireless Sensor Networks With Anycast
|
2010
|
WIRELESS NETWORKING
|
8
|
DOTNET- Secure Client-Side ST-DM
Watermark Embedding
|
2010
|
NETWORK SECURITY
|
9
|
DOTNET- On Wireless Scheduling Algorithms for Minimizing the
Queue-Overflow Probability
|
2010
|
WIRELESS NETWORKING
|
10
|
DOTNET- Cross-Layer Design in Multihop Wireless Networks
|
2010
|
WIRELESS NETWORKING
|
11
|
DOTNET- Privacy-Preserving Public Auditing for Data
StorageSecurity in Cloud Computing
|
2010
|
CLOUD COMPUTING
|
12
|
DOTNET- S4 Small State and Small Stretch Compact Routing
Protocol for Large Static Wireless Networks
|
2010
|
MOBIE COMPUTING
|
13
|
DOTNET- Secure Distance-Based Localization in the Presence
of Cheating Beacon Nodes
|
2010
|
NETWORKING
|
14
|
DOTNET- A Distributed CSMA Algorithm for Throughput and
Utility Maximization in Wireless Networks
|
2010
|
PARALLEL COMPUTING
|
15
|
DOTNET- Fast Algorithms for Resource Allocation in Wireless
Cellular Networks
|
2010
|
WIRELESS NETWORKING
|
16
|
DOTNET- Distributed Algorithms for Minimum Cost Multicast
with Network Coding in Wireless Networks
|
2010
|
WIRELESS NETWORKING
|
17
|
DOTNET- Maximizing The Lifetime Of Wireless Sensor Networks
With Mobile Sink In Delay-Tolerant Application
|
2010
|
MOBIE COMPUTING
|
18
|
DOTNET- Fuzzy Keyword Search over Encrypted Data in Cloud
Computing
|
2010
|
CLOUD COMPUTING
|
19
|
DOTNET- Collaborative Sensing to Improve Information Quality
for Target Tracking in Wireless Sensor Network
|
2010
|
NERWORKING
|
20
|
DOTNET- Dynamic Authentication for Cross-Realm SOA-Based
Business Processes
|
2010
|
PARALLEL COMPUTING
|
21
|
DOTNET- TDMA Scheduling with Optimized Energy Efficiency and
Minimum Delay in Clustered Wireless Sensor Ne
|
2010
|
WIRELESS NETWORKING
|
22
|
JAVA-- Secure Data Objects Replication in Data Grid
|
2010
|
NETWORKING
|
23
|
JAVA-- RM Integrated File Replication and Consistency
Maintenance in P2P Systems
|
2010
|
NETWORKING
|
24
|
JAVA-- Fault-tolerant Mobile Agent-based Monitoring Mechanism
for Highly Dynamic Distributed Networks
|
2010
|
NETWORKING
|
25
|
JAVA-- Agent Based Efficient Anomaly Intrusion Detection System
in Adhoc networks
|
2010
|
NETOWORK SECURITY
|
26
|
JAVA-- Deriving Concept-Based User Profiles from Search Engine
Logs
|
2010
|
DATA MINING
|
27
|
JAVA-- On The Performance Of Content Delivery Under Competition
In A Stochastic Unstructured Peer-To-Peer
|
2010
|
NETWORKING
|
28
|
JAVA-- Rate Adaptation in Congested Wireless Networks through
Real-Time Measurements
|
2010
|
NETWORKING
|
29
|
JAVA-- A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer
Streaming
|
2010
|
NETWORKING
|
30
|
JAVA-- Conditional Shortest Path Routing In Delay Tolerant
Networks
|
2010
|
NETWORKING
|
31
|
JAVA-- Privacy-Conscious Location-Based Queries in Mobile
Environments
|
2010
|
MOBIE COMPUTING
|
32
|
JAVA-- Stochastic Approach to Image Retrieval Using Relevance
Feedback and Particle Swarm Optimization
|
2010
|
IMAGE PROCESSING
|
33
|
JAVA-- Opportunistic Routing in Multi-radio Multi-channel
Multi-hop Wireless Networks
|
2010
|
WIRELESS NETWORKING
|
34
|
JAVA-- MABS Multicast Authentication Based on Batch Signature
|
2010
|
NETWORK SECURITY
|
35
|
JAVA-- Optimal Jamming Attack Strategies and Network Defense
Policies in Wireless Sensor Networks
|
2010
|
WIRELESS NETWORKING
|
36
|
JAVA-- Layered Approach Using Conditional Random Fields for
Intrusion Detection
|
2010
|
NETWORK SECURITY
|
37
|
JAVA-- Inside the Permutation-Scanning Worms Propagation
Modeling and Analysis
|
2010
|
NETWORK SECURITY
|
38
|
JAVA-- Achieving Guaranteed Anonymity in GPS Traces via
Uncertainty Aware Path Cloaking
|
2010
|
MOBIE COMPUTING
|
39
|
JAVA-- Congestion Control Of Transmission Control Protocol
Based On Bandwidth Estimation
|
2010
|
|
40
|
JAVA-- Provisioning of Deadline-Driven Requests With Flexible
Transmission Rates inWDMMesh Networks
|
2010
|
NETWORKING
|
41
|
JAVA-- Performance Evaluation of Video Streaming over Multi-Hop
Wireless Local Area Networks
|
2010
|
WIRELESS NETWORKING
|
42
|
JAVA-- Toward Practical Opportunistic Routing With
Intra-Session Network Coding for Mesh Networks
|
2010
|
NETWORKING
|
43
|
JAVA-- Record Matching over Query Results from Multiple Web
Databases
|
2010
|
DATA MINING
|
44
|
JAVA-- Maximizing The Lifetime Of Wireless Sensor Networks With
Mobile Sink In Delay-Tolerant Application
|
2010
|
WIRELESS NETWORKING
|
45
|
JAVA-- Label-Based Dv-Hop Localization Against Wormhole Attacks
In Wireless Sensor Networks
|
2010
|
WIRELESS NETWORKING
|
46
|
JAVA-- FiVaTech Page-Level Web Data Extraction from Template
Pages
|
2010
|
WEB MINING
|
47
|
JAVA-- Pie Cooperative Peer-To-Peer Information Exchange In
Network Coding Enabled Wireless Networks
|
2010
|
WIRELESS NETWORKING
|
48
|
JAVA-- Image Thumbnails That Represent Blur and Noise
|
2010
|
IMAGE PROCESSING
|
49
|
JAVA-- PAM An Efficient And Privacy-Aware Monitoring Framework
For Continuously Moving Objects
|
2010
|
WIRELESS NETWORKING
|
50
|
JAVA-- KTR an Efficient Key Management Scheme for Secure Data
Access Control in Wireless Broadcast Services
|
2010
|
WIRELESS NETWORKING
|
|
|
|
|
S.NO.
|
2009
IEEE PROJECT TITLES
|
YEAR
|
DOMAIN
|
1
|
DOTNET- A Gen2-based RFID Authentication Protocol for
Security and Privacy
|
2009
|
|
2
|
DOTNET- A Tabu Searching Algorithm For Cluster Building in
Wirless Sensor Networks
|
2009
|
|
3
|
DOTNET- Analysis of Shortest Path Routing for Larg Multi-Hop
Wirless Networks
|
2009
|
|
4
|
DOTNET- Biased Random Walks in Uniform Wirless Networks
|
2009
|
|
5
|
DOTNET- Cell Breathing Techniques for Load Balancing in
Wirless LANs
|
2009
|
|
6
|
DOTNET- Compaction of Schedules and a Two-Stage Approach for
Duplication-
|
2009
|
|
7
|
DOTNET- Delay Analysis for Maximal Scheduling With Flow
Control in Wireless Networks With Bursty Traffic
|
2009
|
|
8
|
DOTNET- Energy Maps for Mobile Wireless Networks Coherence
Time versus Spreading Period
|
2009
|
|
9
|
DOTNET- Enforcing Minimum-Cost Multicast Routing against
Shelfish Information Flows
|
2009
|
|
10
|
DOTNET- Greedy Routing with Anti-Void Traversal for Wirless
Sensor Networks
|
2009
|
|
11
|
DOTNET- Information Content-Based Sensor Selection and
Transmission Power Adjustment for Collaborative Target
|
2009
|
|
12
|
DOTNET- Local Construction of Near-Optimal Power Spanners
for Wireless Ad Hoc Networks
|
2009
|
|
13
|
DOTNET- Movement-Assisted Connectivity Restoration in Wireless
Sensor and
|
2009
|
|
14
|
DOTNET- On the Planning of Wirless Sensor Networks
Energy-Efficient Clustering under the Joint Rou
|
2009
|
|
15
|
DOTNET- On the Security of Route Discovery in MANETs
|
2009
|
|
16
|
DOTNET- Performance of Orthogonal Fingerprinting Codes under
Worst-Case Noise
|
2009
|
|
17
|
PRESTO Feedback-Driven Data
Management in Sensor Networks
|
2009
|
|
18
|
DOTNET- Random Cast An Energy Efficient Communication Scheme
for Mobile Ad Hoc Networks
|
2009
|
|
19
|
DOTNET- Resequencing Analysis of Stop-and-Wait ARQ for
Parallel
|
2009
|
|
20
|
DOTNET- Resource Allocation in OFDMA Wireless Communications
Systems
|
2009
|
|
21
|
DOTNET- Route Stability in MANETs under the Random Direction
Mobility Model
|
2009
|
|
22
|
DOTNET- Secure and Policy-Complaint Source Routing
|
2009
|
|
23
|
DOTNET- Single-Link Failure Detection in All-Optical
Networks Using
|
2009
|
|
24
|
DOTNET- Spread-Spectrum Watermarking Security
|
2009
|
|
25
|
DOTNET- The Effectiveness of Checksums for Embedded Control
Networks
|
2009
|
|
26
|
DOTNET- Two Blocking Algorithm on Adaptive Binary Splitting
Single and Pair Resolutions for RFID
|
2009
|
|
27
|
JAVA-- A Distributed Stream Query Optimization Framework
through Integrated Planning and Deployment
|
2009
|
|
28
|
JAVA-- Adaptive Fuzzy Filtering for Artifact Reduction in
Compressed Images and Videos
|
2009
|
|
29
|
JAVA-- Measuring Capacity Bandwidth of Targeted Path Segments
|
2009
|
|
30
|
JAVA-- Capturing Router Congestion and Delay
|
2009
|
|
31
|
JAVA-- Continuous Monitoring of Spatial Queries in Wireless
Broadcast
|
2009
|
|
32
|
JAVA-- Detecting Malicious Packet Losses
|
2009
|
|
33
|
JAVA-- Dynamic Routing with Security Considerations
|
2009
|
|
34
|
JAVA-- Energy Maps For Mobile Wireless networks coherence Time
Versues Spreding Period
|
2009
|
|
35
|
JAVA-- Energy-Efficient SINR-Based Routing for Multihop
Wireless
|
2009
|
|
36
|
JAVA-- Evaluating the Vulnerability of Network Traffic Using
Joint Routing
|
2009
|
|
37
|
JAVA-- Facial Recognition using multisensor images based on
localized kernel eigen spaces
|
2009
|
|
38
|
JAVA-- Flexible Roll Back Recovery
|
2009
|
|
39
|
JAVA-- Large Connectivity for Dynamic Random Geometric Graphs
|
2009
|
|
40
|
JAVA-- Measuring Capacity Bandwidth of Targeted Path Segments
|
2009
|
|
41
|
JAVA-- Mitigation oF Control Channel Jamming Under Node Caputer
Attacks
|
2009
|
|
42
|
JAVA-- Mobility Management Approaches for Mobile IP Networks
|
2009
|
|
43
|
JAVA-- Movement-Assisted Connectivity Restoration in Wireless
Sensor and
|
2009
|
|
44
|
JAVA-- Multipath Dissemination in Regular Mesh Topologies
|
2009
|
|
45
|
JAVA-- Multiple Routing Configurations for Fast IP Network
Recovery
|
2009
|
|
46
|
JAVA-- Residual-Based Estimation of Peer and Link Lifetimes in
P2P Networks
|
2009
|
|
47
|
JAVA-- SIMPS Using Sociology for Personal Mobility
|
2009
|
|
48
|
JAVA-- Spatio-Temporal Network Anomaly Detection by Assessing
Deviations of Empirical Measures
|
2009
|
|
49
|
JAVA-- Monitoring the Application-Layer DDoS Attacks for
Popular Websites
|
2009
|
|
50
|
JAVA-- Ranking and Suggesting Popular Items
|
2009
|
|
|
|||
|
|||
S.NO.
|
2008
IEEE PROJECT TITLES
|
YEAR
|
DOMAIN
|
1
|
DOTNET- Estimation of Defects Based On Defect Decay Model
ED3M
|
2008
|
|
2
|
DOTNET- HBA Distributed Metadata Management for Large
Cluster-Based Storage Systems
|
2008
|
|
3
|
DOTNET- Rate Allocation & Network Lifetime Problem for
Wireless Sensor Networks
|
2008
|
|
4
|
DOTNET- Orthogonal Data Embedding for Binary Images in Morphological
Transform Domain-A High-Capacity Approach
|
2008
|
|
5
|
DOTNET- Trustworthy Computing Under Resource Constraints
With The Down Policy
|
2008
|
|
6
|
DOTNET- Localized Sensor Area Coverage With Low
Communication Overhead
|
2008
|
|
7
|
DOTNET- Active Learning Methods for Interactive Image
Retrieval
|
2008
|
|
8
|
DOTNET- Vision Based Processing For Real-Time 3-D Data
Acquisition Based On Coded Structured Light
|
2008
|
|
9
|
DOTNET- Hardware enhanced association rule mining with
Hashing and Pipelining
|
2008
|
|
10
|
DOTNET- Efficient Resource Allocation For Wireless Multicast
|
2008
|
|
11
|
DOTNET- A Novel Framework for Semantic Annotation and
Personalized Retrieval of Sports Video
|
2008
|
|
12
|
DOTNET- A Distributed And Scalable Routing Table Manager For
The Next Generation Of IP Routers
|
2008
|
|
13
|
DOTNET- A New Model For Dissemination Of XML Content
|
2008
|
|
14
|
DOTNET- Efficient 2-D Grayscale Morphological
Transformations With Arbitraly Flat Structuring Elements
|
2008
|
|
15
|
DOTNET- Efficient Routing In Intermittently Connected Mobile
Networks The Multiple Copy Case
|
2008
|
|
16
|
DOTNET- Watermarking Relational Databases Using Optimization
Based Techniques
|
2008
|
|
17
|
DOTNET- Fuzzy Control Model Optimization for
Behavior-Constent Traffic Routing Under Information Provision
|
2008
|
|
18
|
DOTNET- Probabilistic Packet Marking For Large Scale IP
Trace Back
|
2008
|
|
19
|
DOTNET- Credit Card Fraud Detection Using Hidden Markov
Models
|
2008
|
|
20
|
JAVA- A Geometric Approach to Improving Active Packet Loss
Measurement
|
2008
|
|
21
|
JAVA-Intrusion Detection in Homogeneous and Heterogeneous
Wireless Sensor Networks
|
2008
|
|
22
|
JAVA-Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
|
2008
|
|
23
|
JAVA-Location Based Spatial Query Processing In Wireless
Broadcast Environments
|
2008
|
|
24
|
JAVA-Modeling & Automated Containment of Worms
|
2008
|
|
25
|
JAVA-Benefit Based Data Caching In Ad Hoc Networks
|
2008
|
|
26
|
JAVA-Minimizing File Download Time in Stochastic Peer-to-Peer
Networks
|
2008
|
|
27
|
JAVA-Rate & Delay Guarantees Provided By Close Packet
Switches with Load Balancing
|
2008
|
|
28
|
JAVA-Performance of a Speculative Transmission Scheme for
Scheduling-Latency Reduction
|
2008
|
|
29
|
JAVA-QUIVER Consistent Object Sharing For Edge Services
|
2008
|
|
30
|
JAVA-Truth Discovery with multiple Conflicting Information
Providers on web
|
2008
|
|
31
|
JAVA-Dual-Link Failure Resiliency through Backup Link Mutual
Exclusion
|
2008
|
|
32
|
JAVA-Bandwidth Efficient Video Multicasting in Multiradio
Muilticellular Wireless
|
2008
|
|
33
|
JAVA-An Efficient Association Rule Mining Algorithm In
Distributed Databases
|
2008
|
|
34
|
JAVA-BRA A Bidirectional Routing Abstraction for Asymmetric
Mobile Ad Hoc Networks
|
2008
|
|
35
|
JAVA-A Precise Termination Condition of the Probabilistic
Packet Marking Algorithm
|
2008
|
|
36
|
JAVA-Protection of Database Security via Collaborative
Inference Detection
|
2008
|
|
37
|
JAVA-Efficient and Secure Content Processing and Distribution
by Cooperative Intermediaries
|
2008
|
|
38
|
JAVA-A Signature-Based Indexing Method for Efficient
Content-Based Retrieval of Relative Temporal Pattern
|
2008
|
|
39
|
JAVA-Controlling IP Spoofing Through Inter Domain Packet
Filters
|
2008
|
|
40
|
JAVA-Securing User-Controlled Routing Infrastructures
|
2008
|
|
|
No comments:
Post a Comment