You are on page 1of 5

ProjectDevlopments 2014

ProjectDevlopments@gmail.com Mob. No.: 9673921886










Project List BE/MCS



DOTNET
CLOUD COMPUTING

1. Data integrity proofs in cloud storage.
2. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud.
3. Optimal service pricing for a cloud cache.
4. Fuzzy Keyword Search over Encrypted Data.
5. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
6. An economic approach for scalable and highly-available distributed applications.
7. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.


IMAGE PROCESSING

8. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm
9. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts


SECURE COMPUTING

10. The Geometric Efficient Matching Algorithm for Firewalls.
11. A Policy Enforcing Mechanism for Trusted Ad Hoc Network
12. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-
Based Wireless Sensor Networks
13. Detecting Kernel-Level Root kits Using Data Structure Invariants.
14. Architecting a Secure Enterprise Data Sharing.
15. Fingerprint Matching Incorporating Ridge Features With Minutiae.
16. Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking
17. SigFree A Signature-free Buffer.

ProjectDevlopments 2014
ProjectDevlopments@gmail.com Mob. No.: 9673921886










DATA MINING

18. IR-Tree: An Efficient Index for Geographic Document Search.
19. Studies and Evaluation on Meta Search Engines.
20. Mining Web Graphs for Recommendations.
21. Monitoring Service Systems from a Language-Action Perspective.
22. Integration of Sound Signature in Graphical Password Authentication System
23. Exploring Application-Level Semantics for Data Compression.
24. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
25. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
26. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis.
27. A Personalized Ontology Model for Web Information Gathering
28. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems.
29. Efficient Computation of Range Aggregates against uncertain location based queries.
30. Scalable Learning of Collective Behavior
31. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.
32. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases
33. Publishing Search Logs A Comparative Study of Privacy Guarantees.
34. The World in a Nutshell Concise Range Queries.
35. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs.
36. AI AND OPINION MINING.
37. ANONYMOUS QUERY PROCESSING IN ROAD NETWORKS.
38. Data Leakage Detection Abstract


NETWORKING

39. Live Streaming with Receiver-based Peer-division Multiplexing.
40. Continuous Neighbor Discovery in Asynchronous Sensor Networks.
41. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection.
42. Self-Reconfigurable Wireless Mesh Networks.
43. Conditional Shortest Path Routing in Delay Tolerant Networks.
44. Slow Adaptive OFDMA Systems Through Chance Constrained Programming.
45. Pricing under Constraints in Access Networks Revenue Maximization and Congestion management.
ProjectDevlopments 2014
ProjectDevlopments@gmail.com Mob. No.: 9673921886






WIRELESS COMMUNICATION

46. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems.
47. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless networks.
48. Throughput Optimization in High Speed Downlink Packet Access (HSDPA).
49. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks.

MOBILE COMPUTING

50. MABS Multicast Authentication Based on Batch Signature.






JAVA

CLOUD COMPUTING

51. Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
52. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds.
53. Improving Utilization of Infrastructure Clouds.
54. Agent-Based Urban Transportation Systems.
55. Ensuring Data Storage Security in Cloud Computing.
56. Client-side Load Balancer using Cloud.







IMAGE PROCESSING



57. Face as a mouse (using face we achieve mouse operations).
58. Embedded Extended Visual Cryptography Schemes
ProjectDevlopments 2014
ProjectDevlopments@gmail.com Mob. No.: 9673921886







59. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
60. Computational Perceptual Features for Texture Representation and Retrieval.
61. Subspace-Based Striping Noise Reduction in Hyper-spectral Images.
62. Multiple exposure fusion for high dynamic range image acquisition.
63. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.



SECURE COMPUTING

64. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh NETWORKS
65. Analysis on Credit Card Fraud Detection Methods.
66. Towards Situational Awareness of Large-Scale Botnet Probing Events.
67. Online Intrusion Alert Aggregation with Generative Data Stream Modeling.
68. RITAS: Services for Randomized Intrusion Tolerance
69. Modeling and Detection of Camouflaging Worm.
70. Nymble Blocking Misbehaving Users in Anonymizing Networks








DATA MINING

71. Database converter .
72. Extended XML Tree Pattern Matching: Theories and Algorithms.
73. Load Shedding in Mobile Systems with MobiQual.
74. The CoQUOS Approach to Continuous Queries in Unstructured Overlays.
75. Ranking Spatial Data by Quality Preferences.
76. Effective Navigation of Query Results Based on Concept Hierarchies.

NETWORKING

77. Selfish Overlay Network Creation and Maintenance.
78. SPAF: Stateless FSA-based Packet Filters.
ProjectDevlopments 2014
ProjectDevlopments@gmail.com Mob. No.: 9673921886







79. ProgME: Towards Programmable Network Measurement
80. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks.
81. Buffer Sizing for 802.11 Based Networks.
82. Model-Based Identification of Dominant Congested Links
83. Channel Allocation in Wireless Data Center Networks.
84. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems.
85. A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems.
86. On Modeling, Analysis, and Optimization of Packet Aggregation Systems Network communication
87. A Distributed Explicit Rate Schemes in Multi-InputMulti-Output Network Systems.



WIRELESS COMMUNICATION

88. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks.
89. Host-to-Host Congestion Control for TCP.
90. Mesh Based Multicast Routing in MANET Stable Link Based Approach.


MOBILE COMPUTING

91. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
92. Throughput Optimization in Mobile Backbone Networks.
93. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks.
94. Bandwidth recycling in IEEE 802.16 Networks.
95. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
96. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes.





PARALLEL AND DISTRIBUTED SYSTEM


97. Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming.
98. Correlation-Based Traffic Analysis Attacks on Anonymity Networks
99. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation.

You might also like