FINAL YEAR PROJECTS - Engineeringidolph.com/titles/IEEE PROJECT TITLES BOOK 2016.pdfFINAL YEAR...

31
Contact: 8870006111, 9952590305 Email ID: [email protected] www.idolph.com 746 / 348 JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem 636006 FINAL YEAR PROJECTS IEEE PROJECTS 2015 2016 ANDROID PROJECTS S.NO PROJECT CODE TITLE OF THE PAPER YEAR 1 AN1501 A Location- and Diversity-aware News Feed System for Mobile Users 2015 2 AN1502 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2015 3 AN1503 CWC: A Distributed Computing Infrastructure Using Smartphones 2015 4 AN1504 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015 5 AN1505 User-Defined Privacy Grid System for Continuous Location-Based Services 2015 6 AN1506 Context-Based Access Control Systems for Mobile Devices 2015 7 AN1507 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015 8 AN1508 Privacy-Preserving Relative Location Based Services for Mobile Users 2015 9 AN1509 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015 10 AN1510 Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds 2015 11 AN1511 Extend Your Journey: Considering Signal Strength and Fluctuation in Location- Based Applications 2015 12 AN1512 Smartphone-Based Wound Assessment System for Patients with Diabetes 2015 13 AN1513 The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps 2015 14 AN1514 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2015 15 AN1415 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks 2014 16 AN1416 Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks 2014 17 AN1417 Collaborative Policy Administration 2014 18 AN1418 Context-based Access Control Systems for Mobile Devices 2014

Transcript of FINAL YEAR PROJECTS - Engineeringidolph.com/titles/IEEE PROJECT TITLES BOOK 2016.pdfFINAL YEAR...

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

FINAL YEAR PROJECTS

IEEE PROJECTS 2015 – 2016

ANDROID PROJECTS S.NO

PROJECT CODE

TITLE OF THE PAPER YEAR

1 AN1501 A Location- and Diversity-aware News Feed System for Mobile Users 2015

2 AN1502 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2015

3 AN1503 CWC: A Distributed Computing Infrastructure Using Smartphones 2015

4 AN1504 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015

5 AN1505 User-Defined Privacy Grid System for Continuous Location-Based Services 2015

6 AN1506 Context-Based Access Control Systems for Mobile Devices 2015

7 AN1507 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015

8 AN1508 Privacy-Preserving Relative Location Based Services for Mobile Users 2015

9 AN1509 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015

10 AN1510 Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds

2015

11 AN1511 Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications

2015

12 AN1512 Smartphone-Based Wound Assessment System for Patients with Diabetes 2015

13 AN1513 The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps

2015

14 AN1514 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2015

15 AN1415 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks

2014

16 AN1416 Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks

2014

17 AN1417 Collaborative Policy Administration 2014

18 AN1418 Context-based Access Control Systems for Mobile Devices 2014

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

19 AN1419 Context-driven, Prescription-Based Personal Activity Classification: Methodology, Architecture, and End-to-End Implementation

2014

20 AN1420 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014

21 AN1421 DELTA++: Reducing the Size of Android Application Updates 2014

22 AN1422 Effective Risk Communication for Android Apps 2014

23 AN1423 Face-to-Face Proximity Estimation Using Bluetooth on Smartphones 2014

24 AN1424 Generating Summary Risk Scores for Mobile Applications 2014

25 AN1425 GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications

2014

26 AN1426 Hiding in the Mobile Crowd: Location Privacy through Collaboration 2014

27 AN1427 How Long to Wait? Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing

2014

28 AN1428 MOSES: Supporting and Enforcing Security Profiles on Smartphones 2014

29 AN1429 Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones

2014

30 AN1430 The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data

2014

31 AN1331 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence 2013

32 AN1332 Dynamic Personalized Recommendation on Sparse Data 2013

33 AN1333 Spatial Query Integrity with Voronoi Neighbors 2013

34 AN1334 MeetYou -- Social Networking on Android 2013

35 AN1335 Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments

2013

36 AN1336 PMSE: A Personalized Mobile Search Engine 2013

37 AN1337 Crowdsourced Trace Similarity with Smartphones 2013

38 AN1338 Twitsper: Tweeting Privately 2013

39 AN1339 Review of Behavior Malware Analysis for Android 2013

40 AN1340 Research in Progress - Defending Android Smartphones from Malware Attacks 2013

41 AN1341 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

2013

42 AN1342 CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 2013

43 AN1343 Collaborative Policy Administration 2013

44 AN1344 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

2013

45 AN1345 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

2013

46 AN1346 Collaborative Learning Assistant for Android 2013

47 AN1247 Safe Driving Using Mobile Phones 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

48 AN1248 EduPad- A Tablet Based Educational System for improving adult literacy in rural India.

2012

49 AN1249 Designing Mobile Language Learning Applications using Multimedia: Implications from a Small-scale Prospective Learner Study.

2012

50 AN1250 Research and design of chatting room system based on Android Bluetooth. 2012

51 AN1251 Design and Implementation of Improved Authentication System for Android Smartphone Users

2012

52 AN1252 Learn to Personalized Image Search from the Photo Sharing Websites. 2012

53 AN1253 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.

2012

54 AN1254 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012

55 AN1255 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.

2012

56 AN1256 Payments for Outsourced Computations 2012

57 AN1257 Outsourced Similarity Search on Metric Data Assets 2012

58 AN1258 A Query Formulation Language for the Data Web 2012

59 AN1259 PMSE A Personalized Mobile Search Engine 2012

60 AN1260 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

2012

61 AN1261 Ranking Model Adaptation for Domain-Specific Search 2012

62 AN1262 Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

2012

63 AN1263 Efficient audit service outsourcing for data integrity in Clouds 2012

64 AN1264 Ensuring Distributed Accountability in Data Sharing in the Cloud 2012

65 AN1265 Network Assisted Mobile Computing Optimal Uplink Query Processing 2012

66 AN1266 Tram location and route navigation system using smartphone 2012

67 AN1267 Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.

2012

68 AN1268 A Mobile Application to Access Remote Database using Web Services 2012

69 AN1269 DroidMat: Android Malware Detection through Manifest and API Calls Tracing 2012

70 AN1270 A Framework for Personal Mobile Commerce Pattern Mining and Prediction 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

FINAL YEAR PROJECTS

IEEE PROJECTS 2015 – 2016

DOTNET PROJECTS CLOUD COMPUTING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 CCD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

Cloud Data 2015

2 CCD1502 Cloud-Based Multimedia Content Protection System 2015

3 CCD1503 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous

Attribute-Based Encryption 2015

4 CCD1504 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid

Clouds 2015

5 CCD1505 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-

dictionaries over Encrypted Cloud Data 2015

6 CCD1506 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015

7 CCD1507 Identity-Based Distributed Provable Data Possession in Multicloud Storage 2015

8 CCD1508 Panda: Public Auditing for Shared Data with Efficient User Revocation in the

Cloud 2015

9 CCD1509 PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative

Authentication in Distributed m-Healthcare Cloud Computing System 2015

10 CCD1510 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers 2015

11 CCD1411 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions 2014

12 CCD1412 Building Confidential and Efficient Query Services in the Cloud with RASP Data

Perturbation 2014

13 CCD1413 Consistency as a Service: Auditing Cloud Consistency 2014

14 CCD1414 Decentralized Access Control with Anonymous Authentication of Data Stored in 2014

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

Clouds

15 CCD1415 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014

16 CCD1416 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage:

Theory and Implementation 2014

17 CCD1417 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 2014

18 CCD1418 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014

19 CCD1419 Panda: Public Auditing for Shared Data with Efficient User Revocation in the

Cloud 2014

20 CCD1420 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014

21 CCD1421 Scalable Distributed Service Integrity Attestation for Software-as a-Service Clouds 2014

22 CCD1322 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective

Privacy Preserving of Intermediate Data Sets in Cloud 2013

23 CCD1323 An Adaptive Cloud Downloading Service 2013

24 CCD1324 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems 2013

25 CCD1325 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013

26 CCD1326 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 2013

27 CCD1327 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2013

28 CCD1328 Privacy-Preserving Public Auditing for Secure Cloud Storage 2013

29 CCD1329 QoS Ranking Prediction for Cloud Services 2013

30 CCD1330 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption 2013

31 CCD1331 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for

Production Cloud Computing Systems 2013

32 CCD1332 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 2013

33 CCD1233 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. 2012

34 CCD1234 Cloud Computing Security From Single to Multi-Clouds. 2012

35 CCD1235 Enhanced Data Security Model for Cloud Computing 2012

36 CCD1236 Ensuring Distributed Accountability for Data Sharing in the Cloud. 2012

37 CCD1237 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access

Control in Cloud Computing. 2012

38 CCD1238 Outsourced Similarity Search on Metric Data Assets. 2012

39 CCD1239 Privacy-Preserving Public Auditing for Secure Cloud Storage 2012

40 CCD1240 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using

Attribute-based Encryption. 2012

41 CCD1241 Toward Secure and Dependable Storage Services in Cloud Computing. 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

DATA MINING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 DMD1501 Discovery of Ranking Fraud for Mobile Apps 2015

2 DMD1502 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015

3 DMD1503 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015

4 DMD1504 Query Aware Determinization of Uncertain Objects 2015

5 DMD1405 A Cocktail Approach for Travel Package Recommendation 2014

6 DMD1406 An Empirical Performance Evaluation of Relational Keyword Search Techniques 2014

7 DMD1407 LARS*: An Efficient and Scalable Location-Aware Recommender System 2014

8 DMD1408 Product Aspect Ranking and Its Applications 2014

9 DMD1409 Secure Mining of Association Rules in Horizontally Distributed Databases 2014

10 DMD1410 Supporting Privacy Protection in Personalized Web Search 2014

11 DMD1411 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014

12 DMD1412 Typicality-Based Collaborative Filtering Recommendation 2014

13 DMD1313 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013

14 DMD1314 A Survey of XML Tree Patterns 2013

15 DMD1315 Dynamic Personalized Recommendation on Sparse Data 2013

16 DMD1316 Mining User Queries with Markov Chains: Application to Online Image Retrieval 2013

17 DMD1317 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality

2013

18 DMD1318 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments

2013

19 DMD1319 Supporting Search-As-You-Type Using SQL in Databases 2013

20 DMD1320 Secure Mining of Association Rules in Horizontally Distributed Databases 2013

21 DMD1221 A Query Formulation Language for the data web 2012

22 DMD1222 Creating Evolving User Behavior Profiles Automatically 2012

23 DMD1223 D-Cache: Universal Distance Cache for Metric Access Methods 2012

24 DMD1224 DDD: A New Ensemble Approach for Dealing with Concept Drift 2012

25 DMD1225 Efficient Computation of Range Aggregates against UncertainLocation-Based Queries

2012

26 DMD1226 Efficient Fuzzy Type-Ahead Search in XML Data 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

27 DMD1227 Horizontal Aggregations in SQL to Prepare Data Sets for Data MiningAnalysis 2012

28 DMD1228 Improving Aggregate Recommendation Diversity Using Ranking-BasedTechniques

2012

29 DMD1229 Measuring the Sky: On Computing Data Cubes via Skylining the Measures 2012

30 DMD1230 Mining Web Graphs for Recommendations 2012

31 DMD1231 Organizing User Search Histories 2012

32 DMD1232 Publishing Search Logs—A Comparative Study of Privacy Guarantees 2012

33 DMD1233 Query Planning for Continuous Aggregation Queries over a Network ofData Aggregators

2012

34 DMD1234 ROAD: A New Spatial Object Search Framework for Road Networks 2012

35 DMD1235 Scalable Learning of Collective Behavior 2012

36 DMD1236 Slicing: A New Approach for Privacy Preserving Data Publishing 2012

37 DMD1237 Tree-Based Mining for Discovering Patterns of Human Interaction inMeetings 2012

38 DMD1238 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems

2012

39 DMD1239 Ranking Model Adaptation for Domain-Specific Search 2012

40 DMD1240 One Size Does Not Fit All: Toward User- and Query-Dependent Ranking for Web Databases

2012

41 DMD1241 Continuous Detour Queries in Spatial Networks 2012

PARALLEL AND DISTRIBUTED SYSTEMS

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 PDD1501 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015

2 PDD1402 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust

Establishment in Delay-Tolerant Networks 2014

3 PDD1403 A System for Denial-of-Service Attack Detection Based on Multivariate

Correlation Analysis 2014

4 PDD1404 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 2014

5 PDD1405 Certificateless Remote Anonymous Authentication Schemes for Wireless Body

Area Networks 2014

6 PDD1406 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014

7 PDD1407 Multicast Capacity in MANET with Infrastructure Support 2014

8 PDD1408 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor

Networks 2014

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

9 PDD1409 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using

Compressive Sensing 2014

10 PDD1310 A Secure Payment Scheme with Low Communication and Processing Overhead

for Multihop Wireless Networks 2013

11 PDD1311 Multicast Capacity in MANET with Infrastructure Support 2013

12 PDD1312 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for

Mobile-Healthcare Emergency 2013

13 PDD1313 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013

14 PDD1314 Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor

Networks 2013

15 PDD1315 A Probabilistic Misbehavior Detection Scheme towards Efficient Trust

Establishment in Delay-tolerant Networks 2013

16 PDD1316 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n

Wireless Sensor Networks 2013

17 PDD1217 Bounding the Impact of UnboundedAttacks in Stabilization 2012

18 PDD1218 Catching Packet Droppers andModifiers in Wireless Sensor Networks 2012

19 PDD1219 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012

20 PDD1220 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs 2012

21 PDD1221 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2012

NETWORKING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 NWD1501 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic

Localization 2015

2 NWD1502 Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis 2015

3 NWD1503 Universal Network Coding-Based Opportunistic Routing for Unicast 2015

4 NWD1404 Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic

Traffic 2014

5 NWD1405 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014

6 NWD1306 A Distributed Control Law for Load Balancing in Content Delivery Networks 2013

7 NWD1307 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013

8 NWD1308 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad

Hoc Networks 2013

9 NWD1309 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

10 NWD1310 Efficient Algorithms for Neighbor Discovery in Wireless Networks 2013

11 NWD1311 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 2013

12 NWD1312 Resource Allocation for QoS Support in Wireless Mesh Networks 2013

13 NWD1313 A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop

Wireless Networks With Order-Optimal Per-Flow Delay 2013

14 NWD1214 A New Cell-Counting-Based Attack Against Tor 2012

15 NWD1215 Optimal Source-Based Filtering of Malicious Traffic 2012

16 NWD1216 Topology Control In Mobile Ad Hoc Networks With Cooperative Communications 2012

17 NWD1217 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing

Topologies 2012

18 NWD1218 Uncoordinated Cooperative Communications in Highly Dynamic Wireless

Networks 2012

19 NWD1219 Load-Balancing Multipath Switching System with Flow Slice 2012

SECURE COMPUTING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 SCD1501 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical

Cyber Physical Systems 2015

2 SCD1502 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast

Keyword Search 2015

3 SCD1503 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined

Fingerprints 2015

4 SCD1504 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System 2015

5 SCD1405 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI

Problems 2014

6 SCD1306 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. 2013

7 SCD1307 EAACK—A Secure Intrusion-Detection System for MANETs 2013

8 SCD1308 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed

Information Sharing 2013

9 SCD1309 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable

Links 2013

10 SCD1310 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013

11 SCD1311 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

12 SCD1212 A Secure Intrusion detection system against DDOS attack in WirelessMobile Ad-

hoc Network 2012

13 SCD1213 Design and Implementation of TARF: A Trust-Aware Routing Framework

forWSNs 2012

14 SCD1214 ES-MPICH2: A Message Passing Interface with Enhanced Security 2012

15 SCD1215 On the Security and Efficiency of Content Distribution via NetworkCoding 2012

16 SCD1216 SPOC: A Secure and Privacy-preserving Opportunistic ComputingFramework

forMobile-Healthcare Emergency 2012

17 SCD1217 Revisiting Defenses against Large-Scale Online Password GuessingAttacks 2012

18 SCD1218 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a

Knowledge-Based Authentication Mechanism 2012

19 SCD1219 Automatic Reconfiguration for Large-Scale Reliable Storage Systems 2012

IMAGE PROCESSING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 IPD1501 An Attribute-Assisted Reranking Model for Web Image Search 2015

2 IPD1502 Automatic Face Naming by Learning Discriminative Affinity Matrices From

Weakly Labeled Images 2015

3 IPD1503 Detection and Rectification of Distorted Fingerprints 2015

4 IPD1504 Eye Gaze Tracking With a Web Camera in a Desktop Environment 2015

5 IPD1505 Learning Fingerprint Reconstruction: From Minutiae to Image 2015

6 IPD1506 Multiview Alignment Hashing for Efficient Image Search 2015

7 IPD1507 Single Image Super resolution Based on Gradient Profile Sharpness 2015

8 IPD1508 Steganography Using Reversible Texture Synthesis 2015

9 IPD1409 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding 2014

10 IPD1410 Designing an Efficient Image Encryption-Then-Compression System via

Prediction Error Clustering and Random Permutation 2014

11 IPD1311 Query-Adaptive Image Search With Hash Codes 2013

12 IPD1312 Reversible Data Hiding With Optimal Value Transfer 2013

13 IPD1313 Reversible Watermarking Based on Invariant Image Classification and Dynamic

Histogram Shifting 2013

14 IPD1314 Local Directional Number Pattern for Face Analysis: Face and Expression

Recognition 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

15 IPD1315 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet

Transform Shrinkage 2013

16 IPD1216 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2012

17 IPD1217 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 2012

18 IPD1218 Active Visual Segmentation 2012

19 IPD1219 Image Segmentation Based on the Poincaré Map Method 2012

20 IPD1220 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE

USINGRANDOM NUMBER 2012

21 IPD1221 Multiple Exposure Fusion for High Dynamic Range Image Acquisition 2012

22 IPD1222 Semi-supervised Biased Maximum Margin Analysis for Interactive

ImageRetrieval 2012

23 IPD1223 Smile Detection by Boosting Pixel Differences 2012

24 IPD1224 View-invariant action recognition based on Artificial Neural Networks 2012

25 IPD1225 A Novel Anti phishing framework based on visual cryptography 2012

26 IPD1226 Robust Face-Name Graph Matching for Movie Character Identification 2012

27 IPD1227 Low-Complexity Compression Method for Hyperspectral Images Based on

Distributed Source Coding 2012

28 IPD1228 Robustness of Offline Signature Verification Based on Gray Level Features 2012

29 IPD1229 Controllable Secure Watermarking Technique for Tradeoff Between Robustness

and Security 2012

30 IPD1230 A Discriminative Model of Motion and Cross Ratio for View-Invariant Action

Recognition 2012

MOBILE COMPUTING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 MCD1501 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid

Wireless Networks 2015

2 MCD1502 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading

in Wireless Sensor Networks 2015

3 MCD1503 Optimal Configuration of Network Coding in Ad Hoc Networks 2015

4 MCD1504 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in

Wireless Ad Hoc Networks 2015

5 MCD1405 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

6 MCD1406 Autonomous Mobile Mesh Networks 2014

7 MCD1407 DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile

Underwater Sensor Networks 2014

8 MCD1408 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected

MANETs 2014

9 MCD1409 Preserving Location Privacy in Geosocial Applications 2014

10 MCD1310 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013

11 MCD1311 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional

Game Approach 2013

12 MCD1312 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc

Networks 2013

13 MCD1313 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2013

14 MCD1314 Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless

Sensor Networks 2013

15 MCD1315 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing

Overhead in Mobile Ad Hoc Networks 2013

16 MCD1316 Network-Assisted Mobile Computing with Optimal Uplink Query Processing 2013

17 MCD1317 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013

18 MCD1318 On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 2013

19 MCD1319 Toward Accurate Mobile Sensor Network Localization in Noisy Environments 2013

20 MCD1220 Cooperative Download in Vehicular Environments 2012

21 MCD1221 Distributed Throughput Maximization in Wireless Networks via Random Power

Allocation 2012

22 MCD1222 Network Assisted Mobile Computing with Optimal Uplink Query Processing 2012

23 MCD1223 Protecting Location Privacy in Sensor Networks against a Global Eaves dropper 2012

24 MCD1224 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 2012

25 MCD1225 Towards Accurate Mobile Sensor Network Localization in Noisy Environments 2012

26 MCD1226 Leveraging Smartphone Cameras for Collaborative Road Advisories 2012

27 MCD1227 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor

Networks 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

SERIVCE COMPUTING SOA (WEB SERVICE)

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 SRD1101 Monitoring Service Systems from a Language-Action Perspective 2011

2 SRD1102 Vulnerability Analysis in SOA-based Business Processes 2011

3 SRD1302 Cost-Based Optimization of Service Compositions 2013

4 SRD1303 Evolution of Social Networks Based on Tagging Practices 2013

PATTERN ANALYSIS AND MACHINE INTELLIGENCE

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 PAD1401 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014

2 PAD1202 Exploring Context and Content Links in Social Media: A Latent Space Method 2012

3 PAD1103 Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models 2011

MULTIMEDIA

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 MMD1301 Beyond Text QA: Multimedia Answer Generation by Harvesting Web

Information 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

FINAL YEAR PROJECTS

IEEE PROJECTS 2015 – 2016

JAVA PROJECTS CLOUD COMPUTING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 CCJ1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2015

2 CCJ1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

Computing 2015

3 CCJ1503 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe

Systems 2015

4 CCJ1504 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

Cloud Data 2015

5 CCJ1505 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015

6 CCJ1506 An Authenticated Trust and Reputation Calculation and Management System

for Cloud and Sensor Networks Integration 2015

7 CCJ1507 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2015

8 CCJ1508 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable

Delegation in Cloud Computing 2015

9 CCJ1509 CloudArmor: Supporting Reputation-based Trust Management for Cloud

Services 2015

10 CCJ1510 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous

Attribute-Based Encryption 2015

11 CCJ1511 Enabling Cloud Storage Auditing With Key-Exposure Resistance 2015

12 CCJ1512 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-

dictionaries over Encrypted Cloud Data 2015

13 CCJ1513 Identity-Based Encryption with Outsourced Revocation in Cloud Computing 2015

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

14 CCJ1514 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud

Storage 2015

15 CCJ1515 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in

Cloud Computing 2015

16 CCJ1516 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 2015

17 CCJ1517 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 2015

18 CCJ1518 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User

Revocation 2015

19 CCJ1519 Secure Auditing and Deduplicating Data in Cloud 2015

20 CCJ1520 Stealthy Denial of Service Strategy in Cloud Computing 2015

21 CCJ1421 A Hybrid Cloud Approach for Secure Authorized Deduplication 2014

22 CCJ1422 A Scalable Two-Phase Top-Down Specialization Approach for Data

Anonymization Using MapReduce on Cloud 2014

23 CCJ1423 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS

Cloud Computing Systems 2014

24 CCJ1424 Building Confidential and Efficient Query Services in the Cloud with RASP Data

Perturbation 2014

25 CCJ1425 Decentralized Access Control with Anonymous Authentication of Data Stored in

Clouds 2014

26 CCJ1426 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014

27 CCJ1427 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority

Cloud Storage 2014

28 CCJ1428 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014

29 CCJ1429 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014

30 CCJ1430 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014

31 CCJ1431 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014

32 CCJ1432 Scalable Distributed Service Integrity Attestation for Software-asa-Service

Clouds 2014

33 CCJ1433 Towards Differential Query Services in Cost-Efficient Clouds 2014

34 CCJ1334 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS

Cloud Computing Systems 2013

35 CCJ1335 CloudMoV: Cloud-based Mobile Social TV 2013

36 CCJ1336 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing

Environment 2013

37 CCJ1337 Error-Tolerant Resource Allocation and Payment Minimization for Cloud

System 2013

38 CCJ1338 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear

Equations 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

39 CCJ1339 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013

40 CCJ1340 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2013

41 CCJ1341 Privacy-Preserving Public Auditing for Secure Cloud Storage 2013

42 CCJ1342 Scalable and Secure Sharing of Personal Health Records in Cloud Computing

Using Attribute-Based Encryption 2013

43 CCJ1343 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems 2013

44 CCJ1244 A Secure Erasure Code-Based Cloud Storage System with Secure Data

Forwarding 2012

45 CCJ1245 Cloud Computing Security: From Single to Multi-Clouds 2012

46 CCJ1246 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud

Storage 2012

47 CCJ1247 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access

Control in Cloud Computing 2012

48 CCJ1248 Outsourced Similarity Search on Metric Data Assets 2012

49 CCJ1249 Scalable and Secure Sharing of Personal Health Records in Cloud Computing

using Attribute-based Encryption 2012

50 CCJ1250 Toward Secure and Dependable Storage Services in Cloud Computing 2012

DATA MINING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 DMJ1501 Best Keyword Cover Search 2015

2 DMJ1502 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based

on the Word Alignment Model 2015

3 DMJ1503 Context-Based Diversification for Keyword Queries over XML Data 2015

4 DMJ1504 Discovery of Ranking Fraud for Mobile Apps 2015

5 DMJ1505 Malware Propagation in Large-Scale Networks 2015

6 DMJ1506 On Summarization and Timeline Generation for Evolutionary Tweet Streams 2015

7 DMJ1507 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015

8 DMJ1508 Progressive Duplicate Detection 2015

9 DMJ1509 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 2015

10 DMJ1510 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing 2015

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

at Location-Based Services

11 DMJ1511 Scalable Constrained Spectral Clustering 2015

12 DMJ1512 Towards Effective Bug Triage with Software Data Reduction Techniques 2015

13 DMJ1513 Tweet Segmentation and Its Application to Named Entity Recognition 2015

14 DMJ1414 A Cocktail Approach for Travel Package Recommendation 2014

15 DMJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for

Relational Data 2014

16 DMJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 2014

17 DMJ1417 Data Mining with Big Data 2014

18 DMJ1418 Dealing With Concept Drifts in Process Mining 2014

19 DMJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014

20 DMJ1420 Efficient Prediction of Difficult Keyword Queries over Databases 2014

21 DMJ1421 Facilitating Document Annotation Using Content and Querying Value 2014

22 DMJ1422 Fast Nearest Neighbor Search with Keywords 2014

23 DMJ1423 Keyword Query Routing 2014

24 DMJ1424 Privacy-Preserving and Content-Protecting Location Based Queries 2014

25 DMJ1425 Security Evaluation of Pattern Classifiers under Attack 2014

26 DMJ1426 Supporting Privacy Protection in Personalized Web Search 2014

27 DMJ1427 Towards Online Shortest Path Computation 2014

28 DMJ1328 A Fast Clustering-Based Feature Subset Selection Algorithm for High-

Dimensional Data 2013

29 DMJ1329 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013

30 DMJ1330 Annotating Search Results from Web Databases 2013

31 DMJ1331 Anomaly Detection via Online Over-Sampling Principal Component Analysis 2013

32 DMJ1332 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor

Networks 2013

33 DMJ1333 m-Privacy for Collaborative Data Publishing 2013

34 DMJ1334 Protecting Sensitive Labels in Social Network Data Anonymization 2013

35 DMJ1335 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting

System Development 2013

36 DMJ1236 Clustering with Multi-viewpoint-Based Similarity Measure 2012

37 DMJ1237 Efficient Extended Boolean Retrieval 2012

38 DMJ1238 Ranking Model Adaptation for Domain-Specific Search 2012

39 DMJ1239 Slicing: A New Approach for Privacy Preserving Data Publishing 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

40 DMJ1240 Efficient Fuzzy Type-Ahead Search in XML Data 2012

41 DMJ1241 Effective Pattern Discovery for Text Mining 2012

42 DMJ1242 Resilient Identity Crime Detection 2012

43 DMJ1243 A Genetic Programming Approach to Record De-duplication 2012

44 DMJ1244 Enabling Multilevel Trust in Privacy Preserving Data Mining 2012

PARALLEL AND DISTRIBUTED SYSTEMS

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 PDJ1501 Asymmetric Social Proximity Based Private Matching Protocols for Online Social

Networks 2015

2 PDJ1502 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015

3 PDJ1503 Secure Distributed Deduplication Systems with Improved Reliability 2015

4 PDJ1404 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social

Networks 2014

5 PDJ1405 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014

6 PDJ1406 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014

7 PDJ1407 On False Data-Injection Attacks against Power System State Estimation:

Modeling and Countermeasures 2014

8 PDJ1408 RRE: A Game-Theoretic Intrusion Response and Recovery Engine 2014

9 PDJ1409 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based

Encryption 2014

10 PDJ1410 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014

11 PDJ1411 The Client Assignment Problem for Continuous Distributed Interactive

Applications: Analysis, Algorithms, and Evaluation 2014

12 PDJ1412 The Design and Evaluation of An Information Sharing System for Human

Networks 2014

13 PDJ1413 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery

Networks 2014

14 PDJ1414 Secure Outsourced Attribute-based Signatures 2014

15 PDJ1315 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 2013

16 PDJ1316 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage

Systems 2013

17 PDJ1317 IP-Geolocation Mapping for Moderately Connected Internet Regions 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

18 PDJ1318 Optimal Client-Server Assignment for Internet Distributed Systems 2013

19 PDJ1219 Cut Detection in Wireless Sensor Networks 2012

20 PDJ1220 A Framework for Routing Performance Analysis in Delay Tolerant Networks

with Application to Non-cooperative Net 2012

21 PDJ1221 Footprint: Detecting Sybil Attacks in Urban Vehicular Networks 2012

22 PDJ1222 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012

NETWORKING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 NWJ1501 A Distortion-Resistant Routing Framework for Video Traffic in Wireless

Multihop Networks 2015

2 NWJ1502 A Proximity-Aware Interest-Clustered P2P File Sharing System 2015

3 NWJ1503 Detecting Malicious Facebook Applications 2015

4 NWJ1504 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though

Replication for Efficient File Sharing 2015

5 NWJ1405 Automatic Test Packet Generation 2014

6 NWJ1406 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014

7 NWJ1407 Boundary Cutting for Packet Classification 2014

8 NWJ1408 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014

9 NWJ1309 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013

10 NWJ1310 Delay-Based Network Utility Maximization 2013

11 NWJ1311 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 2013

12 NWJ1212 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks 2012

13 NWJ1213 Design, Implementation, and Performance of a Load Balancer for SIP Server

Clusters 2012

14 NWJ1214 Independent Directed Acyclic Graphs for Resilient Multipath Routing 2012

15 NWJ1215 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 2012

16 NWJ1216 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012

17 NWJ1217 RIHT: A Novel Hybrid IP Traceback Scheme 2012

18 NWJ1218 Router Support for Fine-Grained Latency Measurements 2012

19 NWJ1219 Packet Loss Control Using Tokens at the Network Edge 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

SECURE COMPUTING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 SCJ1501 A Computational Dynamic Trust Model for User Authorization 2015

2 SCJ1502 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet

Drop Attacks in Wireless Sensor Networks 2015

3 SCJ1503 Continuous and Transparent User Identity Verification for Secure Internet

Services 2015

4 SCJ1504 Contributory Broadcast Encryption with Efficient Encryption and Short

Ciphertexts 2015

5 SCJ1505 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting

Masquerade Attacks 2015

6 SCJ1506 Improved Privacy-Preserving P2P Multimedia Distribution Based on

Recombined Fingerprints 2015

7 SCJ1507 Secure Data Aggregation Technique for Wireless Sensor Networks in the

Presence of Collusion Attacks 2015

8 SCJ1508 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service

Providers 2015

9 SCJ1409 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI

Problems 2014

10 SCJ1410 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014

11 SCJ1411 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks 2014

12 SCJ1412 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014

13 SCJ1313 EAACK—A Secure Intrusion-Detection System for MANETs 2013

14 SCJ1314 Identity-Based Secure Distributed Data Storage Schemes 2013

15 SCJ1315 Modeling the Pairwise Key Predistribution Scheme in the Presence of

Unreliable Links 2013

16 SCJ1316 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual

Network Systems 2013

17 SCJ1317 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013

18 SCJ1318 Securing Class Initialization in Java-like Languages 2013

19 SCJ1319 Security Analysis of a Single Sign-On Mechanism for Distributed Computer

Networks 2013

20 SCJ1320 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013

21 SCJ1321 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

Twitter Stream

22 SCJ1222 A Stochastic Model of Multi-virus Dynamics 2012

23 SCJ1223 Design and Implementation of TARF: A Trust-Aware Routing Framework for

WSNs 2012

24 SCJ1224 Detecting and Resolving Firewall Policy Anomalies 2012

25 SCJ1225 Detecting Spam Zombies by Monitoring Outgoing Messages 2012

26 SCJ1226 On the Security of a Ticket-Based Anonymity System with Traceability Property

in Wireless Mesh Networks 2012

27 SCJ1227 Online Modeling of Proactive Moderation System for Auction Fraud Detection 2012

28 SCJ1228 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012

29 SCJ1229 Risk-Aware Mitigation for MANET Routing Attacks 2012

30 SCJ1230 Bootstrapping Ontologies for Web Services 2012

31 SCJ1231 DoubleGuard: Detecting Intrusions in Multitier Web Applications 2012

IMAGE PROCESSING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 IPJ1501 An Attribute-Assisted Reranking Model for Web Image Search 2015

2 IPJ1502 EMR: A Scalable Graph-based Ranking Model for Content-based Image

Retrieval 2015

3 IPJ1503 Learning to Rank Image Tags With Limited Training Examples 2015

4 IPJ1204 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2012

5 IPJ1205 Improving Various Reversible Data Hiding Schemes Via Optimal Codes for

Binary Covers 2012

6 IPJ1206 Scalable Coding of Encrypted Images 2012

7 IPJ1207 Handwritten Chinese Text Recognition by Integrating Multiple Contexts 2012

8 IPJ1208 Adaptive Membership Functions for Hand-Written Character Recognition by

Voronoi-based Image Zoning 2012

9 IPJ1209 A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

MOBILE COMPUTING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 MCJ1501 Dynamic Routing for Data Integrity and Delay Differentiated Services in

Wireless Sensor Networks 2015

2 MCJ1502 Friendbook: A Semantic-Based Friend Recommendation System for Social

Networks 2015

3 MCJ1503 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in

Wireless Ad Hoc Networks 2015

4 MCJ1504 User-Defined Privacy Grid System for Continuous Location-Based Services 2015

5 MCJ1405 An Incentive Framework for Cellular Traffic Offloading 2014

6 MCJ1406 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014

7 MCJ1407 Efficient Authentication for Mobile and Pervasive Computing 2014

8 MCJ1408 Friendbook: A Semantic-based Friend Recommendation System for Social

Networks 2014

9 MCJ1409 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous

Devices 2014

10 MCJ1310 Content Sharing over Smartphone-Based Delay-Tolerant Networks 2013

11 MCJ1311 DCIM: Distributed Cache Invalidation Method for Maintaining Cache

Consistency in Wireless Mobile Networks 2013

12 MCJ1312 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 2013

13 MCJ1313 Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-

Period Mobile Users 2013

14 MCJ1214 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012

15 MCJ1215 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 2012

16 MCJ1216 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions

over Wireless Networks 2012

17 MCJ1217 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees 2012

18 MCJ1218 A Trigger Identification Service for Defending Reactive Jammers in WSN 2012

19 MCJ1219 Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number

of Transmissions 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

SERIVCE COMPUTING SOA (WEB SERVICE)

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 SRJ1501 Designing High Performance Web-Based Computing Services to Promote

Telemedicine Database Management System 2015

2 SRJ1502 Location-Aware and Personalized Collaborative Filtering for Web Service

Recommendation 2015

3 SRJ1403 Privacy-Enhanced Web Service Composition 2014

4 SRJ1404 Web Service Recommendation via Exploiting Location and QoS Information 2014

5 SRJ1305 A Decentralized Service Discovery Approach on Peer-to-Peer Networks 2013

6 SRJ1306 Personalized QoS-Aware Web Service Recommendation and Visualization 2013

7 SRJ1307 Privacy-Enhanced Web Service Composition 2013

8 SRJ1208 Bootstrapping Ontologies for Web Services 2012

INFORMATION FORENSICS AND SECURITY

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 IFJ1501 A Framework for Secure Computations with Two Non-Colluding Servers and

Multiple Clients, Applied to Recommendations 2015

2 IFJ1502 Effective Key Management in Dynamic Wireless Sensor Networks 2015

3 IFJ1503 Key Updating for Leakage Resiliency with Application to AES Modes of

Operation 2015

4 IFJ1504 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path

Backscatter 2015

5 IFJ1505 Software Puzzle: A Countermeasure to Resource-Inflated Denialof- Service

Attacks 2015

PATTERN ANALYSIS AND MACHINE INTELLIGENCE

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 PAJ1301 A Framework for Mining Signatures from Event Sequences and Its Applications

in Healthcare Data 2013

SOFTWARE ENGINEERING

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 SEJ1101 Invariant-Based Automatic Testing of Modern Web Applications 2011

2 SEJ1302 Whole Test Suite Generation 2013

MULTIMEDIA

S.NO PROJECT

CODE TITLE OF THE PAPER YEAR

1 MMJ1201 Learn to Personalized Image Search from the Photo Sharing Websites 2012

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

FINAL YEAR PROJECTS

IEEE PROJECTS 2015 – 2016

HADOOP PROJECTS S.NO

PROJECT CODE

TITLE OF THE PAPER YEAR

1 HA1501 An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm

2015

2 HA1502 DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors 2015

3 HA1503 Hadoop Recognition of Biomedical Named Entity Using Conditional Random Fields

2015

4 HA1504 Real-Time Big Data Analytical Architecture for Remote Sensing Application 2015

5 HA1505 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters

2015

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

FINAL YEAR PROJECTS

IEEE PROJECTS 2015 – 2016

NS2 PROJECTS NETWORK SIMULATOR

S.NO PROJECT

CODE TITLE OF THE PAPER DOMAIN YEAR

1 NS1501 A Historical-Beacon-Aided Localization Algorithm for

Mobile Sensor Networks MANET 2015

2 NS1502 CoCoWa: A Collaborative Contact-Based Watchdog for

Detecting Selfish Nodes MANET 2015

3 NS1503 Cooperative Load Balancing and Dynamic Channel

Allocation for Cluster-Based Mobile Ad Hoc Networks MANET 2015

4 NS1504

Defending Against Collaborative Attacks by Malicious

Nodes in MANETs: A Cooperative Bait Detection

Approach

MANET 2015

5 NS1505 Minimizing Transmission Cost for Third-Party

Information Exchange with Network Coding MANET 2015

6 NS1506

Mobile-Projected Trajectory Algorithm with Velocity-

Change Detection for Predicting Residual Link Lifetime in

MANET

MANET 2015

7 NS1507 Optimal Configuration of Network Coding in Ad Hoc

Networks MANET 2015

8 NS1508 Packet Delivery Ratio/Cost in MANETs with Erasure

Coding and Packet Replication MANET 2015

9 NS1509 Privacy and Quality Preserving Multimedia Data

Aggregation for Participatory Sensing Systems MANET 2015

10 NS1510 Privacy-Preserving and Truthful Detection of Packet MANET 2015

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

Dropping Attacks in Wireless Ad Hoc Networks

11 NS1511 User Privacy and Data Trustworthiness in Mobile Crowd

Sensing MANET 2015

12 NS1512 A Virtual Coordinate-Based Bypassing Void Routing for

WSN WSN (Routing) 2015

13 NS1513 Adaptive Routing for Dynamic On-Body WSN WSN (Routing) 2015

14 NS1514 An Energy Efficient Cross-Layer Network Operation

Model for IEEE 802.15.4-Based Mobile WSN WSN (Routing) 2015

15 NS1515 Cost-Aware SEcure Routing (CASER) Protocol Design for

WSN WSN (Routing) 2015

16 NS1516 Efficient Coverage and Connectivity Preservation With

Load Balance for WSN WSN (Routing) 2015

17 NS1517 Geographic Routing in Clustered WSN Among Obstacles WSN (Routing) 2015

18 NS1518 Impact of Limiting Hop Count on the Lifetime of WSN WSN (Routing) 2015

19 NS1519 Joint Cooperative Routing and Power Allocation for

Collision Minimization in WSN With Multiple Flows WSN (Routing) 2015

20 NS1520 Joint Virtual MIMO and Data Gathering for WSN WSN (Routing) 2015

21 NS1521 Mobile Data Gathering with Load Balanced Clustering

and Dual Data Uploading in Wireless Sensor Networks WSN (Routing) 2015

22 NS1522 Opportunistic Routing Algorithm for Relay Node

Selection in WSN WSN (Routing) 2015

23 NS1523 PWDGR: Pair-Wise Directional Geographical Routing

Based on Wireless Sensor Network WSN (Routing) 2015

24 NS1524 Time-Sensitive Utility-Based Single-Copy Routing in Low-

Duty-Cycle WSN WSN (Routing) 2015

25 NS1525 VGDRA: A Virtual Grid-Based Dynamic Routes

Adjustment Scheme for Mobile Sink-Based WSN WSN (Routing) 2015

26 NS1526

A Lightweight Secure Scheme for Detecting Provenance

Forgery and Packet Drop Attacks in Wireless Sensor

Networks

WSN (Routing) 2015

27 NS1527 A Secure Scheme Against Power Exhausting Attacks in

Hierarchical Wireless Sensor Networks WSN (Routing) 2015

28 NS1528 An Efficient Distributed Trust Model for Wireless Sensor

Networks WSN (Routing) 2015

29 NS1529 An Encryption Scheme Using Chaotic Map and Genetic

Operations for Wireless Sensor Networks WSN (Routing) 2015

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

30 NS1530 Effective Key Management in Dynamic Wireless Sensor

Networks WSN (Routing) 2015

31 NS1531 Secure and Distributed Data Discovery and

Dissemination in Wireless Sensor Networks WSN (Routing) 2015

32 NS1532 Toward Energy-Efficient Trust System Through

Watchdog Optimization for WSNs WSN (Routing) 2015

33 NS1533 A Novel PER Degradation Model for VANETs VANET 2015

34 NS1534

ACPN: A Novel Authentication Framework with

Conditional Privacy-Preservation and Non-Repudiation

for VANETs

VANET 2015

35 NS1535 BUS-VANET: A BUS Vehicular Network Integrated with

Traffic Infrastructure VANET 2015

36 NS1536 Real-Time Path Planning Based on Hybrid-VANET-

Enhanced Transportation System VANET 2015

37 NS1537 VANET Modeling and Clustering Design Under Practical

Traffic,Channel and Mobility Conditions VANET 2015

38 NS1538 Defeating Jamming With the Power of Silence: A Game-

Theoretic Analysis

WIRELESS

COMMUNICATI

ONS

2015

39 NS1539 Passive IP Traceback: Disclosing the Locations of IP

Spoofers from Path Backscatter

INFORMATION

FORENSICS AND

SECURITY

2015

40 NS1540 Time-Delayed Broadcasting for Defeating Inside

Jammers

SECURE

COMPUTING 2015

41 NS1541 Secure Data Aggregation Technique for Wireless Sensor

Networks in the Presence of Collusion Attacks

SECURE

COMPUTING 2015

42 NS1442 A QoS-Oriented Distributed Routing Protocol for Hybrid

Wireless Networks

MOBILE

COMPUTING 2014

43 NS1443 A Study on False Channel Condition Reporting Attacks in

Wireless Networks

MOBILE

COMPUTING 2014

44 NS1444 Autonomous Mobile Mesh Networks MOBILE

COMPUTING 2014

45 NS1445 Optimal Multicast Capacity and Delay Tradeoffs in

MANETs

MOBILE

COMPUTING 2014

46 NS1446 RBTP: Low-Power Mobile Discovery Protocol through

Recursive Binary Time Partitioning

MOBILE

COMPUTING 2014

47 NS1447 Snapshot and Continuous Data Collection in MOBILE 2014

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

Probabilistic Wireless Sensor Networks COMPUTING

48 NS1448 ALBA-R: Load-Balancing Geographic Routing Around

Connectivity Holes in Wireless Sensor Networks

PARALLEL &

DISTRIBUTED

SYSTEMS

2014

49 NS1449 Hop-by-Hop Message Authentication and Source Privacy

in Wireless Sensor Networks

PARALLEL &

DISTRIBUTED

SYSTEMS

2014

50 NS1450 Neighbor Table Based Shortcut Tree Routing in ZigBee

Wireless Networks

PARALLEL &

DISTRIBUTED

SYSTEMS

2014

51 NS1451 Secure and Efficient Data Transmission for Cluster-Based

Wireless Sensor Networks

PARALLEL &

DISTRIBUTED

SYSTEMS

2014

52 NS1452 Secure Continuous Aggregation in Wireless Sensor

Networks

PARALLEL &

DISTRIBUTED

SYSTEMS

2014

53 NS1453 Transmission-Efficient Clustering Method for Wireless

Sensor Networks Using Compressive Sensing

PARALLEL &

DISTRIBUTED

SYSTEMS

2014

54 NS1454 An Energy-Balanced Routing Method Based on Forward-

Aware Factor for Wireless Sensor Networks

INDUSTRIAL

INFORMATICS 2014

55 NS1455 Distributed Deployment Algorithms for Improved

Coverage in a Network of Wireless Mobile Sensors

INDUSTRIAL

INFORMATICS 2014

56 NS1456 R3E: Reliable Reactive Routing Enhancement for

Wireless Sensor Networks

INDUSTRIAL

INFORMATICS 2014

57 NS1457 Sleep Scheduling for Geographic Routing in Duty-Cycled

Mobile Sensor Networks

INDUSTRIAL

INFORMATICS 2014

58 NS1458 AASR: An Authenticated Anonymous Secure Routing

Protocol for MANETs in Adversarial Environment

VEHICULAR

TECHNOLOGY 2014

59 NS1459 PSR: A Lightweight Proactive Source Routing Protocol

For Mobile Ad Hoc Networks

VEHICULAR

TECHNOLOGY 2014

60 NS1460 VSPN: VANET-Based Secure and Privacy-Preserving

Navigation

VEHICULAR

TECHNOLOGY 2014

61 NS1461 Joint Routing and Medium Access Control in Fixed

Random Access Wireless Multihop Networks NETWORKING 2014

62 NS1462 Defending Against Collaborative Attacks by Malicious

Nodes in MANETs: A Cooperative Bait Detection MANET 2014

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

Approach

63 NS1463 STARS: A Statistical Traffic Pattern Discovery System for

MANETs MANET 2014

64 NS1464 Data Density Correlation Degree Clustering Method for

Data Aggregation in WSN WSN 2014

65 NS1365 An Efficient and Robust Addressing Protocol for Node

Auto-configuration in Ad Hoc Networks NETWORKING 2013

66 NS1366 Back-Pressure-Based Packet-by-Packet Adaptive Routing

in Communication Networks NETWORKING 2013

67 NS1367 Efficient Algorithms for Neighbor Discovery in Wireless

Networks NETWORKING 2013

68 NS1368 Enhanced OLSR for Defense against DOS Attack in Ad

Hoc Networks NETWORKING 2013

69 NS1369 Opportunistic MANETs: Mobility Can Make Up for Low

Transmission Power NETWORKING 2013

70 NS1370 A Rank Correlation Based Detection against Distributed

Reflection DoS Attacks

NETWORK

SECURITY 2013

71 NS1371 Adaptive Position Update for Geographic Routing in

Mobile Ad Hoc Networks

MOBILE

COMPUTING 2013

72 NS1372 ALERT: An Anonymous Location-Based Efficient Routing

Protocol in MANETs

MOBILE

COMPUTING 2013

73 NS1373

DCIM: Distributed Cache Invalidation Method for

Maintaining Cache Consistency in Wireless Mobile

Networks

MOBILE

COMPUTING 2013

74 NS1374 Discovery and Verification of Neighbor Positions in

Mobile Ad Hoc Networks

MOBILE

COMPUTING 2013

75 NS1375 Distributed Cooperative Caching in Social Wireless

Networks

MOBILE

COMPUTING 2013

76 NS1376 EAACK—A Secure Intrusion-Detection System for

MANETs

MOBILE

COMPUTING 2013

77 NS1377 Optimal Multicast Capacity and Delay Tradeoffs in

MANETs

MOBILE

COMPUTING 2013

78 NS1378 Proteus: Multiflow Diversity Routing for Wireless

Networks with Cooperative Transmissions

MOBILE

COMPUTING 2013

79 NS1379 Target Tracking and Mobile Sensor Navigation in

Wireless Sensor Networks

MOBILE

COMPUTING 2013

80 NS1380 Toward a Statistical Framework for Source Anonymity in MOBILE 2013

Contact: 8870006111, 9952590305 Email ID: [email protected]

www.idolph.com

746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006

Sensor Networks COMPUTING

81 NS1381 BAHG: Back-Bone-Assisted Hop Greedy Routing for

VANETs City Environments

INTELLIGENT

TRANSPORTATI

ON SYSTEMS

2013