IEEE-12-13 PFY

18
www.projectsforyou.co.in Projects for You IEEE 2012-2013 ME/ M-TECH CSE Projects

description

dfgdgdfgdfgdfgdfg

Transcript of IEEE-12-13 PFY

www.projectsforyou.co.in

Projects for You

IEEE 2012-2013 ME/ M-TECH – CSE Projects

IEEE Projects (2012-13)

2 | P a g e

Code Title Tech Domain

PFYBP 1 Cloud Computing Security: From Single to Multi-Clouds JAVA Cloud Computing

PFYBP 2 Cloud Data Protection for the Masses JAVA Cloud Computing

PFYBP 3 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud

Storage JAVA Cloud Computing

PFYBP 4 Costing of Cloud Computing Services A Total Cost of Ownership Approach JAVA Cloud Computing

PFYBP 5 Efficient audit service outsourcing for data integrity in clouds DOTNET Cloud Computing

PFYBP 6 Fog Computing Mitigating Insider Data Theft Attacks in the Cloud JAVA Cloud Computing

PFYBP 7 Gossip-based Resource Management for Cloud Environments JAVA Cloud Computing

PFYBP 8 Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing DOTNET Cloud Computing

PFYBP 9 Ensuring Distributed Accountability for Data Sharing in the Cloud JAVA Cloud Computing

PFYBP 10 Reliable Re-Encryption In Unreliable Clouds JAVA Cloud Computing

PFYBP 11 Scalable and Secure Sharing of Personal Health Records in Cloud Computing

using Attribute-based Encryption DOTNET Cloud Computing

IEEE Projects (2012-13)

3 | P a g e

PFYBP 12 Preserving Integrity of Data and Public Auditing for Data Storage in Cloud

Computing DOTNET Cloud Computing

PFYBP 13 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud

Data DOTNET Cloud Computing

PFYBP 14 Towards Secure and Dependable Storage Services in Cloud Computing DOTNET Cloud Computing

PFYBP 15 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor

Networks DOTNET Image Processing

PFYBP 16 DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY

USING PERSUASIVE CLICK POINTS DOTNET Image Processing

PFYBP 17 Exploring The Design Space Of Social Network-Based Sybil Defenses DOTNET Image Processing

PFYBP 18 Separable Reversible Data Hiding in Encrypted Image DOTNET Image Processing

PFYBP 19 Intent Search Capturing User Intention For One Click Internet Image Search DOTNET Image Processing

PFYBP 20 Robust Face-Name Graph Matching for Movie Character Identify DOTNET Image Processing

PFYBP 21 Robust Watermarking Of Compressed And Encrypted Jpeg2000 Images DOTNET Image Processing

PFYBP 22 Semi Supervised Biased Maximum Margin Analysis for Interactive Image

Retrieval DOTNET Image Processing

PFYBP 23 User Aware Image Tag Refinement Via Ternary Semantic Analysis DOTNET Image Processing

IEEE Projects (2012-13)

4 | P a g e

PFYBP 24 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-

hoc Network JAVA

International

Conference

PFYBP 25 Association Rule -- Extracting Knowledge Using Market Basket Analysis DOTNET International

Conference

PFYBP 26 Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless

Sensor Networks DOTNET

International

Conference

PFYBP 27 Hiding Sensitive Association Rule For Privacy Preservation DOTNET International

Conference

PFYBP 28 Efficient load balancing and QoS-based location aware service discovery

protocol for vehicular ad hoc networks DOTNET

International

Conference

PFYBP 29 Movie Rating and Review Summarization in Mobile Environment JAVA International

Conference

PFYBP 30 Intrusion Detection SystPFYBP as a Service in Public Clouds JAVA International

Conference

PFYBP 31 DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage

Systems. JAVA

International

Conference

PFYBP 32 Detecting and Validating Sybil Groups in the Wild DOTNET International

Conference

PFYBP 33 A Query Formulation Language for the data web DOTNET Knowledge & Data

Engineering (DATA

IEEE Projects (2012-13)

5 | P a g e

PFYBP 38 Bridging Social and Data Networks DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 39 Confucius A Tool Supporting Collaborative Scientific Workflow Composition JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 40 Effective Pattern Discovery For Text Mining JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 41 Efficient and Accurate Discovery of Patterns in Sequence Data Sets DOTNET Knowledge & Data

MINING)

PFYBP 34 Advance Mining Of Temporal High Utility Item BP set JAVA

Knowledge & Data

Engineering (DATA

MINING)

PFYBP 35 An Exploration Of Improving Collaborative Recommender System BP Via User-

Item BP Subgroups JAVA

Knowledge & Data

Engineering (DATA

MINING)

PFYBP 36 Anomaly Detection For Discrete Sequences A Survey JAVA

Knowledge & Data

Engineering (DATA

MINING)

PFYBP 37 Automatic Discovery of Association Orders between Name and Aliases JAVA

Knowledge & Data

Engineering (DATA

MINING)

IEEE Projects (2012-13)

6 | P a g e

Engineering (DATA MINING)

PFYBP 42 A Framework for Personal Mobile Commerce Pattern Mining and Prediction JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 43 Efficient Anonymous Message Submission JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 44 Efficient Computation of Range Aggregates against Uncertain Location Based Queries

JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 45 Efficient Extended Boolean Retrieval JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 46 Efficient Similarity Search Over Encrypted Data JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 47 Enabling Multilevel Trust In Privacy Preserving Data Mining JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 48 Fast and accurate annotation of short texts with Wikipedia JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 49 Identifying Content for Planned Events Across Social Media Sites DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 50 Investigation And Analysis Is Of New Approach Of Intelligent Semantic Web Search Engines

JAVA Knowledge & Data Engineering (DATA MINING)

IEEE Projects (2012-13)

7 | P a g e

PFYBP 51 Multiparty Access Control for Online Social Networks Model and Mechanisms JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 52 On the Spectral Characterization and Scalable Mining of Network Communities JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 53 Organizing User Search Histories JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 54 Outsourced Similarity Search on Metric Data Assets DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 55 Mining Web Graphs for Recommendations DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 56 Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 57 Joint Top-K Spatial Keyword Query Processing DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 58 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 59 Ranking Model Adaptation for Domain-Specific Search JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 60 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

DOTNET Knowledge & Data Engineering (DATA MINING)

IEEE Projects (2012-13)

8 | P a g e

PFYBP 61 Altered Fingerprints: Analysis and Detection DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 62 Generative Models for Item Adoptions Using Social Correlation DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 63 Scalable Learning of Collective Behavior DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 64 Scalable Scheduling Of Updates In Streaming Data Warehouses DOTNET Knowledge & Data Engineering (DATA MINING)

PFYBP 65 Sequential Anomaly Detection In The Presence Of Noise And Limited Feedback JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 66 Slicing A New Approach to Privacy Preserving Data Publishing JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 67 Statistical Entity Extraction from Web JAVA Knowledge & Data Engineering (DATA MINING)

PFYBP 68 Cooperative download in vehicular environments DOTNET Mobile Computing

PFYBP 69 Hop-By-Hop Routing In Wireless Mesh Networks With Bandwidth Guarantees DOTNET Mobile Computing

PFYBP 70 Fast Data Collection in Tree-Based Wireless Sensor Networks JAVA Mobile Computing

PFYBP 71 Local Broadcast Algorithms In Wireless Ad Hoc Networks Reducing The Number Of Transmissions

DOTNET Mobile Computing

PFYBP 72 Network Assisted Mobile Computing with Optimal Uplink Query Processing DOTNET Mobile Computing

PFYBP 73 Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper JAVA Mobile Computing

PFYBP 74 Learn to Personalized Image Search from the Photo Sharing Websites JAVA Multimedia

IEEE Projects (2012-13)

9 | P a g e

PFYBP 75 Trust modeling in social tagging of multimedia content JAVA Multimedia

PFYBP 76 A New Cell-Counting-Based Attack Against Tor DOTNET Networking

PFYBP 77 An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System JAVA Networking

PFYBP 78 Game-Theoretic Pricing for Video Streaming in Mobile Networks JAVA Networking

PFYBP 79 Load Balancing Multipath Switching SystPFYBP with Flow Slice DOTNET Networking

PFYBP 80 Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks Theory and Algorithms

DOTNET Networking

PFYBP 81 Assessing the Veracity of Identity Assertions via OSNs DOTNET Networking

PFYBP 82 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization JAVA Networking

PFYBP 83 Policy-by-Example for Online Social Networks JAVA Networking

PFYBP 84 Privacy- and Integrity-Preserving Range Queries in Sensor Networks JAVA Networking

PFYBP 85 Security Architecture for Cloud Networking JAVA Networking

PFYBP 86 View-invariant action recognition based on Artificial DOTNET Networking

PFYBP 87 Packet Loss Control Using Tokens at the Network Edge JAVA Networking

PFYBP 88 A Novel Anti-phishing Framework Based On Visual Cryptography DOTNET Parallel and Distributed Systems

PFYBP 89 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs DOTNET Parallel and Distributed Systems

PFYBP 90 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

DOTNET Parallel and Distributed Systems

PFYBP 91 In Cloud, Can Scientific Communities Benefit from the Economies of Scale? DOTNET Parallel and Distributed Systems

PFYBP 92 Resource-Aware Application State Monitoring DOTNET Parallel and Distributed Systems

PFYBP 93 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

DOTNET Parallel and Distributed Systems

PFYBP 94 Automatic Reconfiguration for Large-Scale Reliable Storage Systems DOTNET Secured Computing

PFYBP 95 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs DOTNET Secured Computing

PFYBP 96 A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group DOTNET Secured Computing

IEEE Projects (2012-13)

10 | P a g e

PFYBP 97 Fade Secure Title Overlay Cloud Storage With File Assured Deletion JAVA Secured Computing

IEEE Projects (2012-13)

11 | P a g e

PFYBP 98 Fast Matrix Embedding by Matrix Extending DOTNET Secured Computing

PFYBP 99 Joint Relay and Jammer Selection for Secure Two-Way Relay Networks DOTNET Secured Computing

PFYBP 100 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching DOTNET Secured Computing

PFYBP 101 Recommendation Models for Open Authorization DOTNET Secured Computing

PFYBP 102 Online Modeling of Proactive Moderation SystPFYBP for Auction Fraud Detection JAVA Secured Computing

PFYBP 103 Double Guard: Detecting Intrusions In Multi-tier Web Applications JAVA Secured Computing

PFYBP 104 Packet-Hiding Methods for Preventing Selective Jamming Attacks JAVA Secured Computing

PFYBP 105 Persuasive Cued Click-Points Design, Implementation And Evaluation JAVA Secured Computing

PFYBP 106 Remote Attestation With Domain -Based Integrity Model And Privacy Analysis JAVA Secured Computing

PFYBP 107 Risk-Aware Mitigation for MANET Routing Attacks JAVA Secured Computing

PFYBP 108 Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems.

JAVA Secured Computing

PFYBP 109 Expert Discovery and Interactions in Mixed Service-Oriented Systems DOTNET Service Computing(SOA)

PFYBP 110 Query Access Assurance in Outsourced Databases DOTNET Service Computing(SOA)

PFYBP 111 Dynamic Authentication for Cross-Realm SOA-Based Business Processes DOTNET Service Computing(SOA)

PFYBP 112 PerLa a Language and Middleware Architecture JAVA Software Engineering

PFYBP 113 Measuring Code Quality to Improve Specification Mining DOTNET Software Engineering

PFYBP 114 AMPLE An Adaptive Traffic Engineering SystPFYBP Based on Virtual Routing Topologies

DOTNET Wireless Communications

PFYBP 115 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks JAVA Wireless Communications

PFYBP 116 Cooperative Data Dissemination via Roadside WLANs DOTNET Wireless Communications

PFYBP 117 Cut Detection in Wireless Sensor Networks JAVA Wireless Communications

PFYBP 118 Topology Control in Mobile Ad Hoc Networks with Cooperative Communications DOTNET Wireless Comm.

IEEE Projects (2012-13)

12 | P a g e

PFYWY 1 Reliable Re-Encryption in Unreliable Clouds` Java Cloud Computing

PFYWY 2 Costing of Cloud Computing Services: A Total Cost of Ownership Approach Java Cloud Computing

PFYWY 3 Ensuring Distributed Accountability for Data Sharing in the Cloud Java Cloud Computing

PFYWY 4 Cloud Data Production for Masses Java Cloud Computing

PFYWY 5 A secure erasure code based cloud storage system with secure data forwarding Java Secure Computing

PFYWY 6 Policy-by-Example for Online Social Networks Java Networking

PFYWY 7 Packet-Hiding Methods for Preventing Selective Jamming Attacks Java Secure Computing

PFYWY 8 FADE: Secure Overlay Cloud Storage with File Assured Deletion Java Secure Computing

PFYWY 9 Risk-Aware Mitigation for MANET Routing Attacks Java Secure Computing

PFYWY 10 Learn to Personalized Image Search from the Photo Sharing Websites Java Multimedia

PFYWY 11 Organizing User Search Histories Java Knowledge and Data Engineering

PFYWY 12 Slicing A New Approach to Privacy Preserving+C39Data Publishing Java Knowledge and Data Engineering

IEEE Projects (2012-13)

13 | P a g e

PFYWY 13 Ranking Model Adaptation FOR DOMAIN-SPECIFIC SEARCH Java Knowledge and Data Engineering

PFYWY 14 Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Java Parallel and Distributed Systems

PFYWY 15 Trust modeling in social tagging of multimedia content Java Multimedia

PFYWY 16 RIHT: A novel hybrid IP trace back scheme Java Multimedia

PFYWY 17 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks Java Wireless Communications

PFYWY 18 Cut Detection in Wireless Sensor Networks Java Wireless Communications

PFYWY 19 Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences

Java International Conference (science)

PFYWY 20 Efficient Computation of Range Aggregates against Uncertain Location Based Queries

Java International Conference

PFYWY 21 Statistical Entity Extraction from Web Java International Conference

PFYWY 22 Efficient Similarity Search over Encrypted Data Java International Conference (science)

PFYWY 23 Scalable and cost-effective interconnection of data-center servers using dual server ports

Java Networking

PFYWY 24 Caching Strategies Based on Information Density Estimation in Wireless Adhoc Java Networking

IEEE Projects (2012-13)

14 | P a g e

Networks

PFYWY 25 Modeling and Detection of Camouflaging Worm Java Networking

PFYWY 26 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Java Networking

PFYWY 27 Clustering with Multi-Viewpoint based Similarity Measure Java Networking

PFYWY 28 Sketch4Match – Content-based Image Retrieval system using sketches Java Image Processing

PFYWY 29 Embedded Extended Visual Cryptography Schemes Java Secure Computing

PFYWY 30 Competitive Study of Cryptography techniques over block Cipher Java Secure Computing

PFYWY 31 Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations

Java Knowledge and Data Engineering

PFYWY 32 Architecting a secure enterprise data sharing Environment to the edge Java Secure Computing

PFYWY 33 Analysis on Credit Card Fraud Detection Methods Java Secure Computing

PFYWY 34 Subspace-Based Striping Noise Reduction in Hyper spectral Images Java Image Processing

PFYWY 35 Intrusion detection An Energy efficient approach in Heterogeneous WSN Java Secure Computing

IEEE Projects (2012-13)

15 | P a g e

PFYWY 36 Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service

Java Networking

PFYWY 37 Geographical Routing With Location Service in Intermittently Connected MANETs Java Networking

PFYWY 38 Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation

Java Networking

PFYWY 39 On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents

Java Networking

PFYWY 40 Mobile Sampling of Sensor Field Data Using Controlled Broadcast Java Networking

PFYWY 41 Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization

Java Networking

PFYWY 42 Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing

Java Cloud Computing

PFYWY 43 A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

Java Networking

PFYWY 44 Robust Face-Name Graph Matching for Movie Character Identification Dot Net Multimedia

PFYWY 45 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Dot Net Cloud Computing

PFYWY 46 Topology Control in Mobile Ad Hoc Networks with Cooperative Communications Dot Net Wireless Communications

IEEE Projects (2012-13)

16 | P a g e

PFYWY 47 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies Dot Net Wireless Communications

PFYWY 48 Efficient Audit Service Outsourcing for Data Integrity in Clouds Dot Net Cloud Computing

PFYWY 49 View-invariant action recognition based on Artificial Neural Networks Dot Net Neural Networks

PFYWY 50 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Dot Net Image Processing

PFYWY 51 Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Dot Net Cloud Computing

PFYWY 52 Scalable Scheduling of Updates in Streaming Data Warehouses Dot Net Knowledge and Data Engineering (DM)

PFYWY 53 Efficient and Discovery of Patterns in Sequence Data Sets Dot Net Knowledge and Data Engineering (DM)

PFYWY 54 Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. Dot Net Networking

PFYWY 55 Investigation and Analysis of New Approach of Intelligent Semantic Web Search engines. Dot Net

Parallel and Distributed Systems

PFYWY 56 Data Integrity Proofs In Cloud Storage Dot Net Cloud Computing

PFYWY 57 A Personalized Ontology Model For Web Information Gathering Dot Net Data Mining

IEEE Projects (2012-13)

17 | P a g e

PFYWY 58 A Query Formulation Language for the Data Web Dot Net Data Mining

PFYWY 59 A Web Search Engine Based Approach to Measure Semantic Similarity Between Words

Dot Net Data Mining

PFYWY 60 Adaptive Provisioning Of Human Expertise In Service-Oriented Systems Dot Net Data Mining

PFYWY 61 Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems

Dot Net Data Mining

PFYWY 62 Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud

Dot Net Data Mining

PFYWY 63 Exploring Application-Level Semantics For Data Compression Dot Net Data Mining

PFYWY 64 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Dot Net Data Mining

PFYWY 65 One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases

Dot Net Data Mining

PFYWY 66 Optimal Service Pricing For A Cloud Cache Dot Net Data Mining

PFYWY 67 Publishing Search Logs – A Comparative Study Of Privacy Guarantees Dot Net Data Mining

PFYWY 68 Fuzzy-Zoning-Based Classification for Handwritten Characters Dot Net Fuzzy Systems

IEEE Projects (2012-13)

18 | P a g e

PFYWY 69 Adaptive Spectral Transform for Wavelet-Based Color Image Compression Dot Net Image Processing

PFYWY 70 Blind Image Watermarking Using a Sample Projection Approach Dot Net Information forensics And Security

PFYWY 71 Histogram Specification: A Fast and Flexible Method to Process Digital Images Dot Net Instrumentation And Measurement

PFYWY 72 Mining Web Graphs for Recommendations Dot Net Knowledge And Data Engineering

PFYWY 73 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

Dot Net Knowledge And Data Engineering

PFYWY 74 Scalable Learning of Collective Behavior Dot Net Knowledge And Data Engineering

PFYWY 75 Bridging Socially-Enhanced Virtual Communities Dot Net Networking

PFYWY 76 Unified Approach To Optimizing Performance in Networks Serving Heterogeneous Flows

Dot Net Networking

PFYWY 77 A More Secure Steganography Method in Spatial Domain Dot Net Secure Computing

PFYWY 78 NABS Novel Approaches for Biometric Systems Dot Net Secure Computing