projects for engineering and diploma students - TopicsExpress



          

projects for engineering and diploma students JAVA S.NO CODE PROJECT TITLES DOMAIN 1 IQDJ1301 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing 2 IQDJ1302 Privacy-Preserving Public Auditing for Secure Cloud Storage 3 IQDJ1303 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 4 IQDJ1304 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 5 IQDJ1305 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 6 IQDJ1306 Qos Ranking Prediction for Cloud Services 7 IQDJ1307 A Truthful Dynamic Workflow Scheduling Mechanism for commercial Multicolor Environments 8 IQDJ1308 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 9 IQDJ1309 Security and Privacy Enhancing Multi-Cloud Architectures 10 IQDJ1310 Privacy Preserving Delegated Access Control in Public Clouds 11 IQDJ1311 An Adaptive Cloud Downloading Service 12 IQDJ1312 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data 13 IQDJ1313 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 14 IQDJ1314 HASBE A Hierarchical Attribute-Based Solution for Flexible and scalable access control in cloud computing 15 IQDJ1315 A Secure Erasure Code-Based Cloud Storage system with secure data forwarding 16 IQDJ1316 Ensuring Data Security in Cloud Computing 17 IQDJNW1301 Optimal Client-Server Assignment for Internet Distributed Systems Networking/Distributed & Parallel Systems 18 IQDJNW1302 Time Synchronization Based On Slow Flooding in Wireless Sensor Networks 19 IQDJNW1303 Distributed Cache Management in Information-Centric Networks 20 IQDJNW1304 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing 21 IQDJNW1305 A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 22 IQDJNW1306 A Novel Message Scheduling Framework for Delay Tolerant Networks Routing 23 IQDJNW1307 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 24 IQDJNW1308 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks 25 IQDJNW1309 Optimal Cache Timeout for Identifier-to-Locator Mappings with Handovers 26 IQDJNW1310 Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems 27 IQDJNW1311 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks 28 IQDJNW1312 ESM: Efficient and scalable data center multicast routing 29 IQDJNW1313 A Distributed Private-Key Generator for Identity-Based Cryptography 30 IQDJNW1314 Dynamic Routing With Security Consideration 31 IQDJNS1301 WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream Network Security/Secure Computing 32 IQDJNS1302 SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems 33 IQDJNS1303 SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks 34 IQDJNS1304 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 35 IQDJNS1305 EAACK—A Secure Intrusion-Detection System for MANETs 36 IQDJNS1306 Discovery and Resolution of Anomalies in Web Access Control Policies 37 IQDJNS1307 To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks 38 IQDJNS1308 Authorization Control for a Semantic Data Repository through an Inference Policy Engine 39 IQDJNS1309 On Insider Misbehavior Detection in Cognitive Radio Networks 40 IQDJNS1310 Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks 41 IQDJNS1311 A large-scale study of the time required to compromise a computer system 42 IQDJNS1312 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network System 42 IQDJNS1313 Revisiting Defenses Against Large-Scale Online Password Guessing Attacks 43 IQDJNS1314 Recommendation Models for Open Authorization 44 IQDJNS1315 On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks 45 IQDJDM1301 TACI: Taxonomy-Aware Catalog Integration Data Mining & Knowledge Engineering 46 IQDJDM1302 OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage 47 IQDJDM1303 FAST: A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data 48 IQDJDM1304 Protecting Sensitive Labels in Social Network Data Anonymization 49 IQDJDM1305 Web-page Recommendation based on Web Usage and Domain Knowledge 50 IQDJDM1306 Security evaluation of pattern classifiers under attack 51 IQDJDM1307 A Formal Usability Constraints Model for Watermarking of Outsourced Datasets 52 IQDJDM1308 Collaborative Policy Administration 53 IQDJDM1309 m-Privacy for Collaborative Data Publishing 54 IQDJDM1310 Spatial Query Integrity with Voronoi Neighbors 55 IQDJDM1311 Semi-Supervised Heterogeneous Fusion for Multimedia Data Co-clustering 56 IQDJDM1312 Multiparty Access Control for Online Social Networks: Model and Mechanisms 57 IQDJDM1313 A New Algorithm for Inferring User Search Goals with Feedback Sessions 58 IQDJDM1314 Annotating Search Results from Web Databases 59 IQDJDM1315 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 60 IQDJDM1316 The Longitudinal Use of SaNDVis: Visual Social Network Analytics in the Enterprise 61 IQDJDM1317 Distributed Strategies for Mining Outliers in Large Data Sets 62 IQDJDM1318 A Probabilistic Approach to String Transformation 63 IQDJDM1319 A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 64 IQDJDM1320 Slicing: A New Approach to Privacy Preserving Data Publishing 65 IQDJDM1321 Adaptive Join Operators for Result Rate Optimization on Streaming Inputs 66 IQDJMC1301 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Mobile Computing 67 IQDJMC1302 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 68 IQDJMC1303 Content Sharing over Smartphone-Based Delay-Tolerant Networks 69 IQDJMC1304 Resource Allocation for QoS Support in Wireless Mesh Networks 70 IQDJMC1305 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 71 IQDJMC1306 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 72 IQDJMC1307 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 73 IQDJMC1308 On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments 74 IQDJIP1301 Objective-Guided Image Annotation Image Processing 75 IQDJIP1302 Gaussian Blurring-Invariant Comparison of Signals and Images 76 IQDJIP1303 Robust Document Image Binarization Technique for Degraded Document Images 77 IQDJIP1304 Enhancing Training Collections for Image Annotation: An Instance-Weighted Mixture Modeling Approach 78 IQDJIP1305 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage 79 IQDJIP1306 Circular Reranking for Visual Search 80 IQDJIP1307 A Hybrid Approach to Detect and Localize Texts in Natural Scene Images DOT NET S.NO CODE TITLES DOMAIN 1 DCC1301 Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud CLOUD COMPUTING 2 DCC1302 Attribute-Based Access To Scalable Media In Cloud-Assisted Content Sharing Networks 3 DCC1303 Privacy Preserving Public Auditing For Secure Cloud Storage 4 DCC1304 Enabling Dynamic Data And Indirect Mutual Trust For Cloud Computing Storage Systems 5 DCC1305 Privacy Preserving Delegated Access Control In Public Clouds 6 DCC1306 Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption 7 DCC1307 Security And Privacy Enhancing Multi-Cloud Architectures 8 DCC1308 Towards Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data 9 DCC1309 Qos Ranking Prediction For Cloud Services 10 DCC1310 Towards Trustworthy Resource Scheduling In Clouds 11 DCC1311 Cam: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 12 DCC1312 Optimal Multiserver Configuration For Profit Maximization In Cloud Computing 13 DCC1313 A Decentralized Self-Adaptation Mechanism For Service-Based Applications In The Cloud 14 DCC1314 Anchor: A Versatile And Efficient Framework For Resource Management 15 DCC1315 NICE: Network Intrusion Detection And Countermeasure Selection In Virtual CLOUD COMPUTING 16 DCC1316 Harnessing The Cloud For Securely Outsourcing Large-Scale Systems Of Linear Equations 17 DCC1317 Towards Differential Query Services In Cost-Efficient Clouds 18 DCC1318 A Privacy Leakage Upper Bound Constraint-Based Approach For Cost-Effective Privacy Preserving Of Intermediate Data Sets In Cloud 19 DCC1319 HASBE: A Hierarchical Attribute-Based Solution For Flexible And Scalable Access Control In Cloud Computing 20 DCC1320 A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding 21 DDM1301 A Fast Clustering-Based Feature Subset Selection Algorithm For High-Dimensional Data KNOWLEDGE AND DATA ENGINEERING \ DATA MINING 22 DDM1302 Multiparty Access Control For Online Social Networks- Model And Mechanisms 23 DDM1303 Two Tales Of Privacy In Online Social Networks 24 DDM1304 Web-Page Recommendation Based On Web Usage And Domain Knowledge 25 DDM1305 A New Algorithm For Inferring User Search Goals With Feedback Sessions 26 DDM1306 Security Evaluation Of Pattern Classifiers Under Attack 27 DDM1307 Dynamic Personalized Recommendation On Sparse Data 28 DDM1308 Anomaly Detection Via Online Oversampling Principal Component Analysis 29 DDM1309 M-Privacy For Collaborative Data Publishing 30 DDM1310 Crowdsourcing Predictors Of Behavioral Outcomes 31 DDM1311 Facilitating Document Annotation Using Content And Querying Value 32 DDM1312 A Survey Of XML Tree Patterns 33 DDM1313 Mining User Queries With Markov Chains: Application To Online Image Retrieval KNOWLEDGE AND DATA ENGINEERING \ DATA MINING 34 DDM1314 TrustedDB: A Trusted Hardware Based Database With Privacy And Data Confidentiality 35 DDM1315 Supporting Search-As-You-Type Using SQL In Databases 36 DDM1316 Clustering Uncertain Data Based On Probability Distribution Similarity 37 DDM1317 Secure Mining Of Association Rules In Horizontally Distributed Databases 38 DDM1318 Comparable Entity Mining From Comparative Questions 39 DDM1319 Annotating Search Results From Web Databases 40 DDM1320 OCCT: A One-Class Clustering Tree For Im+plementing One-To-Many Data Linkage 41 DDM1321 A Formal Usability Constraints Model For Watermarking Of Outsourced Datasets 42 DDM1322 Probabilistic Approach To String Transformation 43 DDM1323 Distributed Strategies For Mining Outliers In Large Data Sets 44 DDM1324 Active Trace Clustering For Improved Process Discovery 45 DDM1325 Slicing: A New Approach For Privacy Preserving Data Publishing 46 DDM1326 Ranking Model Adaptation For Domain-Specific Search 47 DDM1327 Efficient Fuzzy Type-Ahead Search In XML Data 48 DNW1301 Behavioral Malware Detection In Delay Tolerant Networks DISTRIBUTED AND PARALLEL NETWORKING \ NETWORKING 49 DNW1302 A System For Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis 50 DNW1303 A Probabilistic Misbehavior Detection Scheme Towards Efficient Trust Establishment In Delay-Tolerant Networks 51 DNW1304 Optimal Client-Server Assignment For Internet Distributed Systems 52 DNW1305 Distributed Cache Management in Information-Centric Networks DISTRIBUTED AND PARALLEL NETWORKING \ NETWORKING 53 DNW1306 A Novel Message Scheduling Framework For Delay Tolerant Networks Routing 54 DNW1307 Dynamic Trust Management For Delay Tolerant Networks And Its Application To Secure Routing 55 DNW1308 Constructing Limited Scale-Free Topologies Over Peer-To-Peer Networks 56 DNW1309 Grouping-Proofs-Based Authentication Protocol For Distributed RFID Systems 57 DNW1310 An Effective Network Traffic Classification Method With Unknown Flow Detection 58 DNW1311 Time Synchronization Based On Slow Flooding In Wireless Sensor Networks 59 DNW1312 Towards Differential Query Services In Cost Efficient Clouds 60 DNW1313 Fully Anonymous Profile Matching In Mobile Social Networks 61 DNW1314 Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment. 62 DNW1315 Firecol: A Collaborative Protection Network For The Detection Of Flooding DDOS Attacks 63 DNS1301 Privacy Preserving Data Sharing With Anonymous Id Assignment SECURE AND DEPENDABLE COMPUTING \ NETWORK SECURITY 64 DNS1302 A Rank Correlation Based Detection Against Distributed Reflection Dos Attacks 65 DNS1303 EAACK—A Secure Intrusion-Detection System For Manets 66 DNS1304 Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing 67 DNS1305 Modeling The Pair wise Key Predistribution Scheme In The Presence Of Unreliable Links 68 DNS1306 Two Tales Of Privacy In Online Social Networks 69 DNS1307 Cam: Cloud-Assisted Privacy Preserving Mobile Health Monitoring SECURE AND DEPENDABLE COMPUTING \ NETWORK SECURITY 70 DNS1308 Discovery And Resolution Of Anomalies In Web Access Control Policies 71 DNS1309 SORT: A Self-Organizing Trust Model For Peer-To-Peer Systems 72 DNS1310 Warning Bird: A Near Real-Time Detection System For Suspicious Urls In Twitter Stream 73 DNS1311 Sybil Defender: A Defense Mechanism For Sybil Attacks In Large Social Networks 74 DNS1312 NICE: Network Intrusion Detection And Countermeasure Selection In Virtual Network Systems 75 DNS1313 A Flexible Approach To Improving System Reliability With Virtual Lockstep 76 DNS1314 Revisiting Defenses Against Large-Scale Online Password Guessing Attacks 77 DNS1315 On Privacy Of Encrypted Speech Communications 78 DNS1316 Double Guard: Detecting Intrusions In Multitier Web Applications 79 DNS1317 Automatic Reconfiguration For Large-Scale Reliable Storage Systems 81 DIP1301 Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption IMAGE PROCESSING I 82 DIP1302 A Dictionary Learning Approach For Poisson Image Deblurring 83 DIP1303 Context -Aware Sparse Decomposition For Image Denoising And Super Resolution 84 DIP1304 Asymmetric Correlation- A Noise Robust Similarity Measure For Template Matching 85 DIP1305 Optical Flow Estimation For Flame Detection In Videos 86 DIP1306 Blur And Illumination Robust Face Recognition Via Set-Theoretic Characterization 87 DIP1307 SPSO- Relevance Feedback A Power Tool In Interactive Content-Based Image 88 DIP1308 Digital Watermarking For Digital Media 89 DMC1301 Cooperative Packet Delivery In Hybrid Wireless Mobile Networks - A Coalitional Game Approach MOBILE COMPUTING 90 DMC1302 A Highly Scalable Key Pre-Distribution Scheme for wireless sensor networks 91 DMC1303 Dynamic Multilevel Priority Packet Scheduling Scheme For Wireless Sensor Network 92 DMC1304 Coverage And Energy Consumption Control In Mobile Heterogeneous Wireless Sensor Networks 93 DMC1305 Vampire Attacks- Draining Life from wireless ad Hoc networks 94 DMC1306 Optimal Peer-To-Peer Scheduling For Mobile Wireless Networks With Redundantly Distributed Data
Posted on: Mon, 14 Oct 2013 06:48:42 +0000

Trending Topics



Recently Viewed Topics




© 2015