Professional Documents
Culture Documents
2 3
Web Mining
5 6
7 8 9
10 11
12
13
ISOFTIND
14 ICJ121 4 15 16 17 ICJ121 5 ICJ121 6 ICJ121 7 ICJ121 8 ICJ121 9 ICJ122 0 ICJ122 1 ICJ122 2 ICJ122 3 ICJ122 4 ICJ122 5 ICJ122 6 ICJ122 7 ICJ122 FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multi hop Cellular Networks Organizing user search histories Portable cloud services using tosca Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Trust modeling in social tagging of multimedia content Optimizing Cloud Resources for Delivering IPTV Services through Virtualization An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System Cloud Computing Security From Single to Multi-Clouds An Adaptive Opportunistic Routing Scheme for Wireless Adhoc Networks Slicing: A New Approach to Privacy Preserving Data Publishing A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Multiparty Access Control for Online Social Networks: Model and Mechanisms Risk-Aware Mitigation for MANET Routing Attacks Topology Control in Mobile Ad Hoc Networks with Cooperative Communications Load Balancing Multipath Mobile Computing 201 2 Knowledge and Data Engineering Cloud Computing Mobile Computing Secure Computing Networking 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201 2 201
18 19
20
Wireless Communication Cloud Computing Wireless Communication Knowledge and Data Engineering Wireless Network Data Engineering Secure Computing Wireless Communication Networking
21 22
23 24
25
26 27
28
ISOFTIND
29 8 ICJ122 9 ICJ123 0 30 Switching System with Flow Slice Online modeling of proactive moderation system for auction fraud detection Automatic discovery of association orders between name and aliases from the web using anchor textsbased co-occurrences Clustering with multi view pointbased similarity measure Efficient fuzzy type-ahead search in xml data Distributed packet buffers for highbandwidth switches and routers Handwritten Chinese text recognition by integrating multiple contexts On optimizing overlay topologies for search in unstructured peer-topeer networks Self adaptive contention aware routing protocol for intermittently connected mobile networks Cut Detection in Wireless Sensor Networks (WSN) Secure Computing Data Mining 2 201 2 201 2
31 32 33 34
Knowledge and Data Engineering Knowledge and Data Engineering Parallel & Distributed Pattern Analysis Parallel & Distributed Parallel & Distributed Parallel & Distributed
35
36
37
PROJE CT CODE
ICJ1101
PROJECT TITLE
DOMAIN
YEAR
A NEW APPROACH FOR FEC DECODING BASED ON THE BP ALGORITHM IN LTE AND WIMAX SYSTEMS
NETWORK SECURITY
2011
ISOFTIND
2 ICJ1102 A PRIVACY-PRESERVING LOCATION MONITORING SYSTEM FOR WIRELESS 3 4 5 6 ICJ1103 ICJ1104 ICJ1105 ICJ1106 SENSOR NETWORKS BUFFER SIZING FOR 802.11 BASED NETWORKS CLUSTERING WITH MULTI-VIEWPOINT BASED SIMILARITY MEASURE ANALYSIS ON CREDIT CARD FRAUD DETECTION METHODS DELAY ANALYSIS AND OPTIMALITY OF SCHEDULING POLICIES FOR MULTI-HOP 7 8 9 10 11 12 13 ICJ1107 ICJ1108 ICJ1109 ICJ1110 ICJ1111 ICJ1112 ICJ1113 WIRELESS NETWORKS DISCOVERING CONDITIONAL FUNCTIONAL DEPENDENCIES EFFECTIVE NAVIGATION OF QUERY RESULTS BASED ON CONCEPT HIERARCHIES EXTENDED XML TREE PATTERN MATCHING: THEORIES AND ALGORITHMS MODELING AND DETECTION OF CAMOUFLAGING WORM NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS RANKING SPATIAL DATA BY QUALITY PREFERENCES SAT: A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY 14 ICJ1114 IN WIRELESS MESH NETWORKS SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD 15 16 ICJ1115 ICJ1116 COMPUTING SKETCH4MATCH CONTENT-BASED IMAGE RETRIEVAL SYSTEM USING SKETCHES ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND 17 18 ICJ1117 ICJ1118 SELECTIVE EMBEDDING A COMPETITIVE STUDY OF CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER A DUAL FRAMEWORK AND ALGORITHMS DATA ENGINEERING DATA ENGINEERING DATA ENGINEERING SECURE COMPUTING SECURE COMPUTING DATA ENGINEERING SECURE COMPUTING CLOUD COMPUTING IMAGE PROCESSING VIDEO TECHNOLOGY SECURE COMPUTING DATA 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 MOBILE COMPUTING NETWORKING DATA ENGINEERING DATA ENGINEERING NETWORKING 2011 2011 2011 2011 2011
ISOFTIND
19 20 ICJ1119 ICJ1120 FOR TARGETED ONLINE DATA DELIVERY EMBEDDED EXTENDED VISUAL CRYPTOGRAPHY SCHEMES SCALABLE AND COST-EFFECTIVE INTERCONNECTION OF DATA-CENTER 21 22 ICJ1121 ICJ1122 SERVERS USING DUAL SERVER PORTS CLOUD COMPUTING FOR AGENT-BASED URBAN TRANSPORTATION SYSTEMS SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC 23 ICJ1123 NETWORKS A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT 24 ICJ1124 RELATIONS IN SHORT TEXTS CACHING STRATEGIES BASED ON INFORMATION DENSITY ESTIMATION IN 25 26 27 ICJ1125 ICJ1126 ICJ1127 WIRELESS AD HOC NETWORKS OPTIMAL BANDWIDTH ASSIGNMENT FOR MULTIPLE DESCRIPTION CODED VIDEO A FUZZY SELF-CONSTRUCTING FEATURE CLUSTERING ALGORITHM FOR TEXT 28 ICJ1128 CLASSIFICATION GOING BACK AND FORTH: EFFICIENT MULTIDEPLOYMENT AND 29 30 31 32 33 ICJ1129 ICJ1130 ICJ1131 ICJ1132 ICJ1133 MULTISNAPSHOTTING ON CLOUDS LIVE STREAMING WITH RECEIVER-BASED PEER-DIVISION MULTIPLEXING THE COQUOS APPROACH TO CONTINUOUS QUERIES IN UNSTRUCTURED OVERLAYS SELFISH OVERLAY NETWORK CREATION AND MAINTENANCE THROUGHPUT OPTIMIZATION IN MOBILE BACKBONE NETWORKS LOCATING EQUIVALENT SERVANTS OVER P2P NETWORKS 34 ICJ1134 IMPROVING UTILIZATION OF CLOUD COMPUTING NETWORKING DATA ENGINEERING NETWORKING MOBILE COMPUTING NETWORK & SERVICE MANAGEMENT CLOUD 2011 2011 2011 2011 2011 2011 2011 DATA MINING 2011 2011 MULTI MEDIA 2011 INTELLIGENT SYSTEMS MOBILE COMPUTING DATA ENGINEERING NETWORKING 2011 2011 2011 2011 ENGINEERING SECURITY NETWORKING 2011 2011
ISOFTIND
35 ICJ1135 INFRASTRUCTURE CLOUDS WIRELESS SENSOR NETWORK SECURITY MODEL USING ZERO KNOWLEDGE 36 ICJ1136 PROTOCOL SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD 37 ICJ1137 COMPUTING A STUDY ON CERTIFICATE REVOCATION IN MOBILE AD HOC NETWORKS COMPUTING MOBILE COMPUTING CLOUD COMPUTING COMMUNICATI ONS(MOBILE COMPUTING) 38 ICJ1138 AN EFFICIENT SELF-ORGANIZED AUTHENTICATION AND KEY MANAGEMENT SCHEME FOR DISTRIBUTED MULTIHOP RELAYBASED IEEE 802.16 NETWORKS ADVANCED ROUTING TECHNOLOGY FOR FAST INTERNET FUNDAMENTAL LIMITS OF INFORMATION DISSEMINATION IN WIRELESS AD HOC NETWORKSPART II: MULTI-PACKET RECEPTION VORONOI-BASED CONTINUOUS QUERY PROCESSING FOR MOBILE USERS SECURE COMPUTING 2011 2011 2011 2011
39
ICJ1139
2011
40
ICJ1140
2011
41
ICJ1141
2011
A DISTRIBUTED PROTOCOL TO SERVE DYNAMIC GROUPS FOR PEER-TO-PEER STREAMING A REVIEW OF THE APPLICATIONS OF AGENT TECHNOLOGY IN TRAFFIC AND TRANSPORTATION SYSTEMS ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS
ICJ1002
ICJ1003
NETWORKING
ISOFTIND
4 5 6 ICJ1004 ICJ1005 ICJ1006 ALWAYS ACYCLIC DISTRIBUTED PATH BANDWIDTH RECYCLING IN IEEE 802.16 NETWORKS COOPERATIVE CACHING IN WIRELESS P2PNETWORKS: DESIGN, 7 8 ICJ1007 ICJ1008 IMPLEMENTATION, AND EVALUATION CORRELATION-BASED TRAFFIC ANALYSIS ATTACKS ON ANONYMITY NETWORKS DISTRIBUTED EXPLICIT RATE SCHEMES IN MULTI-INPUTMULTI-OUTPUT NETWORK 9 10 11 ICJ1009 ICJ1010 ICJ1011 SYSTEMS ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING HOST-TO-HOST CONGESTION CONTROL FOR TCP KTR AN EFFICIENT KEY MANAGEMENT SCHEME FOR SECURE DATA ACCESS CONTROL IN WIRELESS BROADCAST 12 ICJ1012 SERVICES LABEL-BASED DV-HOP LOCALIZATION AGAINST WORMHOLE ATTACKS IN 13 ICJ1013 WIRELESS SENSOR NETWORKS LAYERED APPROACH USING CONDITIONAL RANDOM FIELDS FOR INTRUSION 14 15 ICJ1014 ICJ1015 DETECTION MESH BASED MULTICAST ROUTING IN MANET: STABLE LINK BASED APPROACH MODIFIED DSR (PREEMPTIVE) TO REDUCE LINK BREAKAGE AND ROUTING OVERHEAD FOR MANET USING PROACTIVE ROUTE 16 17 18 ICJ1016 ICJ1017 ICJ1018 MAINTENANCE (PRM) MONITORING PATIENTS VIA A SECURE AND MOBILE HEALTHCARE SYSTEM MULTICAST MULTI-PATH POWER EFFICIENT ROUTING IN MOBILE ADHOC NETWORKS ON MODELING, ANALYSIS, AND TRANSACTION WIRELESS WIRELESS COMMUNICATI ONS NETWORKING 201 0 201 0 201 TRANSACTION S WIRELESS SECURE COMPUTING TRANSACTION WIRELESS NETWORKING 201 0 201 0 201 0 201 0 CLOUD COMPUTING NETWORKING SECURE COMPUTING NETWORKING NETWORKING DISTRIBUTED SYSTEMS DISTRIBUTED SYSTEMS NETWORKING 201 0 201 0 201 0 201 0 201 0 201 0 201 0 201 0
ISOFTIND
OPTIMIZATION OF PACKET AGGREGATION 19 20 21 22 23 ICJ1019 ICJ1020 ICJ1021 ICJ1022 ICJ1023 SYSTEMS RANDOM ACCESS TRANSPORT CAPACITY IRM: INTEGRATED FILE REPLICATION AND CONSISTENCY MAINTENANCE IN P2P SYSTEMS RANDOM ACCESS TRANSPORT CAPACITY CLIENT-SIDE LOAD BALANCER USING CLOUD. OPTIMAL JAMMING ATTACKS AND NETWORK DEFENSE POLICIES IN WIRELESS SENSOR NETWORKS A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS TRANSACTION WIRELESS DISTRIBUTED SYSTEMS TRANSACTION WIRELESS CLOUD COMPUTING NETWORKING 0 201 0 201 0 201 0 201 0 201 0 201 0
24
ICJ1024
NETWORKIN G
ISOFTIND
15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. GROUP KEY MANAGEMENT AND SECURED PROTOCOLS FOR IMAGE ENHANCEMENT TECHNOLOGY IMPLEMENTATION OF BPCS STEGANOGRAPHY INCREASING EFFICIENCY IN WIRELESS NETWORK J TEXT EDITOR JCHART LAYER TO FORWARD PROTOCOL LOAD BALANCING NATURAL LANGUAGE PROCESSING NET SURVEY SIMULATION NETWORK BORDER PATROL NETWORK DATABASE JUNCTION NETWORK ROUTING PROPOSED KEY GENERATION FOR MULTIMEDIA APPLICATIONS RE-ORDERING OF PACKETS USING RETRANSMISSION TIMER SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY SELF INTERESTED ROUTING IN ONLINE ENVIRONMENT SV-HOSPITAL MANAGEMENT TERMINODE REMOTE ROUTING THREE PARTY AUTHENTICATION FOR KEY DISTRIBUTION VIDEO CONFERENCING SYSTEM WEB DESK PEER GROUP COMMUNICATION
ISOFTIND
9. COMPUTERIZED LENDING SYSTEM 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. CONFINED WEB SPIDER CONTROL SYSTEM TRACK CORPORATE HOSPITAL HEALTH CARD COURIER SERVICE CREATIVE INSURANCE CRIME INVESTIGATION SYSTEM CRM FOR AIRLINE INDUSTRY CYBER SHOPPING DOCTOR ONLINE E-CLASSIFIEDS E-CONSULTANCY ELEARN ELECTRONIC DESCRIPTIVE EXAMINATION E-MUSIC E-POSTOFFICE E-VOTING EZEE MAIL SYSTEM E-Corporate Project Planning Employee Resource Info system FINANCE MANAGEMENT(APSFC) FORESTRY MANAGEMENT SYSTEM FUJJI DISTRIBUTION GLOBAL COMMUNICATION MEDIA HOTEL MANAGEMENT SYSTEM HUMAN RESOURCE PLANNER IMAGE PROCESSING IMMEGRATION(MEDICAL STAFF) INFORMATION TREASURY MOBILE SERVICE MANAGEMENT NET AUCTIONS NET BANKING NETWORK PROTOCOL SIMULATION
ISOFTIND
42. 43. 44. 45. 46. 47. 48. 49. 50. 51. ONLINE ADMISSION SYSTEM ONLINE LIBRARY ONLINE ORDER PROCESSING SYSTEM WITH AJAX ENABLED ONLINE RESULTS ONLINE SELECTION PAYROLL PESTICIDES INFORMATION SYSTEM PLACEMENT ACTIVITY SYSTEM PROJECT MANAGEMENT INFORMATION SYSTEM RAILWAY ROUTE SYSTEM