You are on page 1of 16

IEEE PROJECTS

S.N
O

PROJECT TITLE

DOMAIN

TEC
H

YEA
R

Attribute-based Access to Scalable Media in Cloudassisted Content Sharing Networks.

Cloud
Computing

.NET

201
3

Cloud Based SQL Query Processor

Cloud
Computing

.NET

201
3

EMAP: Expedite Message Authentication Protocol for


Vehicular Ad Hoc Networks

Mobile
Computing

.NET

201
3

Enforcing Secure and Privacy-Preserving Information


Brokering in Distributed Information Sharing

Secure
Computing

.NET

201
3

Mobi-Sync: Efficient Time Synchronization for Mobile


Underwater Sensor Networks.

Parallel &
Distributed
Systems

.NET

201
3

Privacy Preserving Data Sharing With Anonymous ID


Assignment.

Secure
Computing

.NET

201
3

Redundancy Management of Multipath Routing for


Intrusion Tolerance in Heterogeneous Wireless Sensor
Networks

Networking

.NET

201
3

Reversible Data Hiding in Encrypted Images by


Reserving Room Before Encryption

Secure
Computing

.NET

201
3

The Target Tracking in Mobile Sensor Networks.

Networking

.NET

201
3

10

Mining Order-Preserving Sub Matrices From Data With


Repeated Measurements

Data Mining

.NET

201
3

11

G-Match secure and Privacy


Matching in Social Networks

Knowledge &
Data Mining

.NET

201
3

12

Secure and Efficient Data Transmission for Cluster


Based Wireless Sensor Networks

Parallel &
Distributed
Systems

.NET

201
3

13

preserving

Group

Privacy Preserving Delegated Access Control in Public


Cloud

.NET
Secure

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
3

IEEE PROJECTS
Computing

14

LLSURE Local Linear SURE-Based Edge-Preserving


Image Filtering

15

Cost Based Optimization of Service Compositions

16

Dynamic Query Forms for Database Queries

17
18
19

SeDas A Self Destructing Data System Based on


Active Storage Framework
A Privacy Leakage Upper Bound Constraint-Based
Approach for Cost-Effective Privacy Preserving of
Intermediate Data Sets in Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud

Data Mining
Data Mining
Data Mining

.NET

.NET
.NET
.NET

201
3
201
3
201
3
201
3

Cloud
Computing

.NET

201
3

Cloud
Computing

.NET

201
3

Cloud
Computing

.NET

201
3

20

Toward
Fine-Grained,
Performance
Diagnosis
Computing Systems

21

Towards Secure Multi-Keyword Top-k Retrieval over


Encrypted Cloud Data

Cloud
Computing

.NET

201
3

22

A Survey of XML Tree Patterns

Data Mining

.NET

201
3

23

Dynamic Personalized Recommendation on Sparse


Data

Data Mining

.NET

201
3

24

EAACKA Secure Intrusion-Detection System for


MANETs

Secure
Computing

.NET

201
3

25

SORT: A Self-ORganizing Trust Model for Peer-to-Peer


Systems

Secure
Computing

.NET

201
3

26

A Secure Payment Scheme with Low Communication


and Processing Overhead for Multihop Wireless
Networks

Parallel &
Distributed
Systems

.NET

201
3

Reversible Watermarking Based on Invariant Image


Classification and Dynamic Histogram Shifting
A Decentralized Privacy Preserving Reputation
Protocol for the Malicious Adversarial Model
Tweet Analysis for Real-Time Event Detection and
Earthquake Reporting System Development
Privacy Preserving Public Auditing for Secure Cloud
Storage

Image
Processing

.NET

Data Mining

.NET

Data Mining

.NET

Cloud

JAVA

27
29
30
30

Unsupervised,
Scalable
for
Production
Cloud

Image
Processing

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
3
201
3
201
3
201
3

IEEE PROJECTS
Computing

31

Winds of Change from Vendor Lock-In to the Meta


Cloud

Cloud
Computing

JAVA

201
3

32

AMES-Cloud: A Framework of Adaptive Mobile Video


Streaming and Efficient Social Video Sharing in the
Clouds

Cloud
Computing

JAVA

201
3

33

A Fast Clustering-Based Feature Subset Selection


algorithm for High Dimensional Data

Data Mining

JAVA

201
3

34

A System to Filter Unwanted Messages from OSN User


Walls

Data Mining

JAVA

201
3

35

CloudMoV: Cloud-based Mobile Social TV

Data Mining

JAVA

201
3

36

Comparable
Questions

Data Mining

JAVA

201
3

37

Crowd sourcing Predictors of Behavioral Outcomes

Data Mining

JAVA

201
3

38

Facilitating Effective User Navigation through Website


Structure Improvement

Data Mining

JAVA

201
3

39

Focus Learning to Crawl Web Forums

Data Mining

JAVA

201
3

40

Incentive
Analysis

Data Mining

JAVA

201
3

41

PMSE: A Personalized Mobile Search Engine

Data Mining

JAVA

201
3

42

Sensitive Label Privacy Protection on Social Network


Data

Data Mining

JAVA

201
3

43

Robust Module Based Data Management

Data Mining

JAVA

201
3

44

Spatial Approximate String Search

Data Mining

JAVA

201
3

45

Mobile Relay Configuration in Data-intensive Wireless


Sensor Networks.

Mobile
Computing

JAVA

201
3

46

Entity

Mining

Compatible

from

Comparative

Privacy-Preserving

Data

Vampire attacks: Draining life from wireless ad-hoc


sensor networks.

JAVA
Mobile

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
3

IEEE PROJECTS
Computing

47

Towards a Statistical Framework


Anonymity in Sensor Networks

Source

Mobile
Computing

JAVA

201
3

48

A Scalable Server Architecture for Mobile Presence


Services in Social Network Applications

Mobile
Computing

JAVA

201
3

49

Privacy-Preserving Distributed Profile Matching in


Proximity-based Mobile Social Networks

Mobile
Computing

JAVA

201
3

50

Distributed Cooperative Caching in Social Wireless


Networks

Mobile
Computing

JAVA

201
3

Optimizing Cloud Resources for Delivering IPTV


Services through Virtualization
Access Policy Consolidation for Event Processing
Systems
Mining Contracts for Business Events and Temporal
Constraint in Service Engagements
Fully Anonymous Profile Matching in Mobile Social
Networks

Networking

51
52
53
54

for

Networking
Networking
Networking
Networking

JAVA
JAVA
JAVA
JAVA

55

Price Differentiation for Communication Networks

56

Dynamic Resource Allocation using Virtual Machines


for Cloud Computing Environment

Parallel and
Distributed
Systems

JAVA

201
3

57

CAM: Cloud-Assisted Privacy Preserving Mobile Health


Monitoring.

Secure
Computing

JAVA

201
3

58

Scalable and Secure Sharing of Personal Health


Records in Cloud Computing Using Attribute-Based
Encryption

Parallel and
Distributed
Systems

JAVA

201
3

59

Extracting Spread-Spectrum Hidden Data from Digital


Media

Secure
Computing

JAVA

201
3

60

Two tales of privacy in online social networks

Secure
Computing

JAVA

201
3

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

JAVA

201
3
201
3
201
3
201
3
201
3

IEEE PROJECTS

61

Utility-Privacy Tradeoff in Databases An Informationtheoretic Approach.

Secure
Computing

JAVA

201
3

62

A Load Balancing Model Based on Cloud Partitioning


for the Public Cloud Development

Cloud
Computing

JAVA

201
3

63

Privacy Preserving Delegated Access Control in Public


Cloud

Secure
Computing

JAVA

201
3

64

Super Resolution Based Inpainting

Image
Processing

JAVA

201
3

65

Collaboration in Multi Cloud Computing Environments


Framework & Security Issues

Cloud
Computing

JAVA

201
3

66

Social Tube P2P-assisted Video Sharing in Online


Social Networks

JAVA

201
3

67

A Network Coding Equivalent Content Distribution


Scheme For Efficient Peer To Peer Interactive Vod
Streaming

JAVA

201
2

68

On Optimizing Overlay Topologies For Search In


Unstructed Peer To Peer Networks

JAVA

201
2

69

Automatic Discovery of Association Orders between


Name and Aliases from the Web using Anchor Textsbased Co-occurrences

JAVA

201
2

70

Cloud Data Production for Masses

JAVA

201
2

JAVA

201
2

JAVA

201
2

JAVA

201
2

Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Knowledge &
Data
Engineering
Cloud
Computing

71

Clustering With Multi View Point Based Similarity


Measure

Knowledge &
Data
Engineering

72

Cooperative Provable Data Possession for Integrity


Verification in Multi-Cloud Storage

Parallel &
Distributed
Systems

73

Distributed Packet Buffers For High Band Width


Switches & Routers

Parallel &
Distributed
Systems

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

IEEE PROJECTS

74

Efficient Fuzzy Type A Head Search In Xml Data

75

Fast Data Collection in Tree-Based Wireless Sensor


Networks.

Knowledge &
Data
Engineering
Mobile
Computing

JAVA

201
2

JAVA

201
2

JAVA

201
2

76

Foot Print Detecting Sybil Attacks In Urban Vehicular


Networks

Parallel &
Distributed
Systems

77

Game-Theoretic Pricing for Video Streaming in Mobile


Networks

Mobile
Computing

JAVA

201
2

78

Hand Written Chinese Text Recognition By Integrating


Multiple Contexts

Pattern Analysis
& Machine
Intelligence

JAVA

201
2

79

In Tags We Trust: Trust modeling in social tagging of


multimedia content

Signal
Processing

JAVA

201
2

80

Learn to Personalized Image Search from the Photo


Sharing Websites

Multimedia

JAVA

201
2

Knowledge &
Data
Engineering

JAVA

201
2

Secure
Computing

JAVA

201
2

Knowledge &
Data
Engineering

JAVA

201
2

81

MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS:


MODEL AND MECHANISMS

82

Online Modeling of Proactive Moderation System for


Auction Fraud Detection

83

Organizing User Search Histories

84

Packet Loss Control Using Tokens at the Network Edge

Networking

JAVA

201
2

85

Packet-Hiding Methods
Jamming Attacks

Secure
Computing

JAVA

201
2

86

Ranking Model Adaptation for Domain-Specific Search

for

Preventing

Selective

JAVA
Knowledge &
Data

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
2

IEEE PROJECTS
Engineering

87

Risk-Aware Mitigation for MANET Routing Attacks

Secure
Computing

JAVA

201
2

88

Self Adaptive Contention Aware Routing Protocol For


Intermittently Connected Mobile Networks

Mobile
Computing

JAVA

201
2

89

Slicing: A New Approach to Privacy Preserving Data


Publishing

Knowledge &
Data
Engineering

JAVA

201
2

90

Ensuring Distributed Accountability For Data Sharing


In The Cloud.

Secure
Computing

JAVA

201
2

91

Adaptive Opportunistic Routing for Wireless Ad Hoc


Networks

Networking

JAVA

201
2

92

Vehicle Detection in Aerial


Dynamic Bayesian Networks

Networking

JAVA

201
2

93

Catching Packet Droppers and Modifiers in Wireless


Sensor Networks

Parallel &
Distributed
Systems

JAVA

201
2

94

Energy-Efficient
Statistical QoS
Networks

Networking

JAVA

201
2

95

CCD A Distributed Publish Subscribe Framework for


Rich Content Format

Parallel &
Distributed
Systems

JAVA

201
2

96

Confucius: A Tool Supporting Collaborative Scientific


Workflow Composition

Services
Computing

JAVA

201
2

97

An Efficient and Secure Solution for the Problems of


ARP Cache Poisoning Attacks

Networking

JAVA

201
2

98

An Efficient Caching Scheme and


Maintenance in Hybrid P2P System

Wireless
Communications

JAVA

201
2

Surveillance

Using

Cooperative
Distribution
with
Provisions Video Over Wireless

Consistency

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

IEEE PROJECTS

99

100
101
102
103

Cut Detection in Wireless Sensor Networks

Bootstrapping Ontologies for Web Services


Protecting Location Privacy in Sensor Networks
against a Global Eavesdropper
A Secure Erasure Code-Based Cloud Storage System
with Secure Data Forwarding
HASBE: A Hierarchical Attribute-Based Solution for
Flexible and Scalable Access Control in Cloud
Computing

104

Outsourced Similarity Search on Metric Data Assets

105

Bloom Cast: Efficient and Effective Full-Text Retrieval


in Unstructured P2P Networks

106
107
108

Design, Implementation, and Performance of a Load


Balancer for SIP Server Clusters
Independent Directed Acyclic Graphs for Resilient
Multipath Routing
Measure Routing: A Framework for Routing Assisted
Traffic Monitoring

109

RIHT: A Novel Hybrid IP Trace back Scheme

110

Detecting and Resolving Firewall Policy Anomalies

111
112
113
114
115
116
117

118
119

Detecting Spam Zombies by Monitoring Outgoing


Messages
Handling Selfishness in Replica Allocation over a
Mobile Adhoc Networks
Latency Equalization as a New Network Service
Primitive
Toward Reliable Data Delivery for Highly Dynamic
Mobile Ad Hoc Networks
Toward Secure and Dependable Storage Services in
Cloud Computing
Load-Balancing Multipath Switching System with Flow
Slice
Incremental Information Extraction Using Relational
Databases
Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using Attribute-based
Encryption
Double Guard: Detecting Intrusions in Multitier Web

Parallel &
Distributed
Systems
Service
Computing
(Web service)
Mobile
Computing
Cloud
Computing
Cloud
Computing
Cloud
Computing
Parallel and
Distributed
systems

JAVA

201
2

JAVA

201
2

JAVA
JAVA
JAVA

201
2

JAVA

201
2

JAVA

201
2

Networking

JAVA

Networking

JAVA

Networking

JAVA

Networking

JAVA

Secure
Computing
Secure
Computing
Mobile
Computing
Networking
Mobile
Computing
Services
Computing
Cloud
Computing
Knowledge &
Data
Engineering
Parallel &
Distributed
Systems
Secure

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
2
201
2

JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA

201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2

JAVA

201
2

JAVA

201
2

JAVA

201

IEEE PROJECTS
Applications

Computing

120

Cloud Computing Security From Single to Multi Clouds

Cloud
Computing

JAVA

121

Optimal Source-Based Filtering of Malicious Traffic

Networking

JAVA

122

Effective Pattern Discovery for Text Mining

123

Enabling Multilevel Trust in Privacy Preserving Data


Mining

124

BibPro A
alignment

125

Document Clustering
Measure Space

126

Horizontal Aggregations in SQL to Prepare Data

127

Design and Implementation of TARF: A Trust-Aware


Routing Framework for WSNs.

128

Efficient and Accurate Discovery of Patterns in


Sequence Datasets

129

A New Cell Counting Based Attack Against Tor

130

AMPLE: An Adaptive Traffic Engineering System Based


on Virtual Routing Topologies.

131

Compressed-Sensing-Enabled Video Streaming for


Wireless Multimedia Sensor Networks.

132

Defenses Against Large Scale Online Password


Guessing Attacks by using Persuasive click Points.

133

Design and Implementation of TARF: A Trust-Aware


Routing Framework for WSNs.

134

Query Planning for Continuous Aggregation Queries

135

Optimal Power Allocation in Multi-Relay MIMO


Cooperative Networks: Theory and Algorithms.

136

Robust Face-Name
Character Identify.

137

Citation

Parser

in

Graph

Based

on

sequence

Correlation

Similarity

Matching

for

Knowledge &
Data
Engineering
Knowledge &
Data
Engineering
Knowledge &
Data
Engineering
Knowledge &
Data
Engineering
Knowledge &
Data
Engineering
Secure
Computing
Data Mining
Networking

Movie

Scalable and Secure Sharing of Personal Health


Records in Cloud Computing using Attribute-based
Encryption

2
201
2
201
2

JAVA

201
2

JAVA

201
2

JAVA

201
2

JAVA

201
2

JAVA

201
2

JAVA

201
2

JAVA
.NET

201
2
201
2

Wireless
Communications

.NET

201
2

Image
Processing

.NET

201
2

Image
processing

.NET

201
2

Secure
Computing

.NET

201
2

Data Mining
Networking
Image
Processing
Parallel &
Distributed

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

.NET
.NET
.NET
.NET

201
2
201
2
201
2
201
2

IEEE PROJECTS
Systems
International
Conference

.NET

201
2

Mobile
Computing

.NET

201
2

Parallel &
Distributed
Systems

.NET

201
2

Topology control in mobile ad hoc networks with


cooperative communications

Mobile
Computing

.NET

201
2

142

Secure And Efficient Handover Authentication Based


On Bilinear Pairing Functions

Secure
Computing

.NET

201
2

143

Grouping-Enhanced Resilient Probabilistic En-Route


Filtering of Injected False Data in WSNs

Parallel &
Distributed
Systems

.NET

201
2

144

Latency Equalization as a New Network Service


Primitive

Networking

.NET

201
2

145

Efficient audit service outsourcing for data integrity in


clouds

Systems &
Software

.NET

201
2

146

Fair Torrent A Deficit Based Distributed Algorithm to


Ensure Fairness in peer to peer Systems

Networking

.NET

201
2

147

Automatic Reconfiguration for Large Scale Reliable


Storage Systems

Secure
Computing

.NET

201
2

148

BECAN:A
Bandwidth
Authentication Scheme

Cooperative

Parallel &
Distributed
Systems

.NET

201
2

149

Expert Discovery and Interactions in Mixed Service


Oriented Systems

Services
Computing

.NET

201
2

138

Securing Node Capture Attacks for Hierarchical Data


Aggregation in Wireless Sensor Networks

139

Protecting Location Privacy Sensor Networks Against


a Global Eavesdropper

140

SPOC: A Secure and Privacy-preserving Opportunistic


Computing
Framework
for
Mobile-Healthcare
Emergency

141

150

Efficient

Joint Relay and Jammer Selection for Secure Two-Way

.NET
Information

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
2

IEEE PROJECTS

Relay Networks

Forensics &
Security

151

Towards Secure and Dependable Storage Services in


Cloud Computing

Services
Computing

.NET

201
2

152

Network Assisted Mobile Computing with Optimal


Uplink Query Processing

Mobile
Computing

.NET

201
2

Revisiting Defenses against Large-Scale Online


Password Guessing Attacks
Automatic
Image
Equalization
and
Contrast
Enhancement Using Gaussian Mixture Modeling

Secure
Computing
Image
Processing
Cloud
Computing
Cloud
Computing
Image
Processing
Knowledge &
Data
Engineering
Cloud
Computing
Cloud
Computing
Parallel &
Distributed
Systems
Secure
Computing
Mobile
Computing

153
154
155
156
157

Cashing in on the Cache in the Cloud


Enabling Secure and Efficient Ranked Keyword Search
over Outsourced Cloud Data
An Online Learning Approach to Occlusion Boundary
Detection

158

Creating
Evolving
Automatically

159

Enhanced Data Security Model for Cloud Computing

160

Cloud Computing Security From Single to Multi-Clouds

161

Catching Packet Droppers & Modifiers in Wireless


Sensor Networks

162
163
164
165

User

Behavior

Profiles

On The Security & Efficiency of Content Distribution


via Network Coding
Toward Reliable Data Delivery for Highly Dynamic
Mobile Ad Hoc Networks
Persuasive
Cued
Click-Points:
Design,
Implementation, and Evaluation of a KnowledgeBased Authentication Mechanism
Semi supervised Biased Maximum Margin Analysis for
Interactive Image Retrieval

.NET
.NET
.NET
.NET
.NET
.NET
.NET
.NET
.NET
.NET
.NET

201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2
201
2

Secure
Computing

.NET

201
2

Image
Processing

.NET

201
2

166

A New Approach For Fec Decoding Based On The Bp


Algorithm In Lte And Wimax Systems

Network
Security

JAVA

201
1

167

A Privacy-Preserving Location Monitoring System For


Wireless Sensor Networks

Mobile
Computing

JAVA

201
1

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

IEEE PROJECTS
Networking

JAVA

201
1

Data Mining

JAVA

201
1

Analysis on Credit Card Fraud Detection Methods

Data
Engineering

JAVA

201
1

171

Denial of Service Attacks in Wireless Networks : The


Case of Jammers

Networking

JAVA

201
1

172

Discovering Conditional Functional Dependencies

Data
Engineering

JAVA

201
1

173

Effective Navigation Of Query Results Based On


Concept Hierarchies

Data
Engineering

JAVA

201
1

174

Extended Xml Tree Pattern Matching: Theories And


Algorithms

Data
Engineering

JAVA

201
1

175

Modeling And Detection Of Camouflaging Worm

Secure
Computing

JAVA

201
1

176

Nymble: Blocking Misbehaving Users In Anonymizing


Networks

Secure
Computing

JAVA

201
1

177

Ranking Spatial Data By Quality Preferences

Data
Engineering

JAVA

201
1

178

Sat: A Security Architecture Achieving Anonymity And


Traceability In Wireless Mesh Networks

Secure
Computing

JAVA

201
1

179

Secure And Practical Outsourcing


Programming In Cloud Computing

Linear

Cloud
Computing

JAVA

201
1

180

Sketch4match Content-Based
System Using Sketches

Retrieval

Image
Processing

JAVA

201
1

168

Buffer Sizing For 802.11 Based Networks

169

Clustering
Measure

170

With

Multi-Viewpoint

Based

Similarity

Of

Image

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

IEEE PROJECTS

181

Robust Video Data Hiding Using Forbidden Zone Data


Hiding And Selective Embedding

Video
Technology

JAVA

201
1

182

A Competitive Study Of Cryptography Techniques


Over Block Cipher

Secure
Computing

JAVA

201
1

183

A Dual Framework and Algorithms for Targeted Online


Data Delivery

Data
Engineering

JAVA

201
1

184

Embedded Extended Visual Cryptography Schemes

Security

JAVA

201
1

185

Scalable and Cost-Effective Interconnection of DataCenter Servers Using Dual Server Ports

Networking

JAVA

201
1

186

Cloud
Computing
For
Transportation Systems

Urban

Intelligent
Systems

JAVA

201
1

187

Supporting Efficient And Scalable Multicasting Over


Mobile Ad Hoc Networks

Mobile
Computing

JAVA

201
1

188

A Machine Learning Approach for Identifying DiseaseTreatment Relations in Short Texts

Data
Engineering

JAVA

201
1

189

Caching Strategies Based on Information Density


Estimation in Wireless Ad Hoc Networks

Networking

JAVA

201
1

190

Optimal
Bandwidth
Assignment
Description Coded Video

Multi Media

JAVA

201
1

191

Dynamics of Malware Spread in Decentralized Peerto-Peer Networks

Secure
Computing

JAVA

201
1

192

A
Fuzzy
Self-Constructing
Feature
Algorithm For Text Classification

Data Mining

JAVA

201
1

193

Going Back And Forth: Efficient Multi deployment And


Multisnapshotting On Clouds

Cloud
Computing

JAVA

201
1

Agent-Based

for

Multiple

Clustering

194

JAVA
ProgME:

Towards

Programmable

Network

Networking

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

201
1

IEEE PROJECTS
Measurement

195

Live Streaming With Receiver-Based Peer-Division


Multiplexing

Networking

JAVA

201
1

196

Data Leakage Detection

Data Mining

JAVA

201
1

197

RITAS Services for Randomized Intrusion Tolerance

Secure
Computing

JAVA

201
1

198

Improving Utilization of Infrastructure Clouds

Cloud
Computing

JAVA

201
1

199

A Link-Analysis Extension Of Correspondence Analysis


For Mining Relational Databases

Data
Engineering

JAVA

201
1

200

Fast Simulation of Service Availability in Mesh

Networking

JAVA

201
1

201

Optimal Stochastic Location Update Esin Mobile


Adhoc

Mobile
Computing

JAVA

201
1

202

Optimal Service Pricing For A Cloud Cache

Data
Engineering

JAVA

201
1

203

Online Intrusion Alert Aggregation With Generative


Data Stream Modeling

Networking

JAVA

201
1

JAVA

201
1

JAVA

201
1

JAVA

201
1

JAVA

201
1

204
205

A New Method for Generating All Positive and


Negative Association Rules
An Efficient Density based Improved K- Medoids
Clustering algorithm
Decision Trees for Uncertain Data

206

207
208
209
210

GLIP A Concurrency Control Protocol for Clipping


Indexing
Implementation of LSB Steganography and
Evaluation for Various File Formats
Locating Equivalent Servants over P2P Networks
Selfish Overlay Network Creation and Maintenance

its

Computer
Science and
Engineering
Networking
Knowledge and
Data
Engineering
Computer
Trends &
Technology
Networking
Networking
Networking

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

JAVA
JAVA
JAVA

201
1
201
1
201
1

IEEE PROJECTS
211
222
223

Voronoi-Based
Mobile Users

Continuous

Query

Processing

for

Wireless Sensor Network Security model using Zero


Knowledge Protocol
Adaptive Provisioning of Human Expertise in Serviceoriented Systems

Communication
& Network
Technology
Networking
Data Mining

JAVA

201
1

JAVA

201
1

.NET

201
1

.NET

201
1

.NET

201
1

Bridging Socially-Enhanced Virtual Communities

Networking

225

Efficient Computation of Range Aggregates Against


Uncertain Location Based Queries

Data Mining

226

Exploiting Dynamic Resource Allocation for Efficient


Parallel Data Processing in the Cloud

Parallel &
Distributed

.NET

201
1

227

Exploring Application-Level
Compression

Data
Engineering

.NET

201
1

Diversity

Data
Engineering

.NET

201
1

Monitoring Service Systems from a Language-Action


Perspective

Service
Computing

.NET

201
1

Data
Engineering

.NET

201
1

Optimal Service Pricing for a Cloud Cache

Data
Engineering

.NET

201
1

232

A Personalized Ontology Model for Web Information


Gathering

Data
Engineering

.NET

201
1

233

Publishing Search Logs A Comparative Study of


Privacy Guarantees

Data
Engineering

.NET

201
1

Scalable Learning of Collective Behavior

Data
Engineering

.NET

201
1

The Awareness Network, To Whom Should I Display


My Actions? And, Whose Actions Should I Monitor?

Software
Engineering

.NET

201
1

The World in a Nutshell: Concise Range Queries

Data
Engineering

.NET

201
1

224

228

229

230

231

234

235

236

Semantics

Improving Aggregate Recommendation


Using Ranking-Based Techniques

for

Data

One Size Does Not Fit All: Towards User- and QueryDependent Ranking For Web Databases

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

IEEE PROJECTS
Adaptive Fault Tolerant QoS Control Algorithms for
Maximizing System Lifetime of Query-Based Wireless
Sensor Networks

Secure
Computing

238

Continuous Neighbor
Sensor Networks

Networking

239

Distributed Adaptation of Quantized Feedback for


Downlink Network MIMO Systems

Wireless
Communication

240

Jamming-Aware Traffic Allocation for Multiple-Path


Routing Using Portfolio Selection

Networking

241

Robust Correlation of Encrypted Attack Traffic


Through Stepping Stones by Flow Watermarking

242

The Geometric
Firewalls

237

243

Discovery

Efficient

in

Matching

Asynchronous

Algorithm

for

Data Integrity Proofs in Cloud Storage

.NET

201
1

.NET

201
1

.NET

201
1

.NET

201
1

Secure
Computing

.NET

201
1

Secure
Computing

.NET

201
1

Cloud
Computing

.NET

201
1

245

Network Coding Based Privacy Preservation against


Traffic Analysis in Multi-hop Wireless Networks

Wireless
Communication

.NET

201
1

246

Privacy-Preserving Multi-keyword Ranked Search Over


Encrypted Cloud Data

Cloud
Computing

.NET

201
1

247

Throughput Optimization in High Speed Downlink


Packet Access (HSDPA)

Wireless
Communication

.NET

201
1

248
249

Horizontal Aggregations in SQL to Prepare Data

Data Mining

Data Leakage Detection

Data Mining

250

A Spatiotemporal Approach for Secure Range Queries


in Tiered Sensor Networks

251

Integration of Sound Signature in Graphical Password


Authentication System

.NET
.NET

201
1
201
1

Wireless
Communication

.NET

201
1

Data
Engineering

.NET

201
1

CONTACT: ARUN KUMAR (09246103000)


MAIL ID: logicsystemsprojects@gmail.com

You might also like