You are on page 1of 5

S.N.

IEEE 2009 Project Titles


Rate Control With Pair wise Intersession Network Coding Equilibrium of Heterogeneous Congestion Control: Optimality and Stability Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks Providing Witness Anonymity Under Peer-to-Peer Settings On the Performance Bounds of Practical Wireless Network Coding Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory MABS: Multicast Authentication Based on Batch signature SigFree: A Signature-Free Buffer Overflow Attack Blocker SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments Layered Approach Using Conditional Random Fields for Intrusion Detection Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs A General Framework for Service Availability for BandwidthEfficient Connection-Oriented Networks Secure Data Objects Replication in Data Grid DCAR: Distributed Coding-Aware Routing in Wireless Networks Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications Shifting Inference Control to User Side: Architecture and Protocol Optimal Relay Station Placement in Broadband Wireless Access Networks Using Web-Referral Architectures to Mitigate Denial-of-Service Threats A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network Energy-Aware Tag Anti-collision Protocols for RFID Systems An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks Channel Assignment for Multi-hop Cellular Networks: Minimum Delay Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks Secure Client-Side ST-DM Watermark Embedding Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Edge Adaptive Image Steganography Based on LSB Matching Revisited Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes Predictive Network Anomaly Detection and Visualization Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks SVD-Based Universal Spatial Domain Image Steganalysis Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks Power Control and Channel Allocation in Cognitive Radio Networks with Primary Users Cooperation A Survey on the Encryption of Converge cast Traffic with In-Network Processing Cost Analysis of Short Message Retransmissions In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm Always Acyclic Distributed Path Computation Multiple RFID Tags Access Algorithm Step Construction of Visual Cryptography Schemes Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks Reversible Image Watermarking Using Interpolation Technique High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements

Domain
Network Network Mobile Computing Network Security Mobile Computing Network Mobile Computing Network Network Security Mobile Computing Network Security Mobile Computing Network Security Mobile Computing Network Network Security Mobile Computing Network Network Security Mobile Computing Network Security Network Mobile Computing Network Security Network Mobile Computing Network Network Security Mobile Computing Network Network Network Security Mobile Computing Network Security Mobile Computing Network Security Network Security Mobile Computing Network Security Mobile Computing Network Security Network Mobile Computing Network Security Mobile Computing Network Security Mobile Computing

Lang/Year
2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/Java 2010/ .Net 2010/Java 2010/Java 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/Java 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net

Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Fast Algorithms for Resource Allocation in Wireless Cellular Networks Distributed Algorithms for Minimum Cost Multicast With Network Coding Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast Replication Routing in DTNs: A Resource Allocation Approach A Fitting Report Position Scheme for the Gated IPACT Dynamic Bandwidth Algorithm in EPONs POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority

Mobile Computing Network Network Network Network Network Network Network Network Network

2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net 2010/ .Net

S.N.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.

IEEE 2009 Project Titles


A Gen2-based RFID Authentication Protocol for Security and Privacy A Tabu Searching Algorithm For Cluster Building in Wireless Sensor Networks Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks Biased Random Walks in Uniform Wireless Networks Cell Breathing Techniques for Load Balancing in Wireless LANs Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic Energy Maps For Mobile Wireless Networks Enforcing Minimum-Cost Multicast Routing against Shelfish Information Flows Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On-Board Processing Capabilities Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks Movement-Assisted Connectivity Restoration in Wireless Sensor and On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Rout Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise PRESTO Feedback-Driven Data Management in Sensor Networks Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks

Domain
Mobile Computing Mobile Computing Network Computing Mobile Computing Mobile Computing Distribute Computing Network Computing Mobile Computing Distribute Computing Network Computing Mobile Computing Mobile Computing Mobile Computing Distribute Computing Mobile Computing Secure Computing Network Computing Mobile Computing

Lang/Year 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net

19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47.

Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services Route Stability in MANETs under the Random Direction Mobility Model Secure and Policy-Complaint Source Routing Single-Link Failure Detection in All-Optical Networks Using Spread-Spectrum Watermarking Security The Effectiveness of Checksums for Embedded Control Networks Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification Virus Spread in Networks Capturing Router Congestion and Delay Continuous Monitoring of Spatial Queries in Wireless Broadcast Energy Maps For Mobile Wireless networks coherence Time Versues Spreding Period Energy-Efficient SINR-Based Routing for Multihop Wireless Evaluating the Vulnerability of Network Traffic Using Joint Large Connectivity for Dynamic Random Geometric Graphs Measuring Capacity Bandwidth of Targeted Path Segments Mitigation of Control Channel Jamming Under Node Capture Attacks Mobility Management Approaches for Mobile IP Networks Multiple Routing Configurations for Fast IP Network Recovery Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks SIMPS Using Sociology for Personal Mobility Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing Dynamic Routing with Security Considerations Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos Detecting Malicious Packet Losses On the Security of Route Discovery in MANETs A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment Facial Recognition using multisensor images based on localized kernel eigen spaces

Network Computing Network Computing Mobile Computing Network Computing Network Computing Secure Computing Secure Computing Network Computing Network Computing Network Computing Mobile Computing Mobile Computing Mobile Computing Network Computing Mobile Computing Network Computing Mobile Computing Mobile Computing Network Computing Network Computing Mobile Computing Network Computing Secure Computing Secure Computing Image Processing Distribute Computing Secure Computing Distribute Computing Image Processing

2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/.Net 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/Java 2009/.Net 2009/Java 2009/Java

S.N.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45.

IEEE 2008 Project Titles


A Geometric Approach to Improving Active Packet Loss Measurement Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Location Based Spatial Query Processing In Wireless Broadcast Environments Modeling & Automated Containment of Worms Benefit Based Data Caching In Ad Hoc Networks Minimizing File Download Time in Stochastic Peer-to-Peer Networks Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction QUIVER Consistent Object Sharing For Edge Services Truth Discovery with multiple Conflicting Information Providers on web Estimation of Defects Based On Defect Decay Model ED3M HBA Distributed Metadata Management for Large Cluster-Based Storage Systems Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks Dual-Link Failure Resiliency through Backup Link Mutual Exclusion Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach Trustworthy Computing Under Resource Constraints With The Down Policy Localized Sensor Area Coverage With Low Communication Overhead Active Learning Methods for Interactive Image Retrieval Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light Hardware enhanced association rule mining with Hashing and Pipelining Efficient Resource Allocation For Wireless Multicast A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers A New Model For Dissemination Of XML Content Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case Watermarking Relational Databases Using Optimization Based Techniques Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision An Efficient Association Rule Mining Algorithm In Distributed Databases BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Temporal Partioning of Communication Resources in an Integrated Architecture Controlling IP Spoofing Through Inter Domain Packet Filters Probabilistic Packet Marking For Large Scale IP Trace Back Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data Securing User-Controlled Routing Infrastructures Credit Card Fraud Detection Using Hidden Markov Models Security in large Mediator Protocols [IEEE Reference Project] A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern Two Techniques for Fast Computation of Constrained Shortest Paths Protection of Database Security via Collaborative Inference Detection Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Online Index Recommendations for High-Dimensional Databases Using Query Workloads A Precise Termination Condition of the Probabilistic Packet Marking Algorithm

Domain
Network Computing Mobile Computing Mobile Computing Mobile Computing Secure Computing Network Computing Network Computing Network Computing Network Computing Distribute Computing Data Mining Software Engineering Distribute Computing Network Computing Network Computing Multimedia Computing Secure Computing Mobile Computing Image Processing Image Processing Data Mining Mobile Computing Multimedia Network Secure Computing Image Processing Networking Data Mining Mobile Computing Transportation System Data Mining Network Computing Secure Computing Secure Computing Network Computing Network Computing Network Computing Secure Computing Network Computing Data Mining Network Computing Secure Computing Distribute Computing Data Mining Secure Computing

Lang/Year 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/Java 2008/J2EE 2008/.Net 2008/.Net 2008/.Net 2008/Java 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/.Net 2008/Java 2008/.Net 2008/Java 2008/Java 2008/.Net 2008/Java 2008/.Net 2008/.Net 2008/Java 2008/.Net 2008/Java 2008/J2EE 2008/Java 2008/J2EE 2008/Java 2008/J2EE 2008/Java Lang/Year Java/2006 Java/2007 Java/2005

S.N.
1. 2. 3.

IEEE 2008 Project Titles


Distributed cache updating for the Dynamic source routing protocol An Adaptive Programming Model for Fault-Tolerant Distributed Computing Face Recognition Using Laplacian faces

Domain
Distribute Computing Secure Computing Image Processing

4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 26. 27. 28. 29. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50.

Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks Noise Reduction by Fuzzy Image Filtering Online Handwritten Script Recognition ODAM: An Optimized Distributed Association Rule Mining Algorithm Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks ITP: An Image Transport Protocol for the Internet Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS) Network border patrol: preventing congestion collapse and promoting fairness in the Internet Application of BPCS steganography to wavelet compressed video Neural Networks for Unicode Optical Character Recognition An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Mobile Agents In Distributed Multimedia Database Systems Image Stream Transfer Using Real-Time Transmission Protocol Personal Authentication Using 3-D Finger Geometry Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks A Memory Learning Framework for Effective Image Retrieval Personal Identification Based On Iris Texture Analysis GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions Workflow Mining Discovering Process Models from Event Logs Identification of Humans Using Gait Location Aided Routing In Mobile AD-HOC Networks Neural Network Based Face Detection

Network Computing Image Processing Network Computing Image Processing Image Processing Data Mining Image Processing Network Computing Network Computing Secure Computing Network Computing Secure Computing Image Processing Network Computing Network Computing Network Computing Multimedia Image Processing Image Processing Network Computing Image Processing Image Processing Data Mining Data Mining Image Processing Network Computing Image Processing Network Computing Image Processing Network Computing Image Processing Image Processing Image Processing Image Processing Secure Computing Network Computing Image Processing System Secure Computing Secure Computing Network Computing Network Computing System Network Computing Image Processing Network Computing Image Processing

Java/2005 . Net/2006 Java/2004 Java/2006 Java/2004 Java/2004 Java/2004 Java/2006 Java/2002 J2EE/2007 Java/2004 Java/2004 . Net/2004 Java/2007 Java/2004 Java/2005 Java/2004 Java/2006 Java/2006 . Net/2005 Java/2005 Java/2003 Java/2005 .Net/2004 Java/2004 Java/2004 VC++/2002
Java Java Java Java

IEEE Reference Projects


Genetic Algorithm Based Train Simulation Using Concurrent Engineering Image Compression and De-compression Network Component For XML Migration Java water marking and image combustion Edge Detection in Images with Wavelet Transform Neural Network for Recognition of Handwritten and Digits Back Propagation Neural Network for Image Recognition Steganography for Hiding Data in Wave Audio Files Multiple Ant Colonies Optimization for Load Balancing in Distributed Systems Image Processing for Edge Detection Windows Management Instrumentation (WMI) Implementation Cryptographically Safe Server Client Protocol Hiding messages in the Noise of a Picture Performance Evaluation of RMI Public Key Validation for DNS security Extension Java Visual Editor and Compiler Tool Homogenous Network Control and Implementation Hopfield model of neural network for pattern recognition Intrusion Detection Prevention And Traceback Systems Image Processing for Convolution Filters

VC++ VC++ C# .Net C# .Net C# .Net C# .Net C# .Net VC++ C# .Net Java Java Java Java C# .Net VB, C++ C# .Net

You might also like