Post on 12-Jan-2015
description
Skiveprojects
Fabsys Technologies Pvt.Ltd | 1 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
TABLE OF CONTENTS
S. No PROJECT TITLES PAGE.NO
1 DOT NET IEEE TITLES 3
1.1 Cloud Computing 3
1.2 Mobile Computing 4
1.3 Network Security 5
1.4 Data Mining 8
1.5 Image Processing 11
1.6 Distributed Networking 12
1.7 Parallel & Distributed Computing 15
2 JAVA IEEE TITLES 17
2.1 Data Mining 17
2.2 Network Security 19
2.3 Parallel and Distributed Computing 20
2.4 Distributed Networking 21
2.5 Image Processing 23
3 NETWORK SIMULATOR(NS2) TITLES 25
4 APPLICATION PROJECT TITLES 26
4.1 DOT NET APPLICATION TITLES 26
4.2 JAVA APPLICATION TITLES 28
5 FLASH AND ANIMATION TITLES 29
6 EMBEDDED SYSTEM IEEE TITLES 30
7 EMBEDDED SYSTEM NON IEEE TITLES 33
8 MATLAB IEEE TITLES 35
8.1 Communication 35
8.2 Image Processing 36
9 VLSI IEEE TITLES 36
Skiveprojects
Fabsys Technologies Pvt.Ltd | 2 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
About Skiveprojects
Skiveprojects.com is a division of Fabsys Technologies (P) Ltd. It is specially organized for students’
guidance in their project work as well as in career development. As a team, we provide technical
assistance in various technologies and domains. By efficient training methodologies, we train students in
their desired field. We focus on needs of the students. To make students career brighter in desired field,
we are functioning as a bridge for students.
We provide
Project Guidance for all departments(UG & PG)
In plant training for IT, CSE, ECE departments respectively
Career Development programs
Seminars in various Domain & Technology every day!!
Internship Training & Certification
What is the real use of doing IEEE Project in final year?
Well, it is simple. Doing Project in final year will help you
To make an entry in Real time working environment
In most of the technical interview, Companies will ask questions around your final year projects
Exposure in latest technology in the field
Backbone for placement
Real time Training in an organization
Bring Own Concepts!!
You can bring your own concepts to us. We will develop projects according your requirement.
Project Guidance with Short Term Course.
Online Training for out-station students
Skiveprojects
Fabsys Technologies Pvt.Ltd | 3 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
DOT NET IEEE TITLES
IEEE TRANSACTION ON: CLOUD COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLE & DESCRIPTION Published
Year
1. SDCC01 EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced
Computer Science Course.
Description: Platform clouds are valued by both students and professors to achieve the
course objectives and that clouds offer a significant improvement over the previous
situation in labs.
Technology: Paas Cloud Usage : Cloud In Education
2011
2. SDCC02 CloudTPS: Scalable Transactions for Web Applications in the Cloud.
Description: CloudTPS (scalable transaction manager) guarantees full ACID properties
for multi-item transactions issued by Web applications, even in the presence of server
failures and network partitions.
Technology: Local Transaction Manager Usage: Acid Properties To Nosql
2011
3. SDCC03 A Privacy-Preserving Remote Data Integrity Checking Protocol with
Data Dynamics and Public Verifiability.
Description: Proposed protocol supports public verifiability without help of a third party
auditor. In addition, the proposed protocol does not leak any private information to third
party verifiers.
Technology: Public Verifiability Usage : Integrity In Cloud
2011
4. SDCC04 Enabling Public Auditability and Data Dynamics for Storage Security
in Cloud Computing.
Description: Identifying the difficulties & potential security problems of direct
extensions with fully dynamic data updates from prior works and then construct an elegant verification scheme for the seamless integration.
Technology: Third Party auditor Usage : Data Security in Cloud
2011
5. SDCC05 Optimal Service Pricing for a Cloud Cache.
Description: A novel SOA-aware approach with a special focus on the data flow. The
tight interaction of new cloud technologies with SOA technologies enables us to
optimize the execution of data-intensive service.
Technology: Framework For Dynamic Pricing Usage : Cloud Profit
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 4 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
IEEE TRANSACTION ON: MOBILE COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDMC01 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
Networks.
Description: Efficient Geographic Multicast Protocol -uses a virtual-zone-based
structure to implement scalable and efficient group membership management.
Technology: Virtual Zone Usage: Reliable Packet Transmissions
2011
2. SDMC02 Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh
Networks.
Description: A specialization that accounts for peculiar features of wireless mesh
networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast
nature of wireless communication.
Technology: 1-Hop Broadcast Usage :Information retrieval efficiency
2010
3. SDMC03 A Distributed and Scalable Time Slot Allocation Protocol for Wireless
Sensor Networks.
Description: A distributed and scalable scheduling access scheme that mitigates high
data loss in data-intensive sensor networks and can also handle some mobility.
Technology: Latin Squares Usage: Eliminate Collision
2011
6. SDCC06 Failure Avoidance through Fault Prediction Based on Synthetic
Transactions.
Description: Enhancing an online service’s reliability, availability and performance.
Synthetic transactions in pre-production environments, and combined with data-mining
on compact, specialized logs.
Technology: Synthetic Transactions Usage : Eliminate Failure
2011
7. SDCC07 Multi-level Intrusion Detection system and Log Management in
Cloud Computing.
Description: A method that enables cloud computing systems both effectiveness of
using system resource and system strength of security.
Technology: Levels of IDS Usage: Security with high Accessibility
2011
8. SDCC08 Using Cloud Technologies to Optimize Data-Intensive Service
Applications
Description: The tight interaction of new cloud technologies with SOA technologies
enables us to optimize the execution of data-intensive service applications by reducing
the data exchange tasks to a minimum.
Technology: Cloud SOA Usage : Eliminate Unwanted Data
2010
Skiveprojects
Fabsys Technologies Pvt.Ltd | 5 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4. SDMC04 Secure High-Throughput Multicast Routing in Wireless Mesh
Networks.
Description: Identifying novel attacks against high throughput multicast protocols in
wireless mesh networks.
Technology: Defense Mechanisms Usage: Prevent from identified attacks
2011
5. SDMC05 Message Authentication in Computationally Constrained
Environments.
Description: An approach to implement a compact HMAC by the use of stream
ciphering is presented in this paper.
Technology: Stream Cipher Usage: Authentication, Integrity
2010
6. SDMC06 Efficient Broadcasting in Mobile AD-Hoc Network.
Description: New broadcasting algorithm that constructs a CDS "on the fly" and can
guarantee both full delivery and a constant approximation ratio to the optimal solution.
Technology: Broadcasting Algorithms Usage: Reliable Transmission
2010
7. SDMC07 Multicasting with Localized Control in Wireless AD-Hoc Network
Description: The proposed scheme combines the layered multicast concept with the
routing-based congestion avoidance idea to reduce the aggregated rate of multicast flows.
Technology: cross-layer approach Usage: Congestion Avoidance
2010
IEEE TRANSACTION ON : NETWORK SECURITY
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDNS01 SAT: A Security Architecture Achieving Anonymity and
Traceability in Wireless.
Description: Ensure unconditional anonymity for honest users and traceability of
misbehaving users for network authorities in WMNs.
Technology: Anonymity And Traceability Usage : Identify Users
2011
2. SDNS02 Replica Placement for Route Diversity in Tree-based Routing
Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
diversity for these DHTs.
Technology: Route Diversity Usage : Response Time Reduced
2011
3. SDNS03 Privacy-Preserving Updates to Anonymous and Confidential
Databases
Description: Protocols solving suppression-based and generalization-based k-
anonymous and confidential databases. And it will rely on well-known cryptographic
assumptions.
Technology: Secure Computation Usage : Privacy-Preserving
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 6 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4. SDNS04 Revisiting Defenses Against Large-Scale Online Password Guessing
Attacks
Description: A new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks.
Technology: Automated Turing Tests Usage : Identify Malicious Login
2011
5. SDNS05 Balancing Revocation and Storage Trade-Offs in Secure Group
Communication
Description: Hybrid key management algorithm. Trade-offs between storage cost and
rekeying cost for secure multicast.
Technology: A Family Of Algorithms Usage : Reduce Cost Of Rekeying
2011
6. SDNS06 Nymble: Blocking Misbehaving Users in Anonymizing Networks
Description: Servers can “blacklist” misbehaving users, thereby blocking users
without compromising their anonymity. Nymble Tickets and Credentials, Blacklist.
Technology: A Secure System Usage : Block Misbehaving Users
2011
7. SDNS07 Blind Authentication: A Secure Crypto-Biometric Verification
Protocol
Description: A Provably secure and blind biometric authentication protocol, which
addresses the concerns of user’s privacy, template protection, and trust issues.
Technology: Biometric Authentication Usage : Nonrepudiable identity
2010
8. SDNS08 An Architectural Approach to Preventing Code Injection Attacks
Description: The memory architecture of modern processors that addresses the code
injection problem at its very root by virtually splitting memory into code memory and
data memory.
Technology: Memory Architecture Usage : Improved Protection
2010
9. SDNS09 Authenticated Group Key Transfer Protocol Based on Secret
Sharing
Description: An authenticated key transfer protocol based on secret sharing scheme
that KGC can broadcast group key information to all group members at once.
Technology: Trusted Key Generation Center Usage : Secret Sharing
2010
10. SDNS10 Beyond Output Voting: Detecting Compromised Replicas Using
HMM-Based Behavioral Distance
Description: A novel approach to behavioral distance measurement using a new type
of Hidden Markov Model, and present an architecture realizing this new approach.
Technology: Hidden Markov Model Usage : Detect Mimicry Attacks
2009
11. SDNS11 Flexible and Rollback recovery for grid environment
Description: Two fault-tolerance mechanisms called Theft-Induced Check pointing
and Systematic Event Logging.
Technology: Theft-Induced Check Usage : Controlling The Overhead
2009
12. SDNS12 Accurately Measuring Denial of Service in Simulation and Testbed
Experiments
Description: Several DoS impact metrics that measure the quality of service
experienced by users during an attack. Our metrics are quantitative
Technology: Denial of Service Metrics Usage :Measure service quality
2009
Skiveprojects
Fabsys Technologies Pvt.Ltd | 7 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
13. SDNS13 Credit card fraud detection using hidden Markov model
Description: An HMM is initially trained with the normal behavior of a cardholder. If
an incoming credit card transaction is not accepted by the trained HMM with
sufficiently high probability.
Technology: Hidden Markov Model Usage :Most accurate detection
2009
14. SDNS14 In-depth packet inspection using a hierarchical pattern matching
algorithm.
Description: EHMA is a two-tier and cluster-wise matching algorithm, which
significantly reduces the amount of external memory accesses and the capacity of
memory.
Technology: Cluster-Wise Matching Usage : Fast scanning process
2010
15. SDNS15
Practical Management And Standard Administrative System
Description: To reduce the manual workload of the administrative activities,
organizations began to electronically automate many of these processes.
Technology: Electronic Automation Usage : increasing scalability
2010
16. SDNS16
Predictive Network Anomaly Detection And Visualization
Description: An approach that uses short-term observations of network features and
their respective time averaged entropies. Acute changes are localized in network
feature space using adaptive Wiener filtering.
Technology: Fisher linear discriminant Usage : Identifying Anomalies
2010
17. SDNS17
Network Traffic Monitor
Description: UniMon (Universal Network Traffic Monitor) is an external and
passive network traffic monitor designed to adapt any type of network and protocols.
Technology: Entropy of Network Traffic Usage: Monitor User Activity
2010
18. SDNS18
Steward : Scaling Byzantine Fault-Tolerant Replication To Wide
Area Networks
Description: The architecture confines the effects of any malicious replica to its local
site, reduces message complexity of wide-area communication.
Technology: Fault-Tolerant Replication Usage :Secure Transmission
2010
Do you need more Explanation for any Project? Contact Skiveprojects @ 9176990090
Skiveprojects
Fabsys Technologies Pvt.Ltd | 8 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
IEEE TRANSACTION ON : DATAMINING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDDM01 Mining Group Movement Patterns For Tracking Moving Objects
Efficiently.
Description: A local mining phase & cluster ensembling phase to find movement
patterns based on local trajectories and computing the similarity of moving objects &
identify the local group relationships.
Technology: Distributed clustering Usage : Track Moving Objects
2011
2. SDDM02 Efficient Periodicity Mining In Time Series Databases Using Suffix
Trees.
Description: The algorithm uses suffix tree as the underlying data structure. Detect
symbol, sequence (partial), and segment (full cycle) periodicity in time series.
Technology: Suffix Tree Usage : Time Efficient
2011
3. SDDM03 Automatic Discovery of Personal Name Aliases From the Web
Description: Automatically extracted lexical pattern-based approach to efficiently
extract a large set of candidate aliases from snippets retrieved from a web search engine.
Technology: Lexical Pattern Approach Usage : Information Retrieval
2011
4. SDDM04 Experience Transfer for the Configuration Tuning in Large-Scale
Computing Systems
Description: The utilization of management experiences in one system to benefit the
same management task in other systems (or current systems). Bayesian network to
model configuration dependencies.
Technology: Configuration Tuning Usage : Configuration Tuning
2011
5. SDDM05 A Web Search Engine-Based Approach to Measure Semantic
Similarity between Words.
Description: An empirical method to estimate semantic similarity using page counts
and text snippets retrieved from a web search engine for two words.
Technology: Empirical Method Usage : Improves The Accuracy
2011
6. SDDM06 Data Leakage Detection.
Description: Data allocation strategies that improve the probability of identifying
leakages and develop a model for assessing the “guilt” of agents. That improves chances
of identifying the guilty agents.
Technology: Data Allocation Strategies Usage : Identifying Guilty Party
2011
7. SDDM07 A Machine Learning Approach for Identifying Disease-Treatment
Relations in Short Texts.
Description: A ML-based methodology for building an application that is capable of
identifying and disseminating healthcare information Identifies semantic relations that
exist between diseases and treatments.
Technology: ML-based methodology Usage : Integrated Application
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 9 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
8. SDDM08 Authenticated Multistep Nearest Neighbor Search
Description: The multistep NN algorithm incurs prohibitive network overhead due to
the transmission of false hits, but are nevertheless necessary for its verification.
Technology: Query Authentication Usage : Reduces Size Of False Hit
2011
9. SDDM09 Optimizing Resource Conflicts in Workflow Management Systems
Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource
conflicts subject to temporal constraints and simultaneously optimizes throughput.
Technology: Eigen-value Analysis Usage :Minimize Resource Conflicts
2011
10. SDDM10 Closeness: A New Privacy Measure for Data Publishing
Description: A new notion of privacy called "closeness." It present the base model -
closeness, which requires that the distribution of a sensitive attribute
Technology: Closeness Usage : Offers Higher Utility
2010
11. SDDM11 Record Matching over Query Results from Multiple Web Databases.
Description: An unsupervised, online record matching method, UDD, where a given
query, can effectively identify duplicates from the query result records of multiple Web
databases.
Technology: Data Deduplication Usage : Get accurate results
2010
12. SDDM12 Towards an Effective XML Keyword Search.
Description: A novel formulae to identify the search for nodes and search via nodes of
a query, and present a novel XML TF*IDF ranking strategy to rank the individual
matches of all possible search intentions.
Technology: Relevance Ranking Usage : Rank the individual matches
2010
13. SDDM13 Bridging Domains Using World Wide Knowledge for Transfer
Learning
Description: A novel transfer learning approach, called BIG to effectively extract
useful knowledge in a worldwide knowledge base, which is then used to link the source
and target domains.
Technology: Cross-Domain Usage: Cross-domain text classification
2010
14. SDDM14 Personalizing web directories with the aid of web usage data
Description: A novel methodology that combines the users' browsing behavior with
thematic information from the Web directories.
Technology: Personalization Methodology Usage : Web Directories
2010
15. SDDM15 Filter-Based Data Partitioning for Training Multiple Classifier
Systems
Description: To assess the effectiveness of different types of training partitions, It
generated a large number of disjoint training partitions with distinctive distributions.
Technology: Clustering and Selection Usage : Classifier Systems
2010
Skiveprojects
Fabsys Technologies Pvt.Ltd | 10 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
16. SDDM16 FiVaTech: Page-Level Web Data Extraction from Template Pages
Description: An unsupervised, page-level data extraction approach to deduce the
schema and templates for each individual Deep Website, which contains either singleton
or multiple data records in one Webpage.
Technology: Multiple Trees Merging Usage : Web Data Extraction
2010
17. SDDM17 Histogram-Based Global Load Balancing in Structured Peer-to-Peer
Systems
Description: A general framework, HiGLOB, for global load balancing in structured
P2P systems. Each node with 1) a histogram manager, and 2) a load-balancing manager.
Technology: Histogram Buckets Usage : Load-Balancing
2009
18. SDDM18 Interactive Correction and Recommendation for Computer
Language Learning and Training
Description: An automated learning and skills training system for a database
programming environment that promotes procedural knowledge acquisition and skills
training.
Technology: Error Classification Usage : Personalized Guidance
2009
19. SDDM19 Optimal Lot Sizing Policies for Sequential Online Auctions
Description: A goal programming approach for estimating the bid distribution for the
bidder population from the observed bids, readily available in these auctions.
Technology: Closed-Form Solution Usage : Increases users holding costs
2009
20. SDDM20 Intrusion Detection System based on Data Mining
Description: The system that performs anomaly detection can detect intrusions known
and unknown, reduce omissions and misstatements, improve accuracy and speed of
intrusion detection.
Technology: Hidden Honey pot Usage : Solicit possible attacks
2009
21. SDDM21 Fast Query Point Movement Techniques for Large CBIR Systems
Description: A new index structure and query processing technique to improve retrieval
effectiveness and efficiency.
Technology: Relevance Feedback Usage : Retrieval Performance
2009
22. SDDM22 Exact Knowledge Hiding Through Database Extension
Description: A novel, exact border-based approach that provides an optimal solution
for the hiding of sensitive frequent item.
Technology: Exact Border Approach Usage : Hiding The Sensitive Item
2009
23. SDDM23 Hierarchical distribute p2p document clustering and clustering
summarization
Description: A Hierarchically distributed Peer-to-Peer (HP2PC) architecture and
clustering algorithm. The architecture is based on a multilayer overlay network of peer
neighborhoods.
Technology: distributed key phrase extraction Usage : Global Clustering
2009
Skiveprojects
Fabsys Technologies Pvt.Ltd | 11 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
24. SDDM24
Vide: A Vision-Based Approach For Deep Web Data Extraction
Description: A novel technique is proposed for data extraction from deep Web pages
using primarily visual features. A new performance measure, revision, is proposed to
evaluate Web data extraction tools.
Technology: Visual Features Of Web Pages Usage : Web data extraction
2010
25. SDDM25
Multidimensional Suppressions For K-Anonymity
Description: A new method for achieving k-anonymity named K-anonymity of
Classification Trees Using Suppression (kACTUS).
Technology: De-Indentified Data Usage : Multidimensional Suppression
2010
26. SDDM26
Voting Systems With Trust Mechanisms In Cyberspace:
Vulnerabilities And Defenses
Description: Proposing two defense schemes 1. Hide correlation knowledge from
attackers 2. Introduce robustness-of-evidence, a new metric, in trust calculation
Technology: RepTrap Usage : Reduce rate of attacks
2010
IEEE TRANSACTION ON: IMAGE PROCESSING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1. SDIP01 1-D Transforms for the Motion Compensation Residual
Description: An adaptive auto-covariance characterization for the MC-residual that
shows some statistical differences between the MC-residual and the image.
Technology:1D directional transform Usage: Conventional Transforms
2011
2. SDIP02 A Stochastic Approach to Image Retrieval Using Relevance
Feedback and Particle Swarm Optimization
Description: An innovative approach is proposed with combination of relevance
feedback (RF) approach & evolutionary stochastic algorithm, called particle swarm
optimizer (PSO).
Technology: Particle Swarm Optimizer Usage : Visual Query
2011
3. SDIP03 Contourlet-Based Image Watermarking Using Optimum Detector in
a Noisy Environment
Description: A new Watermarking technique for eliminating the noises in the
environment by using the optimum detector.
Technology: General Gaussian Distribution Usage : Watermarking
2010
Skiveprojects
Fabsys Technologies Pvt.Ltd | 12 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4. SDIP04 Latent Finger print matching
Description: A system for matching latent fingerprints found at crime scenes to rolled
fingerprints enrolled in law enforcement databases with extended features.
Technology: Matching Fingerprints Usage : fingerprint quality measure
2010
5. SDIP05 Reversible Image Watermarking Using Interpolation Technique
Description: A novel reversible watermarking scheme using an interpolation technique,
which can embed a large amount of covert data into images with imperceptible
modification.
Technology: Interpolation Technique Usage :Higher Image Fidelity
2010
6. SDIP06 Generic Lossless visible Watermarking
Description: The new watermarking methosd is based on the use of deterministic one-
to-one compound mappings of image pixel values.
Technology:1-To-1 Compound Mappings Usage : Recover Image
2010
7. SDIP07 Bridging The Semantic Gap Between Image Contents And Tags
Description: A unified framework which stems from a two-level data fusions between
the image contents and tags: 1) A unified graph is built and; 2) A novel random walk
model is then proposed.
Technology: Random Walk Model Usage : Image Annotation
2010
IEEE TRANSACTION ON: DISTRIBUTED NETWORKING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1. SDNW01 An Authentication Code Against Pollution Attacks in Network
Coding
Description: Unconditionally secure authentication code for multicast network coding,
where the trusted authority gives the key rights to the destinations and intermediate
nodes.
Technology: Secure Authentication Code Usage :Pollution Is Canceled
2011
2. SDNW02 Network-Coding Multicast Networks With QoS Guarantees
Description: Proposing a System where Each edge node admits not more than a
specified amount of traffic; the network will never experience link congestion.
Technology: Network Coding Usage : Multicast Network
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 13 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
3. SDNW03 A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless
Networks
Description: TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling
of transmissions within the TCP Congestion window.
Technology: Rate-Based Scheduling Usage :Overcome deficiencies
2011
4. SDNW04 On the Fair Coexistence of Loss-and Delay-Based TCP
Description: A novel delay-based additive increase, multiplicative decrease (AIMD)
congestion control algorithm which depends on a nonzero average queuing delay.
Technology: Congestion Control Usage : Fair Coexistence Possible
2011
5. SDNW05 Energy-Efficient Protocol for Cooperative Networks
Description: Derive the upper bound of the capacity of the protocol, and it analyze the
end-to-end robustness of the protocol to data-packet loss, along with the tradeoff
between energy consumption and error rate.
Technology: Cooperative Communication Usage : Congestion Control
2011
6. SDNW06 DTRAB: Combating Against Attacks on Encrypted Protocols
Through Traffic-Feature Analysis
Description: An anomaly-based detection system by using strategically distributed
monitoring stubs (MSs). The MSs, by sniffing the encrypted traffic, extract features for
detecting these attacks.
Technology: Anomaly-Based Detection Usage : Avoid False Alarms
2010
7. SDNW07 Efficient and Dynamic Routing Topology Inference From End-to-
End Measurements
Description: A framework for designing topology inference algorithms based on
additive metrics. The framework can flexibly fuse information from multiple
measurements to achieve better estimation accuracy.
Technology: Topology Inference Usage : Faster Convergence Rate
2010
8. SDNW08 A Queuing Model for Evaluating the Transfer Latency of Peer-to-
Peer Systems
Description: A new Modeling Framework for the peers that accounts for the file size
distribution, the search time, load distribution at peers, and number of concurrent
downloads allowed by a peer.
Technology: Framework For Peers Usage : Reduces Probing Overhead
2010
Skiveprojects
Fabsys Technologies Pvt.Ltd | 14 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
9. SDNW09 An Efficient and Adaptive Decentralized File Replication Algorithm
in P2P File Sharing Systems
Description: This paper presents an Efficient and adaptive decentralized file replication
algorithm (EAD) that achieves high query efficiency and high replica utilization at a
significantly low cost.
Technology: EAD file replication Usage : Overloaded node reduction
2010
10. SDNW10 Traceback of DDoS Attacks Using Entropy Variations
Description: A novel trace back method for DDoS attacks during the process. The
proposed strategy is memory non-intensive, efficiently scalable, robust against packet
pollution.
Technology: Entropy Variations Usage : Memory Non-Intensive
2010
11. SDNW11 POPI: A User-Level Tool for Inferring Router Packet Forwarding
Priority
Description: An end-to-end approach for PFP inference and its associated tool, POPI. It
enables users to discover such network policies through measurements of packet losses
of different packet types.
Technology: End-To-End Approach Usage : Packet forwarding priority
2010
12. SDNW12 A Directory Service for Perspective Access Networks
Description: A perspective access network (PAN) is a peer-to-peer overlay network
that incorporates routing and directory services that allow network perspective-sharing
and nonhierarchical organization.
Technology: Directory Service For Networks Usage : Network Sharing
2010
13. SDNW13 Web User-Session Inference by Means of Clustering Techniques
Description: A novel methodology with clustering techniques to identify Web user-
sessions without requiring an a priori definition of threshold values.
Technology: Web Usage Mining Techniques Usage : User-Sessions
2010
14. SDNW14 Mitigating Attacks on Open Functionality in SMS-Capable Cellular
Networks
Description: A combination of modeling and simulation to demonstrate the feasibility
of targeted text messaging attacks.
Technology: Queue Management Usage: Mitigating messaging attacks.
2010
15. SDNW15 Plexus-A scalable p2p Protocol enabling efficient subset search
Description: Plexus, a peer-to-peer search protocol that provides an efficient
mechanism for advertising a bit-sequence (pattern) & discovering it using any subset of
its 1-bits.
Technology: Peer-To-Peer Search Usage : Discovery Of Information
2009
Skiveprojects
Fabsys Technologies Pvt.Ltd | 15 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
16. SDNW16 Incentive-Based Scheduling for Market-Like Computational Grids
Description: An incentive-based scheduling scheme, which utilizes a peer-to-peer
decentralized scheduling framework, a set of local heuristic algorithms, and three
market instruments of job announcement, price, and competition degree.
Technology: Heuristic Algorithms Usage : Fair Profit Allocation
2009
17. SDNW17 Multiple Routing Configurations for Fast IP Network Recovery
Description: MRC is strictly connectionless, and assumes only destination based hop-
by-hop forwarding, keeps additional routing information in the routers, and allows
packet forwarding to continue.
Technology: Hop-By-Hop Forwarding Usage : Load Distribution
2009
18. SDNW18
Distributed Computing For E-Learning
Description: Applying Distributed Computing strategy in E-Learning Environment to
make the learning process more interactive.
Technology: Semantic Applications Usage: Centralized E-Learning
2010
IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SDP01 A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad
hoc Networks
Description: Cooperative Diversity MAC, which exploits the cooperative communication
capability of the physical layer to improve robustness in wireless ad hoc networks.
Technology: Partner Selection Usage : Mitigates Interference
2011
2 SDP02 Collective Receiver-Initiated Multicast for Grid Applications
Description: Present Robber, a collective, receiver-initiated, high-throughput multicast
approach inspired by the Bit Torrent protocol to maximize the throughput between multiple
cluster computers.
Technology: High-Throughput Multicast Usage: Static Load Balancing
2011
3 SDP03 Compressing Network Access Control Lists
Description: ACL Compressor, a framework that can significantly reduce the number of
rules in an access control list while maintaining the same semantics.
Technology: Dynamic Programming Usage : Access Control Lists
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 16 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4 SDP04 A Distributed Algorithm for the Replica Placement Problem
Description: A new Distributed Algorithm to Improve the efficiency of object replication
within a given distributed replication group.
Technology: Distributed Approximation Usage : Object Replication
2011
5 SDP05 A Generic Framework for Three-Factor Authentication: Preserving
Security and Privacy in Distributed Systems
Description: A systematic approach for authenticating clients by three factors, namely
password, smart card, and biometrics.
Technology: 3-Factor Authentication Usage: Identity Of Remote Client
2011
6 SDP06 TASA: Tag-Free Activity Sensing using RFID Tag Arrays
Description: TASA For location sensing and frequent route detection. TASA can locate
objects more accurately.
Technology: Frequent Route Detection Usage : Location Sensing
2011
7 SDP07 Flexible Robust Group key Agreement
Description: A new robust group key agreement protocol (GKA) allows a set of players to
establish a shared secret key, regardless of network/node failures.
Technology: Group Key Agreement Usage: logarithmic-sized message
2011
8 SDP08 Symmetric Key Approaches to Securing BGP-A Little Bit Trust is
Enough
Description: Key approach for Trade-off between efficiency and security by giving a little
dose of trust to BGP routers.
Technology: Central Key Distribution Usage : Signature Verification
2011
DO YOU HAVE OWN CONCEPT!!! Come Let’s Discuss at Skiveprojects corporate office.
What is your department!! Now, you can Select project based on your dept at skiveprojects.com
Need BASEPAPER or ABSTRACT ? Send a mail to skiveprojects@gmail.com
Skiveprojects
Fabsys Technologies Pvt.Ltd | 17 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
JAVA IEEE TITLES
IEEE TRANSACTION ON : DATAMINING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SJDM01 Authenticated Multistep Nearest Neighbor Search
Description: We propose a new technique multi-step NN Algorithm that reduces the size
of each false hit. Moreover, we generalize our solution for a distributed setting, where the
database is horizontally partitioned over several servers.
Technology: Query Authentication Usage : Reduces Size Of False Hit
2011
2. SJDM02 A Machine Learning Approach for Identifying Disease-Treatment
Relations in Short Texts
Description: In this we Describes a ML-based Technology for identifying and
disseminating healthcare information. It extracts sentences from published medical papers
that mention diseases and treatments in short text format. Technology: ML-based Technology Usage : Integrated Application
2011
3 SJDM03 Automatic Discovery of Personal Name Aliases from the Web
Description: We describes the method numerous baselines and previously proposed
name alias extraction methods, achieving a statistically significant mean reciprocal rank
(MRR) of 0.67.
Technology: Mean Reciprocal Rank Usage: Information Retrieval
2011
4 SJDM04 Design and Implementation of Enterprise Financing Decision Model
Based on Data Mining
Description: In proposed system we have response policy such as Conservative,
Aggressive, and Fine grant and here we are going to implement hashed messaged
authentication (HMAC) for secure process.
Technology: Financing decision Usage: Heterogeneous data integration
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 18 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
5 SJDM05 Enhancing the k-means clustering algorithm by using a O(n
logn)heuristic method for finding better initial centroids.
Description: This project proposes an improvement on the classic k-means algorithm to
produce more accurate clusters. For that we comprises of a O(n logn) heuristic method,
based on sorting and partitioning the input data, for finding the centroids .
Technology: Enhanced k-meansAlgorithm Usage : Accurate Clusters
2011
6 SJDM06 Clustering with Multi-Viewpoint based Similarity Measure
Description: Two criterion functions for document clustering are proposed based on this
new measure. We compare them with several well-known similarity and dissimilarity with
dataset from this we are Getting accurate cluster.
Technology: Text mining Usage : Informative Assessment
2011
7 SJDM07 Publishing Search Logs – A Comparative Study of Privacy Guarantees
Description: We propose a k-anonymity in search log publishing. comparable utility to
k−anonymity while at the same time it achieving much stronger privacy guarantee
Technology: Security, integrity, and protection Usage : Probabilistic Privacy
2011
8 SJDM08 Bin Rank: Scaling Dynamic Authority-Based Search Using
Materialized Sub graphs
Description: we shows Dynamic authority-based keyword search algorithms, such as
Object Rank and personalized Page Rank, link information to provide high quality, high
recall search in databases, and the Web.
Technology: Object Rank Usage: High Quality Search Results
2011
9 SJDM09 Asking Generalized Queries to Domain Experts to Improve Learning
Description: we propose a novel active learning algorithm that asks good generalized
queries. It improves the knowledge of domain experts.
Technology: Generalized query Usage: Good Generalized Queries
2011
10 SJDM10 Constrained Skyline Query Processing against Distributed Data Sites
Description: We first propose a partition algorithm that divides all data sites into
incomparable groups. We also implement multi filtering technique to improve the skyline
query processes.
Technology: Filtering Point Usage: Parallel Skyline Query Processing
2011
11 SJDM11 Managing Multidimensional Historical Aggregate Data in
Unstructured P2P Networks
Description: In this project historical multidimensional data aggregates and supported by
P2P-based framework which provides efficient and robust query evaluation.
Technology: Data compression Usage : Extraction of Aggregates
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 19 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
12 SJDM12 Knowledge-Based Interactive Post mining of Association Rules Using
Ontologies
Description: This paper proposes a prune and filter discovered rules. And it describes
ontologies to improve the integration of user knowledge in the post processing.
Technology: Data exploration and discovery Usage : Prune And Filter Rule
2011
13 SJDM13 C-Trend : Temporal Cluster Graphs for Identifying and Visualizing
Description: This paper introduces Cluster-based Temporal Representation of Event
Data (C-TREND), that system implements dendogram algorithm for sorting. It takes very
less time for sorting.
Technology: Temporal Data Mining Usage : Discover Patterns
2011
IEEE TRANSACTION ON : NETWORK SECURITY
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJNS01 Flexible Robust Group Key Agreement
Description: We propose a novel 2-round group key agreement protocol .We show that
the new protocol implies a fully-robust group key agreement with logarithmic-sized
messages and expected round complexity close to 2 and finding random node faults.
Technology: fault-tolerance Usage: Logarithmic-Sized Messages
2011
2 SJNS02 Replica Placement for Route Diversity in Tree-Based Routing
Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
diversity for these DHTs. Using this We prove that this placement creates disjoint
routes and find the replication degree necessary to produce a desired number of disjoint
routes.
Technology: Route Diversity Usage: Response Time Reduced
2011
3 SJNS03 Design and Implementation of an Intrusion Response System for
Relational Databases
Description: we propose Joint Threshold Administration Model that efficiently
searches the policy database for policies that match an anomalous request. This is used
to overcoming the policy matching problem.
Technology: Threshold signatures Usage: Specify Appropriate Response
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 20 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4 SJNS04 A Puzzle-Based Defense Strategy Against Flooding Attacks Using
Game Theory
Description: It describes the game theory to propose a series of optimal puzzle-based
strategies for handling increasingly sophisticated flooding attack.
Technology: Client-Puzzle Approach Usage : Handling Distributed Attacks
2010
5 SJNS05 Layered Approach Using Conditional Random Fields for Intrusion
Detection
Description: We propose high attack detection accuracy that can be achieved by
using Conditional Random Fields and high efficiency it show that our system is
robust and is able to handle noisy data without compromising performance
Technology: Decision trees Usage: Detect Malicious Activities
2010
6 SJNS06 An Identity-Based Security System for User Privacy in Vehicular Ad
Hoc Networks
Description: We propose a privacy-preserving defense technique For network
authorities to handle misbehavior in VANET access and it challenge that privacy
provides avenue for misbehavior.
Technology: Identity-Based Cryptography Usage: Privacy And Traceability
2010
IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJP01 Joint Optimization of Complexity and Overhead for the Routing in
Hierarchical Networks
Description: We show that area-based link-vector algorithm (ALVA) which is used to
analyze the routing complexity and the routing table size in the hierarchical network.
Technology: Area-Based Link-Vector Usage: Find Best Routing Policy
2011
2 SJP02 Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems(S)
Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
sequential probability ratio test in Unstructured Peer-to-Peer Systems for finding
anomaly intruder.
Technology: Mutual Anonymity Usage: Achieving Anonymity
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 21 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
3 SJP03 Cooperative Channelization in Wireless Networks with Network
Coding
Description: We propose cooperative channelization technique, this is used to find
which portions of the transmission media are allocated to links which are congested at
the point and where network coding cannot efficiently repair loss.
Technology: Resource Reservation Usage: Reduce No of Transmissions
2011
4 SJP04 Load Balance with Imperfect Information in Structured Peer-to-
Peer Systems
Description: We propose a novel load balancing algorithm it is used to estimate
the probability distributions of the capacities of peers and the loads of virtual servers.
Technology: Virtual Server Usage : Probability Distributions
2011
IEEE TRANSACTION ON: DISTRIBUTED NETWORKING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJNW01 Energy-Efficient Protocol for Cooperative Networks
Description: We propose a cooperative communication protocol, which is used to
controlling traffic, and delay process. And we analyzed the robustness of the protocol
to data packet loss.
Technology: cooperative communication protocol Usage : Congestion Control
2011
2 SJNW02 Parametric Methods for Anomaly Detection in Aggregate Traffic
Description: We introduce the bi-variate Parametric Detection Mechanism (bPDM),
which can detect anomalies and low-rate attacks in a few seconds.
Technology: Bi-variate Parametric Detection Usage: Detect Network Anomalies
2011
3 SJNW03 Self-Reconfigurable Wireless Mesh Networks
Description: This paper presented an autonomous network reconfiguration system
(ARS) that enables a multi-radio WMN to autonomously recover from wireless link
failures.
Technology: Cooperatively reconfiguration Usage: Preserve Network Performance
2011
Skiveprojects
Fabsys Technologies Pvt.Ltd | 22 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4 SJNW04 Rumor Riding: Anonymzing Unstructured Peer-to-Peer Systems
Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
sequential probability ratio test for finding anomaly intruder.
Technology: Mutual Anonymity Usage : To Achieve Anonymity
2011
5 SJNW05 Joint Optimization of Complexity and Overhead for the Routing in
Hierarchical Networks
Description: We show that area-based link-vector algorithm (ALVA) which is used is
to analyze the routing complexity and the routing table size in the hierarchical
network.
Technology: Area-based link-vector Usage: Find Best Routing Policy
2011
6 SJNW06 Cooperative Channelization in Wireless Networks with Network
Coding
Description: We propose cooperative channelization, this is used to find which
portions of the transmission media are allocated to links and which are congested at the
point and where network coding cannot efficiently repair loss.
Technology: Resource Reservation Usage : Reduce No of Transmissions
2011
7 SJNW07 Load Balance with Imperfect Information in Structured Peer-to-
Peer Systems
Description: We propose a novel load balancing algorithm it is used to estimate the
probability distributions of the capacities of peers and the loads of virtual servers
Technology: Virtual Server Usage : Load-Balancing
2011
8 SJNW08 Path Diversity Over Packet Switched Networks: Performance
Analysis and Rate Allocation
Description: In this paper, Forward Error Correction (FEC) is applied across multiple
independent paths to enhance the end-to-end reliability. We prove that the probability of
irrecoverable loss (PE) decays exponentially with the number of paths.
Technology: Gilbert-Elliot channels Usage : End-To-End Reliability
2010
9 SJNW09 Normalized queuing delay: congestion control jointly utilizing delay
and marking
Description: In this paper, we consider the design of a congestion control scheme and
the concept of normalized queuing delay. Which is used to reduces the bottleneck
problem. And controlling traffic congestion
Technology: Network Calculus Usage : Congestion Measure
2010
Skiveprojects
Fabsys Technologies Pvt.Ltd | 23 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
10 SJNW10 Multiple Routing Configurations For Fast IP Network Recovery
Description: we present a new recovery scheme called MRC is based on keeping
additional routing information in the routers, and allows packet forwarding to continue
on an alter native output link immediately after the detection of a failure.
Technology: Hop-by-Hop Forwarding Usage: Handle Link And Node Failures
2009
11 SJNW11 Differentiated bandwidth allocation with TCP protection in core
routers
Description: We present an Active Queue Management (AQM) scheme. which draws
a packet at random from the buffer, compares it with the arriving packet, and drops both
if they are from the same flow.
Technology: Active Queue Management (AQM) Usage : Flows In Same Priority
2009
12 SJNW12 Node Isolation Model And Age-Based Neighbor Selection In
Unstructured P2p Networks
Description: we show that two age-biased neighbor-selection strategies, which
dramatically reduces the probability of user isolation and graph partitioning compared
with uniform selection of neighbors.
Technology: Node isolation model Usage: Reduce Probability Of User Isolation
2009
13 SJNW13 A Traffic Engineering Approach For Placement And Selection Of
Network Services
Description: We propose service placement problem which is used finding the best
location for each service gateway, and selecting the best service gateway for each flow.
Technology: Service gateway placement Usage : Minimize Traffic Flow
2009
14 SJNW14 Dynamic Routing With Security Consideration
Description: We proposing a dynamic routing algorithm such as the Routing
Information Protocol in wired networks and Destination-Sequenced Distance Vector
protocol in wireless networks that could randomize delivery paths for data transmission.
Technology: Security-enhanced data transmission Usage: Defeat Various Threats
2009
15 SJNW15 Colored Tree
Description: We show through extensive simulations that the average length of the
disjoint paths obtained using the SimCT algorithm is lesser compared to the previously
known techniques.
Technology: SimCT algorithm Usage: Minimize Cost Of Routing
2009
You Can Register project free at skiveprojects.com Technical Assistance any time @ 9176990090
Skiveprojects
Fabsys Technologies Pvt.Ltd | 24 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
IEEE TRANSACTION ON: IMAGE PROCESSING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1 SJIP01 Graph Cuts for Curvature Based Image Denoising
Description: we will present an efficient minimization algorithm based on graph cuts
for minimizing the energy in the Euler’s elastic model which is used to minimizing the
staircase effects.
Technology: Binary MRF models Usage :Image Denoising
2011
2. SJIP02 Image Denoising in Mixed Poisson–Gaussian Noise
Description: We propose a general Technology (PURE-LET) to design and optimize a
wide class of transform domain thresholding algorithms for denoising images corrupted
by mixed Poisson-Gaussian noise.
Technology: Linear expansion of thresholds Usage : Image Denoising
2011
3 SJIP03 Practical Bounds on Image Denoising: From Estimation to
Information
Description: We show that the, cluster co variances and level of redundancy for
patches in the image, can be estimated directly from the noise corrupted image.
Technology: Shannon entropy Usage : Noise-Free Image
2011
4 SJIP04 From Tiger to Panda: Animal Head Detection
Description: we proposed two detection algorithms, namely Brute force detection and
Deformable detection for capture the shape and texture features on animal head.
Technology: Fusion Usage: Animal Head Detection
2011
5 SJIP05 On High-Order Denoising Models and Fast Algorithms for Vector-
Valued Images
Description: we introduce three high-order and curvature-based model and a fast multi
grid algorithm which proves image denosing calculation. And removes staircase effects.
Technology: partial differential equations(PDEs) Usage :Vector Denoising
2010
6 SJIP06 A Perceptually Relevant Approach to Ringing Region Detection
Description: The proposed ringing regions detection method which is used to show
the ringing regions resulting images in psycho visual experiment
Technology: Luminance masking Usage : Automatic Detection
2010
Skiveprojects
Fabsys Technologies Pvt.Ltd | 25 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
NETWORK SIMULATOR (NS2) TITLES
IEEE TRANSACTION ON: NS2 - NETWORK SIMULATOR
Domain: NS2
S.NO CODE PROJECT TITLES Published
year
1. S11NS01 Secure Trust Management Model for Peer-to-Peer File Sharing System 2011
2. S11NS02 Channel-Aware Routing in MANETs With Route Handoff 2011
3. S11NS03 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2011
4. S11NS04 ConverSS: A Hybrid MAC/Routing Solution for Small-Scale,
Convergecast Wireless Networks
2011
5. S11NS05 Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks
Using SVM and FDA
2011
6. S11NS06 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
Networks
2011
7. S11NS07 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
Networks
2010
8. S11NS08 Trust Management in Mobile Ad Hoc Networks Using a Scalable
Maturity-Based Model
2010
9. S11NS09 Channel Assignment for Multihop Cellular Networks: Minimum Delay 2010
Training provided by experienced IT Professionals.
Own Concepts can be developed in NS2
Skiveprojects
Fabsys Technologies Pvt.Ltd | 26 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
APPLICATION PROJECT TITLES
Web and Windows Application: DOT NET
REALTIME APPLICATION PROJECT TITLES
S.No CODE PROJECT TITLES LANGUAGE
1 SDAP01 An Intelligent tutoring system with web enhanced training
assessments
Dotnet
2 SDAP02 Role Engineering via role based access control Dotnet
3 SDAP03 A Relation-Based Page Ranking in Web Search Engines Dotnet
4 SDAP04 Database Enterprise Manager Dotnet
5 SDAP05 Online Bug tracking System Dotnet
6 SDAP06 Trace back of DoS Attacks using Entropy Variations Dotnet
7 SDAP07 A new steganographic method based on information sharing via
PNG images
Dotnet
8 SDAP08 Step Construction of Visual Cryptography Schemes (VCS) Dotnet
9 SDAP09 Efficient Compression of Encrypted Grayscale Images Dotnet
10 SDAP10 Latent Fingerprint Matching Dotnet
11 SDAP11 Online Data leakage detection Dotnet
12 SDAP12 Online Buying and Selling System. Dotnet
13 SDAP13 Secure Mobile health care for rural with electronic alerts Dotnet
14 SDAP14 Southern Railway Recruitment Portal Dotnet
15 SDAP15 Web-based Recruitment Process System for the HR group for a
company
Dotnet
16 SDAP16 Fast firewall implementations for software and hardware-based
routers
Dotnet
Skiveprojects
Fabsys Technologies Pvt.Ltd | 27 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
17 SDAP17 File Replication Detection Algorithm in P2P File Sharing Systems Dotnet
18 SDAP18 Dynamic Routing Topology with Security Consideration Dotnet/Java
19 SDAP19 Incentive-Based Scheduling for Market-Like Computational Grids Dotnet
20 SDAP20 Approximate query processing in peer to peer networks Dotnet
21 SDAP21 XML Based Ranking and Keyword Search Dotnet
22 SDAP22 Secured Data Object Replication in data grid Dotnet
23 SDAP23 Medical Anonymity Processing And Publishing Dotnet
24 SDAP24 Object Tracking System Dotnet
25 SDAP25 Secure Data Transformation System Dotnet
26 SDAP26 Effective blogger with XML interchange Dotnet
27 SDAP27 Alert based monitoring and scheduling on Proportional shares Dotnet
28 SDAP28 Exact Knowledge hiding for automobiles industry Dotnet
29 SDAP29 Efficient Property Interpreter Dotnet
30 SDAP30 Blind Banking Transformation System Dotnet
31 SDAP31 Security and Privacy for Social Networks. Dotnet
32 SDAP32 Still to animation movie creation Dotnet
33 SDAP33 Medical anonymity processing and publishing Dotnet
34 SDAP34 Global roaming and target tracking in mobile sensor network Dotnet
35 SDAP35 Development Of A Campaign Information System Dotnet
36 SDAP36 Perspective Access Management Dotnet
37 SDAP37 Email Proxy Server with Secure Service Dotnet
38 SDAP38 Online Bus Ticket Booking Dotnet
39 SDAP39 Customer Relationship Management
Dotnet
Skiveprojects
Fabsys Technologies Pvt.Ltd | 28 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
APPLICATION PROJECT TITLES
Web and Windows Application: JAVA
REALTIME APPLICATION PROJECT TITLES
DOMAIN: JAVA
S.NO CODE PROJECT TITLES DOMAIN
1 SJAP Normalized queuing delay: congestion control jointly utilizing
delay and marking
Java
2 SJAP Distributed Algorithm for Minimum path Java
3 SJAP Path Diversity for packets Java
4 SJAP Node isolation model and age-based neighbor selection in
unstructured p2p networks
Java
5 SJAP An Identity-Based Security System for User Privacy in Vehicular
Ad Hoc Networks
Java
6 SJAP Layered Approach Using Conditional Random Fields for Intrusion
Detection.
Java
7 SJAP A Puzzle based defense strategy against flooding attacks using
game theory
Java
8 SJAP Adaptive Join Operators for Result Rate Optimization on
Streaming Inputs
Java
9 SJAP Bin Rank: Scaling Dynamic Authority-Based Search Using
Materialized Sub graphs
Java
Skiveprojects
Fabsys Technologies Pvt.Ltd | 29 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
For Application Project Description, visit Skiveprojects.com!!
Get free Project Explanation @ 9176990090, 044-42712737
10 SJAP NNexus: An automatic linker for collaborative web based corpora Java
11 SJAP SSUM: Smart Server Update Mechanism for Maintaining Cache
Consistency in Mobile Environments
Java
12 SJAP CAR: context aware adaptive routing for delay tolerant mobile
networks
Java
13 SJAP Generic Loss Less Watermarking Java
14 SJAP Unseen Visible Water Marking Java
15 SJAP Colored tree Java
16 SJAP QKDP: Provably secured third party authenticated quantum key
distribution protocol
Java
17 SJAP Controlling IP spoofing through inter-domain packet filters Java
18 SJAP A service centric multicast architecture and routing protocol Java
19 SJAP Enhancing search performance in unstructured p2p networks
based on users’ common interest
Java
20 SJAP Two Techniques for Fast computation of constrained shortest path Java
Skiveprojects
Fabsys Technologies Pvt.Ltd | 30 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
FLASH AND ANIMATION TITLES
REALTIME FLASH & ANIMATION TITLES
DOMAIN: FLASH AND ANIMATION
S.NO CODE PROJECT TITLES
1. SFLA01 Revealing multiple photos with a Grid Effect Animation
2. SFLA02 Create a 360° panorama viewer with AS3
3. SFLA03 Efficient Animation handling methodology in ActionScript
4. SFLA04 Loading multiple XML data in Flash using ActionScript
5. SFLA05 New Interactive learning environment in flash
6. SFLA06 Multiple Movie clips usage in flash demonstration
7. SFLA07 ActionScript for exploring real time environment
8. SFLA08 Inventory Management System with ActionScript
9. SFLA09 Novel E-learning process with ActionScript
10. SFLA10 Flash Animation with XML Horizontal Accordion
11. SFLA11 Image Appearance Effect in flash
12. SFLA12 A flash method to reveal hidden photos using Mouse movement strategy
13. SFLA13 Making interactive flash games using ActionScript
14. SFLA14 Database management in flash with key features
15. SFLA15 A Random Animated Color Text Effect using Action Script
Skiveprojects
Fabsys Technologies Pvt.Ltd | 31 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
EMBEDDED IEEE PROJECT TITLES
TOPICS BASED ON IEEE 2011- EMBEDDED SYSTEM
S.NO CODE PROJECT TITLES
1. SEI1101 A wearable device for recording of bio potentials and body movements.
2. SEI1102 Research on the Integrated Management of Highway Based on Radio Frequency
Identification Technology.
3. SEI1103 Design and Implementation of a n Embedded Home Surveillance System with Ultra-Low
Alert Power.
4. SEI1104 Next Smart Sensors Generation.
5. SEI1105 Radio Frequency-based Body Temperature and Walking Steps Monitor of Dairy Cow.
6. SEI1106 Wireless Sensor Network for Precise Agriculture Monitoring.
7. SEI1107 A Virtual Control System for Automotive and Railway Industries.
8. SEI1108 Research on Auto monitoring System for cold storage temperature based on VB.
9. SEI1109 Research on water-saving irrigation automatic control system based on Internet.
10. SEI1110 Intelligent Sensor with Data Fusion to Improve the Care and Management of Water.
11. SEI1111 Implementation of CAN bus in an autonomous All-Terrain Vehicle.
12. SEI1112 Remote Control of Robot Arm with five DOF.
13. SEI1113 Anti-Theft Tracking System for Automobiles.
14. SEI1114 Capacity Value of Wind Power, Calculation, and Data Requirements: the Irish Power
System Case.
15. SEI1115 PIC18LF4620 Based Customizable Wireless Sensor Node to Detect Hazardous Gas
Pipeline Leakage.
16. SEI1116 A Self-acting Water Pump Control System for Residential Buildings Based on
Resonance Water Level Sensor.
Skiveprojects
Fabsys Technologies Pvt.Ltd | 32 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
17. SEI1117 Wireless Integrated Robots for Effective Search and Guidance of Rescue Teams.
18. SEI1118 An Obstacle Signaling System For The Blind.
19. SEI1119 A Low-cost Embedded Web-Server for an Institutional e-Learning Strategy.
20. SEI1120 Hardware Design of River Flow Velocity Monitoring System.
TOPICS BASED ON IEEE 2010- EMBEDDED SYSTEM
S.NO CODE PROJECT TITLES
1. SEI1001 Design of remote data monitoring and recording system based on arm
2. SEI1002 Design and implementation of remote meter reading system
3. SEI1003 Construction of intelligent greenhouse control system based on can bus
4. SEI1004 Development of remote waste gas monitor system
5. SEI1005 Electronic toll collection system based on global positioning system technology
6. SEI1006 The system of wireless smart house based on gsm and zigbee
7. SEI1007 Developing a voice control system for zigbee-based home automation networks
8. SEI1008 A kind of design schema of wireless smart water meter reading system based on zigbee
technology
9. SEI1009 Cellular phone based biomedical system for health care
10. SEI1010 Smart parking reservation system using short message services (sms)
Yeah!! Get explanation for Embedded Projects @ Skiveprojects. Contact: 9176990090
Own Concepts can be done!!
Skiveprojects
Fabsys Technologies Pvt.Ltd | 33 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
EMBEDDED NON IEEE TITLES
EMBEDDED NON IEEE TITLES
DOMAIN: EMBEDDED SYSTEM
S.NO CODE PROJECT TITLES
1. SENI1101 Zigbee Based Secured Communication with RSA Encryption
2. SENI1102 Zigbee based speed control of AC/Induction motor
3. SENI1103 Zigbee based power plant monitoring System
4. SENI1104 Password enabled GSM Based Mobile switching
5. SENI1105 Industrial Power Monitoring and Intimation through GSM
6. SENI1106 Data Acquisition System With GSM Modem
7. SENI1107 Gas detection Robot
8. SENI1108 Automatic cleaning Robot
9. SENI1109 Automated Environment Monitoring Robot
10. SENI1110 Programmable RTC based street light controller
11. SENI1111 Automatic Room light controller with visitor counter
12. SENI1112 Rechargeable Prepaid Energy Billing System
13. SENI1113 Plant Humidity Monitoring for Textile Industries
14. SENI1114 Car Air conditioner control using temperature sensor
15. SENI1115 Industrial monitoring System for Textile industry.
Skiveprojects
Fabsys Technologies Pvt.Ltd | 34 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
16. SENI1116 Multi Parameter and control using GSM
17. SENI1117 Heart beat analyzer and intimation through SMS.
18. SENI1118 Schedule follower system for truck transportation using GPS
19. SENI1120 Measurement System for Green House
20. SENI1121 Multi channel Fire monitor with alarm
21. SENI1122 Online temperature monitoring
22. SENI1123 PWM based DC motor speed controller
23. SENI1124 I2C based Power plant monitoring System
24. SENI1125 I2C based environmental monitoring System
25. SENI1126 CAN based Encrypted communication System
26. SENI1127 RFID based tollgate billing system
27. SENI1128 SMS content printer
28. SENI1129 Energy meter billing system
29. SENI1130 Bus Ticket printing System
Own Concepts in Embedded Systems!! Contact: Skiveprojects@gmail.com
Post Own Concept in Skiveprojects.com & Get Assistance Now!!!
Technical Appointment @ 9176990090
Skiveprojects
Fabsys Technologies Pvt.Ltd | 35 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
MATLAB IEEE TITLES
IEEE TRANSACTION ON COMMUNICATION
DOMAIN: MATLAB
S.NO CODE PROJECT TITLES Published
Year
1. SMCO1 A novel algorithm of seeking FRFT order for speech processing 2011
2. SMCO2 An Energy-Efficient Communication Scheme for Wireless Networks: A
Redundant Radix-Based Approach
2011
3. SMCO3 Defects Detection of Cold-roll Steel Surface Based on MATLAB 2011
4. SMCO4 Equal Gain Transmission with Antenna Selection in MIMO
Communications
2011
5. SMCO5 Image Deblurring and Super-Resolution by Adaptive Sparse Domain
Selection and Adaptive Regularization
2011
6. SMCO6 List-Based Group-Wise Symbol Detection for Multiple Signal
Communications
2011
7. SMCO7 Opportunistic Relaying for MIMO Wireless Communication:
Relay Selection and Capacity Scaling Laws
2011
8. SMCO8 Performance Analysis of Two-Way Relaying with Non-Coherent
Differential Modulation
2011
9. SMCO9 Unified Error-Rate Analysis of OFDM over Time-Varying Channels 2011
10.
SMCO10 Whisper-Island Detection Based on Unsupervised Segmentation With
Entropy-Based Speech Feature Processing
2011
For more MATLAB Projects, visit Skiveprojects.com
Skiveprojects
Fabsys Technologies Pvt.Ltd | 36 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
IEEE TRANSACTION ON IMAGEPROCESSING
DOMAIN: MATLAB S.NO CODE PROJECT TITLES
1. SMIP01 Prostate Cancer Localization With Multispectral MRI Using Cost-Sensitive
Support Vector Machines and Conditional Random Fields
2. SMIP02 Morphological decomposition of 2-D binary shapes into modestly overlapped disk
components
3. SMIP03 Tricolor Attenuation Model for Shadow Detection
4. SMIP04 Visual-Context Boosting for Eye Detection
5. SMIP05 Automatic Plant Leaf Classification for a Mobile Field Guide
6. SMIP06 Teeth Segmentation in Digitized Dental X-Ray Films Using Mathematical
Morphology
7. SMIP07 A new method of vehicle license plate location under complex scenes
8. SMIP08 Automated Algorithm for Iris Detection and Code Generation
VLSI IEEE TITLES
IEEE TRANSACTION ON VLSI
Domain: VLSI
S.NO CODE PROJECT TITLES Year
1. SVL01 Design of a Low Power Viterbi Decoder for Wireless Communication 2011
2. SVL02 New Approach to Look-Up-Table Design and Memory-Based
Realization of FIR Digital Filter
2011
3. SVL03 Software-Defined Radio for OFDM Transceivers 2011
4. SVL04 Self-Test Techniques for Crypto-Devices 2011
5. SVL05 Enhanced scaling-Free Cordic 2011