90 2011 IEEE Project Titles

download 90 2011 IEEE Project Titles

of 16

Transcript of 90 2011 IEEE Project Titles

  • 8/3/2019 90 2011 IEEE Project Titles

    1/16

    S.N 2011 IEEE Project Titles

    1 Forward Correction and Fountain Codes in Delay Tolerant Networks

    2 A Personalized Ontology Model For Web Information Gathering

    3 Continuous Neighbor Discovery in Asynchronous Sensor Networks

    4 Adaptive Provisioning Of Human Expertise In Service-Oriented Systems

    5Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual

    Server Ports

    6 Bridging Socially-Enhanced Virtual Communities

    7Fast Simulation of Service Availability in Mesh Networks With Dynamic Path

    Restoration

    8 Data Integrity Proofs In Cloud Storage

    9 ROC: Resilient Online Coverage for Surveillance Applications

    10Efficient Computation Of Range Aggregates Against Uncertain Location Based

    Queries

    11Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing

    In The Cloud

    12 Live Streaming With Receiver-Based Peer-Division Multiplexing

    13 Exploring Application-Level Semantics For Data Compression

    14 Optimal Service Pricing For A Cloud Cache

    15A New Approach for FEC Decoding Based on the BP Algorithm in LTE and

    WiMAX Systems

    16 Digital Image hiding using curve let transform

    17A Foundation for Stochastic Bandwidth Estimation of Networks with Random

    Service

    18Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc

    Networks

    19 Publishing Search Logs A Comparative Study Of Privacy Guarantees

    20 MANET Routing Protocols vs Mobility Models: A Performance Evaluation

    21

    The Awareness Network, To Whom Should I Display My Actions And, Whose

    Actions

    22 Effective Navigation of Query Results Based on Concept Hierarchies

    23Efficient Multi-dimensional Fuzzy Search for Personal Information Management

    Systems

    24Improving Aggregate Recommendation Diversity Using Ranking-Based

    Techniques

    25 Integration Of Sound Signature In Graphical Password Authentication System

  • 8/3/2019 90 2011 IEEE Project Titles

    2/16

    26 Modeling And Detection Of Camouflaging Worm

    27 Monitoring Service Systems From A Language-Action Perspective

    28One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For

    Web Databases

    29 Nymble Blocking Misbehaving Users in Anonymizing Networks

    30 Data Integrity Proofs In Cloud Storage

    31 The World In A Nutshell: Concise Range Queries

    32 A Generic Multilevel Architecture For Time Series Prediction

    33 Intrusion detection: An Energy efficient approach in heterogeneous WSN

    34 NABS Novel Approaches for Biometric Systems

    35A Machine Learning Approach For Identifying Disease-Treatment Relations In

    Short Texts36 A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm

    37 A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification

    A Link Analysis Extension Of Correspondence

    Analysis For Mining Relational Databases

    39 A Dual Framework And Algorithms For Targeted Online Data Delivery

    40 Adaptive Cluster Distance Bounding For High-Dimensional Indexing

    41Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast

    Service

    42 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

    43 Clustering with Multi- View Point Based Similarity Measure

    44Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc

    Networks

    45Going Back and Forth Efficient Multi deployment and Multi snap shutting on

    Clouds

    46 Secure and Practical Outsourcing of Linear Programming in Cloud Computing

    47 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

    48A Unified Approach to Optimizing Performance in Networks Serving

    Heterogeneous Flows

    49Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless

    Networks

    50A Privacy-Preserving Location Monitoring

    System for Wireless Sensor Networks

    38

  • 8/3/2019 90 2011 IEEE Project Titles

    3/16

    51Extended XML Tree Pattern Matching: Theories

    and Algorithms

    52 Buffer Sizing for 802.11 Based Networks

    53Delay Analysis and Optimality of Scheduling Policies for

    Multi-Hop Wireless Networks

    54 Discovering Conditional Functional Dependencies

    55Effective Navigation of Query Results

    Based on Concept Hierarchies

    56 Load Shedding in Mobile Systems with MobiQual

    57Nymble: Blocking Misbehaving Users in

    Anonymizing Networks

    58 Ranking Spatial Data by Quality Preferences

    59

    SAT: A Security Architecture Achieving

    Anonymity and Traceability in Wireless

    Mesh Networks

    60 Secure and Practical Outsourcing of LinearProgramming in Cloud Computing

    61 Selfish Overlay Network Creation and Maintenance

    62 SPAF: Stateless FSA-based Packet Filters

    63Horizontal Aggregations in SQL to Prepare Data

    Sets for Data Mining Analysis

    64A Query Formulation Language for the

    Data Web

    65Automated Certification for Compliant Cloud-based

    Business Processes

    66 Distributed Adaptation of Quantized Feedback forDownlink Network MIMO Systems

    67The Geometric Efficient Matching Algorithm for

    Firewalls

    68Robust Correlation of Encrypted Attack Traffic

    through Stepping Stones by Flow Watermarking

    69Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer

    Design

    70 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks

    71 Throughput Optimization in High Speed Downlink Packet Access

  • 8/3/2019 90 2011 IEEE Project Titles

    4/16

    Year

    2011/platformDomain

    JAVA Networking

    .NET Data Mining

    JAVA Networking

    .NET Data Mining

    JAVA Networking

    .NET Networking

    JAVA Networking

    .NET Cloud Computing

    JAVA Networking

    .NET Data Mining

    .NET Data mining

    JAVA Networking

    .NET Data mining

    .NET Data Mining

    JAVA Network Security

    .NET Secure Computing

    JAVA Network

    JAVA Network

    .NET Data Mining

    JAVA Network

    .NET Data Mining

    JAVA Data Mining

    .NET Data Mining

    .NET Data mining

    .NET Data Mining

  • 8/3/2019 90 2011 IEEE Project Titles

    5/16

    JAVA Secure Computing

    .NET Service Computing

    .NET Data mining

    JAVA Network

    .NET Software Engineering

    .NET Data mining

    JAVA Data mining

    .NET Network Security

    .NET Secure Computing

    JAVA Data mining

    .NET Data mining

    .NET Data mining

    JAVA

    JAVA

    JAVA Data mining

    JAVA Data mining

    JAVA Network

    JAVA Network Security

    JAVA Data mining

    JAVA Network

    JAVA Cloud Computing

    JAVA Cloud Computing

    JAVA Network

    JAVA Network

    .NET Network

    JAVA MOBILE COMPUTING

    Data mining

  • 8/3/2019 90 2011 IEEE Project Titles

    6/16

    JAVAKNOWLEDGE AND

    DATA ENGINEERING

    JAVA NETWORKING

    JAVA NETWORKING

    JAVAKNOWLEDGE AND

    DATA ENGINEERINGJAVA

    KNOWLEDGE AND

    DATA ENGINEERING

    JAVAKNOWLEDGE AND

    DATA ENGINEERING

    JAVA SECURE COMPUTING

    JAVAKNOWLEDGE AND

    DATA ENGINEERING

    JAVA SECURE COMPUTING

    JAVA CLOUD COMPUTING

    JAVA NETWORKING

    JAVA NETWORKING

    .NET Data Mining

    .NET

    .NET Cloud Computing

    .NET WIRELESSCOMMUNICATIONS

    .NET SECURE COMPUTING

    .NET SECURE COMPUTING

    .NET Network

    JAVA Network

    JAVA Network

  • 8/3/2019 90 2011 IEEE Project Titles

    7/16

    S.N 2011 IEEE Project Titles Year

    1 Forward Correction and Fountain Codes in Delay Tolerant Networks 2011/ Java

    2 A Personalized Ontology Model For Web Information Gathering 2011/ .Net

    3 Continuous Neighbor Discovery in Asynchronous Sensor Networks 2011/ Java

    4 Adaptive Provisioning Of Human Expertise In Service-Oriented Systems 2011/ .Net

    5Scalable and Cost-Effective Interconnection of Data-Center Servers

    Using Dual Server Ports2011/ Java

    6 Bridging Socially-Enhanced Virtual Communities 2011/ .Net

    7Fast Simulation of Service Availability in Mesh Networks With Dynamic

    Path Restoration2011/ Java

    8 Data Integrity Proofs In Cloud Storage 2011/ .Net

    9 ROC: Resilient Online Coverage for Surveillance Applications 2011/ Java

    10Efficient Computation Of Range Aggregates Against Uncertain Location

    Based Queries2011/ .Net

    11Exploiting Dynamic Resource Allocation For Efficient Parallel Data

    Processing In The Cloud2011/ .Net

    12 Live Streaming With Receiver-Based Peer-Division Multiplexing 2011/ Java

    13 Exploring Application-Level Semantics For Data Compression 2011/ .Net

    14 Optimal Service Pricing For A Cloud Cache 2011/ .Net

    15A New Approach for FEC Decoding Based on the BP Algorithm in LTE

    and WiMAX Systems2011/ Java

    16 Digital Image hiding using curve let transform 2011/ .Net

    17A Foundation for Stochastic Bandwidth Estimation of Networks with

    Random Service2011/ Java

    18 Caching Strategies Based on Information Density Estimation in WirelessAd Hoc Networks

    2011/ Java

    19 Publishing Search Logs A Comparative Study Of Privacy Guarantees 2011/ .Net

    20MANET Routing Protocols vs Mobility Models: A Performance

    Evaluation2011/ Java

    21The Awareness Network, To Whom Should I Display My Actions And,

    Whose Actions2011/ .Net

  • 8/3/2019 90 2011 IEEE Project Titles

    8/16

    22 Effective Navigation of Query Results Based on Concept Hierarchies 2011/J2EE

    23Efficient Multi-dimensional Fuzzy Search for Personal Information

    Management Systems2011/ .Net

    24Improving Aggregate Recommendation Diversity Using Ranking-Based

    Techniques2011/ .Net

    25 Integration Of Sound Signature In Graphical Password AuthenticationSystem

    2011/ .Net

    26 Modeling And Detection Of Camouflaging Worm 2011/ Java

    27 Monitoring Service Systems From A Language-Action Perspective 2011/ .Net

    28One Size Does Not Fit All: Towards User- And Query-Dependent

    Ranking For Web Databases2011/ .Net

    29 Nymble Blocking Misbehaving Users in Anonymizing Networks 2011/ Java

    30 Data Integrity Proofs In Cloud Storage 2011/ .Net

    31 The World In A Nutshell: Concise Range Queries 2011/ .Net

    32 A Generic Multilevel Architecture For Time Series Prediction 2011/ Java

    33Intrusion detection: An Energy efficient approach in heterogeneous

    WSN2011/ .Net

    34 NABS Novel Approaches for Biometric Systems 2011/ .Net

    35 A Machine Learning Approach For Identifying Disease-TreatmentRelations In Short Texts

    2011/ Java

    36 A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm 2011/ .Net

    37A Fuzzy Self-Constructing Feature Clustering Algorithm For Text

    Classification2011/ .Net

    A Link Analysis Extension Of Correspondence

    Analysis For Mining Relational Databases

    39 A Dual Framework And Algorithms For Targeted Online Data Delivery 2011/ Java

    40 Adaptive Cluster Distance Bounding For High-Dimensional Indexing 2011/ Java

    41Dynamic Channel Allocation for Wireless Zone-Based Multicast and

    Broadcast Service2011/ Java

    42 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 2011/ Java

    38 2011/ Java

  • 8/3/2019 90 2011 IEEE Project Titles

    9/16

    43 Clustering with Multi- View Point Based Similarity Measure 2011/ Java

    44Caching Strategies Based on Information Density Estimation in Wireless

    Ad Hoc Networks

    45Going Back and Forth Efficient Multi deployment and Multi snap

    shutting on Clouds2011/ Java

    46 Secure and Practical Outsourcing of Linear Programming in CloudComputing

    2011/ Java

    47A Privacy-Preserving Location Monitoring System for Wireless Sensor

    Networks2011/ Java

    48A Unified Approach to Optimizing Performance in Networks Serving

    Heterogeneous Flows2011/ Java

    49Delay Analysis and Optimality of Scheduling Policies for Multi-Hop

    Wireless Networks2011/ .Net

    50Improving the Performance of Wireless Ad Hoc Networks Through MAC

    Layer Design2011/ .Net

    51 Supporting Efficient and Scalable Multicasting over Mobile Ad HocNetworks

    2011/ Java

    52 Throughput Optimization in High Speed Downlink Packet Access 2011/ .Net

    53 Sketch4Match-Content Based Image Retrival System Using Sketches 2011/ Java

    54 Embedded Extended Visual Cryptography Schemes 2011/ Java

    55 A Competitive Study of Cryptography Techniques over Block Cipher 2011/ Java

    56 Roboust Video Data Hiding Using Forbidden Zone Data Hiding andSelective Embedding

    2011/ Java

    57Online Intrusion Alert Aggregation with Generative Data Stream

    Modeling2011/ Java

    58 A More Secure Steganography Method in Spatial Domain 2011/ Java

    59A User-oriented Image Retrieval System Based on Interactive Genetic

    Algorithm2011/ .Net

    60A Web Search Engine Based Approach to Measure Semantic Similarity

    Between Words2011/ .Net

    61 Weighted Energy Detection for Noncoherent Ultra-Wideband ReceiverDesign

    2011/ .Net

    62 Problems and Solutions of Web Search Engines 2011/ .Net

    63 Adaptive Cluster Distance Bounding for High Dimensional Indexing 2011/ Java

    64Distributed Adaptation of Quantized Feedback for Downlink Network

    MIMO Systems2011/ .Net

  • 8/3/2019 90 2011 IEEE Project Titles

    10/16

    65 Live Streaming with Receiver-based Peer-division Multiplex in 2011/ .Net

    66Jamming-Aware Traffic Allocation for Multiple-Path Routing Using

    Portfolio Selection2011/ .Net

    67 Secure High-Throughput Multicast Routing in Wireless Mesh Networks 2011/ Java

    68 Optimal Stochastic Location Updates in Mobile Ad Hoc Network 2011/ Java

    69 Throughput Optimization in Mobile Backbone Networks 2011/ Java

    70 RITAS: Services for Randomized Intrusion Tolerance 2011/ Java

    71 Selfish Overlay Network Creation and Maintenance 2011/ Java

    72 Comparative Evaluation of Spoofing Defenses 2011/ Java

    73 SAT: A Security Architecture Achieving Anonymity and Traceability inWireless Mesh Networks

    2011/ Java

    74Topological Transformation Approaches to TCAM-Based Packet

    Classification2011/ Java

    75 Ranking Spatial Data by Quality Preferences 2011/ Java

    76A Privacy-Preserving Location Monitoring

    System for Wireless Sensor Networks2011/JAVA

    77Extended XML Tree Pattern Matching: Theories

    and Algorithms2011/JAVA

    78 Buffer Sizing for 802.11 Based Networks 2011/JAVA

    79 Discovering Conditional Functional Dependencies 2011/JAVA

    80Effective Navigation of Query Results

    Based on Concept Hierarchies2011/JAVA

    81 Load Shedding in Mobile Systems with MobiQual 2011/JAVA

    82 SPAF: Stateless FSA-based Packet Filters 2011/JAVA

    83 Horizontal Aggregations in SQL to Prepare DataSets for Data Mining Analysis

    2011/.NET

    84A Query Formulation Language for the

    Data Web2011/.NET

    85Automated Certification for Compliant Cloud-based

    Business Processes2011/.NET

    86Distributed Adaptation of Quantized Feedback for

    Downlink Network MIMO Systems2011/.NET

  • 8/3/2019 90 2011 IEEE Project Titles

    11/16

    87The Geometric Efficient Matching Algorithm for

    Firewalls2011/.NET

    88Robust Correlation of Encrypted Attack Traffic

    through Stepping Stones by Flow Watermarking2011/.NET

    89 Cloud Computing for Agent-Based Urban Transportation Systems 2011/JAVA

    90 ProgME: Towards Programmable Network Measurement 2011/JAVA

  • 8/3/2019 90 2011 IEEE Project Titles

    12/16

    Domain

    Networking

    Data Mining

    Networking

    Data Mining

    Networking

    Networking

    Networking

    Cloud Computing

    Networking

    Data Mining

    Data mining

    Networking

    Data mining

    Data Mining

    Network Security

    Secure Computing

    Network

    Network

    Data Mining

    Network

    Data Mining

  • 8/3/2019 90 2011 IEEE Project Titles

    13/16

    Data Mining

    Data Mining

    Data mining

    Data Mining

    Secure Computing

    Service Computing

    Data mining

    Network

    Software Engineering

    Data mining

    Data mining

    Network Security

    Secure Computing

    Data mining

    Data mining

    Data mining

    Data mining

    Data mining

    Network

    Network Security

    Data mining

  • 8/3/2019 90 2011 IEEE Project Titles

    14/16

    Data mining

    Network

    Cloud Computing

    Cloud Computing

    Network

    Network

    Network

    Network

    Network

    Network

    Image Processing

    Secure Computing

    Secure Computing

    Multimedia

    Network Security

    Secure Computing

    Image Processing

    Data Mining

    Network

    Web Mining

    Data Mining

    Network

  • 8/3/2019 90 2011 IEEE Project Titles

    15/16

    Network

    Network

    Mobile Computing

    Mobile Computing

    Mobile Computing

    Network Security

    Network

    Network Security

    Network Security

    Network

    Data Mining

    MOBILE COMPUTING

    KNOWLEDGE AND DATA

    ENGINEERING

    NETWORKING

    KNOWLEDGE AND DATA

    ENGINEERING

    KNOWLEDGE AND DATA

    ENGINEERING

    KNOWLEDGE AND DATA

    ENGINEERING

    NETWORKING

    Data Mining

    Cloud Computing

    WIRELESS COMMUNICATIONS

  • 8/3/2019 90 2011 IEEE Project Titles

    16/16

    SECURE COMPUTING

    SECURE COMPUTING

    INTELLIGENT SYSTEMS

    NETWORKING