Вы находитесь на странице: 1из 20

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.

com

FINAL YEAR PROJECTS


IEEE PROJECTS 2013 2014

ANDROID PROJECTS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 PROJECT CODE AN1201 AN1202 AN1203 AN1204 AN1205 AN1206 AN1207 AN1208 AN1209 AN1210 AN1211 AN1212 AN1213 AN1214 AN1215 AN1216 AN1217 TITLE OF THE PAPER Safe Driving Using Mobile Phones EduPad- A Tablet Based Educational System for improving adult literacy in rural India. Designing Mobile Language Learning Applications using Multimedia: Implications from a Small-scale Prospective Learner Study. Research and design of chatting room system based on Android Bluetooth. Design and Implementation of Improved Authentication System for Android Smartphone Users Learn to Personalized Image Search from the Photo Sharing Websites. SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. Payments for Outsourced Computations Outsourced Similarity Search on Metric Data Assets A Query Formulation Language for the Data Web PMSE A Personalized Mobile Search Engine Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators Ranking Model Adaptation for Domain-Specific Search Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points Efficient audit service outsourcing for data integrity in Clouds YEAR 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

AN1218 AN1219 AN1220 AN1221 AN1222 AN1223 AN1224 AN1325 AN1326 AN1327 AN1328 AN1329 AN1330 AN1331 AN1332 AN1333 AN1334 AN1335 AN1336 AN1337 AN1338 AN1339 AN1340

Ensuring Distributed Accountability in Data Sharing in the Cloud Network Assisted Mobile Computing Optimal Uplink Query Processing Tram location and route navigation system using smartphone Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. A Mobile Application to Access Remote Database using Web Services DroidMat: Android Malware Detection through Manifest and API Calls Tracing A Framework for Personal Mobile Commerce Pattern Mining and Prediction T-Drive: Enhancing Driving Directions with Taxi Drivers Intelligence Dynamic Personalized Recommendation on Sparse Data Spatial Query Integrity with Voronoi Neighbors MeetYou -- Social Networking on Android Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments PMSE: A Personalized Mobile Search Engine Crowdsourced Trace Similarity with Smartphones Twitsper: Tweeting Privately Review of Behavior Malware Analysis for Android Research in Progress - Defending Android Smartphones from Malware Attacks Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud Collaborative Policy Administration SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Collaborative Learning Assistant for Android

2012 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

FINAL YEAR PROJECTS


IEEE PROJECTS 2013 2014

DOTNET PROJECTS
CLOUD COMPUTING
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 PROJECT CODE CCD1101 CCD1102 CCD1103 CCD1104 CCD1205 CCD1206 CCD1207 CCD1208 CCD1209 CCD1210 CCD1211 CCD1212 CCD1213 CCD1314 CCD1315 TITLE OF THE PAPER Data integrity proofs in cloud storage Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud Optimal service pricing for a cloud cache A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. Cloud Computing Security From Single to Multi-Clouds. Enhanced Data Security Model for Cloud Computing Ensuring Distributed Accountability for Data Sharing in the Cloud. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. Outsourced Similarity Search on Metric Data Assets. Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. Toward Secure and Dependable Storage Services in Cloud Computing. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud An Adaptive Cloud Downloading Service YEAR 2011 2011 2011 2011 2012 2012 2012 2012 2012 2012 2012 2012 2012 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

16 17 18 19 20 21 22 23 24

CCD1316 CCD1317 CCD1318 CCD1319 CCD1320 CCD1321 CCD1322 CCD1323 CCD1324

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Privacy-Preserving Public Auditing for Secure Cloud Storage QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

2013 2013 2013 2013 2013 2013 2013 2013 2013

DATA MINING
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 PROJECT CODE DMD1101 DMD1102 DMD1103 DMD1104 DMD1105 DMD1106 DMD1107 DMD1108 DMD1109 DMD1110 DMD1111 DMD1212 DMD1213 TITLE OF THE PAPER A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. Personalized Ontology Model for Web Information Gathering Efficient Computation of Range Aggregates against uncertain location based queries Scalable Learning of Collective Behavior The World in a Nutshell Concise Range Queries Publishing Search Logs A Comparative Study of Privacy Guarantees One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Exploring Application-Level Semantics for Data Compression Bridging Socially-Enhanced Virtual Communities Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis A Query Formulation Language for the data web Creating Evolving User Behavior Profiles Automatically YEAR 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2012 2012

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

DMD1214 DMD1215 DMD1216 DMD1217 DMD1218 DMD1219 DMD1220 DMD1221 DMD1222 DMD1223 DMD1224 DMD1225 DMD1226 DMD1227 DMD1228 DMD1229 DMD1230 DMD1231 DMD1232 DMD1333 DMD1334 DMD1335 DMD1336 DMD1337 DMD1338 DMD1339 DMD1340

D-Cache: Universal Distance Cache for Metric Access Methods DDD: A New Ensemble Approach for Dealing with Concept Drift Efficient Computation of Range Aggregates against UncertainLocation-Based Queries Efficient Fuzzy Type-Ahead Search in XML Data Horizontal Aggregations in SQL to Prepare Data Sets for Data MiningAnalysis Improving Aggregate Recommendation Diversity Using RankingBasedTechniques Measuring the Sky: On Computing Data Cubes via Skylining the Measures Mining Web Graphs for Recommendations Organizing User Search Histories Publishing Search LogsA Comparative Study of Privacy Guarantees Query Planning for Continuous Aggregation Queries over a Network ofData Aggregators ROAD: A New Spatial Object Search Framework for Road Networks Scalable Learning of Collective Behavior Slicing: A New Approach for Privacy Preserving Data Publishing Tree-Based Mining for Discovering Patterns of Human Interaction inMeetings Efficient Multidimensional Fuzzy Search for Personal Information Management Systems Ranking Model Adaptation for Domain-Specific Search One Size Does Not Fit All: Toward User- and Query-Dependent Ranking for Web Databases Continuous Detour Queries in Spatial Networks A New Algorithm for Inferring User Search Goals with Feedback Sessions A Survey of XML Tree Patterns Dynamic Personalized Recommendation on Sparse Data Mining User Queries with Markov Chains: Application to Online Image Retrieval TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Supporting Search-As-You-Type Using SQL in Databases Secure Mining of Association Rules in Horizontally Distributed Databases

2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

PARALLEL AND DISTRIBUTED SYSTEMS


S.NO 1 2 3 4 5 6 7 8 9 10 11 12 PROJECT CODE PDD1201 PDD1202 PDD1203 PDD1204 PDD1205 PDD1305 PDD1306 PDD1307 PDD1308 PDD1309 PDD1310 PDD1311 TITLE OF THE PAPER Bounding the Impact of UnboundedAttacks in Stabilization Catching Packet Droppers andModifiers in Wireless Sensor Networks The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Balancing the Trade-Offs between Query Delay and Data Availability in MANETs Detection and Localization of Multiple Spoofing Attackers in Wireless Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Multicast Capacity in MANET with Infrastructure Support SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor Networks YEAR 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013

NETWORKING
S.NO 1 2 3 4 PROJECT CODE NW1101 NW1102 NW1103 NW1104 TITLE OF THE PAPER A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection Continuous Neighbor Discovery in Asynchronous Sensor Networks YEAR 2011 2011 2011 2011

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

NW1105 NW1106 NW1206 NW1207 NW1208 NW1209 NW1210 NW1211 NW1312 NW1313 NW1314 NW1315 NW1316 NW1317 NW1318 NW1319

Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks A New Cell-Counting-Based Attack Against Tor Optimal Source-Based Filtering of Malicious Traffic TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVECOMMUNICATIONS AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies Uncoordinated Cooperative Communications in Highly Dynamic Wireless Networks Load-Balancing Multipath Switching System with Flow Slice A Distributed Control Law for Load Balancing in Content Delivery Networks A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETs City Environments Efficient Algorithms for Neighbor Discovery in Wireless Networks Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality Resource Allocation for QoS Support in Wireless Mesh Networks A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay

2011 2011 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013

SECURE COMPUTING
S.NO 1 2 3 4 5 PROJECT CODE SCD1101 SCD1102 SCD1103 SCD1104 SCD1105 TITLE OF THE PAPER A More Secure Steganography Method in Spatial Domain. Detecting Kernel-Level Rootkits Using Data Structure Invariants NABS Novel Approaches for Biometric Systems. Blind Image Watermarking Using a Sample Projection Approach Data Leakage Detection YEAR 2011 2011 2011 2011 2011

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

SCD1106 SCD1107 SCD1108 SCD1109 SCD1209 SCD1210 SCD1211 SCD1212 SCD1213 SCD1214 SCD1215 SCD1216 SCD1316 SCD1317 SCD1318 SCD1319 SCD1320 SCD1321

Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. The Geometric Efficient Matching Algorithm for Firewalls Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks Integration of Sound Signature in Graphical Password Authentication System A Secure Intrusion detection system against DDOS attack in WirelessMobile Adhoc Network Design and Implementation of TARF: A Trust-Aware Routing Framework forWSNs ES-MPICH2: A Message Passing Interface with Enhanced Security On the Security and Efficiency of Content Distribution via NetworkCoding SPOC: A Secure and Privacy-preserving Opportunistic ComputingFramework forMobile-Healthcare Emergency Revisiting Defenses against Large-Scale Online Password GuessingAttacks Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism Automatic Reconfiguration for Large-Scale Reliable Storage Systems A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. EAACKA Secure Intrusion-Detection System for MANETs Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Privacy Preserving Data Sharing With Anonymous ID Assignment SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

2011 2011 2011 2011 2012 2012 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013

IMAGE PROCESSING
S.NO 1 2 3 PROJECT CODE IPD1101 IPD1102 IPD1103 TITLE OF THE PAPER Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts Adaptive Spectral Transform for Wavelet-Based Color Image Compression Facial Expression Recognition Using Facial Movement Features YEAR 2011 2011 2011

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

IPD1104 IPD1105 IPD1205 IPD1206 IPD1207 IPD1208 IPD1209 IPD1210 IPD1211 IPD1212 IPD1213 IPD1214 IPD1215 IPD1216 IPD1217 IPD1218 IPD1219 IPD1319 IPD1320 IPD1321 IPD1322 IPD1323

A New Color Filter Array With Optimal Properties for Noiseless and Noisy Color Image Acquisition Histogram Specification: A Fast and Flexible Method to Process Digital Images A Novel Data Embedding Method Using Adaptive Pixel Pair Matching A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group Active Visual Segmentation Image Segmentation Based on the Poincar Map Method K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USINGRANDOM NUMBER Multiple Exposure Fusion for High Dynamic Range Image Acquisition Semi-supervised Biased Maximum Margin Analysis for Interactive ImageRetrieval Smile Detection by Boosting Pixel Differences View-invariant action recognition based on Artificial Neural Networks A Novel Anti phishing framework based on visual cryptography Robust Face-Name Graph Matching for Movie Character Identification Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding Robustness of Offline Signature Verification Based on Gray Level Features Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recognition Query-Adaptive Image Search With Hash Codes Reversible Data Hiding With Optimal Value Transfer Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage

2011 2011 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

MOBILE COMPUTING
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 PROJECT CODE MCD1201 MCD1202 MCD1203 MCD1204 MCD1205 MCD1206 MCD1207 MCD1208 MCD1308 MCD1309 MCD1310 MCD1311 MCD1312 MCD1313 MCD1314 MCD1315 MCD1316 MCD1317 TITLE OF THE PAPER Cooperative Download in Vehicular Environments Distributed Throughput Maximization in Wireless Networks via RandomPower Allocation Network Assisted Mobile Computing with Optimal Uplink Query Processing Protecting Location Privacy in Sensor Networks against a GlobalEavesdropper Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Towards Accurate Mobile Sensor Network Localization in Noisy Environments Leveraging Smartphone Cameras for Collaborative Road Advisories Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Optimal Multicast Capacity and Delay Tradeoffs in MANETs Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks Network-Assisted Mobile Computing with Optimal Uplink Query Processing Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks Toward Accurate Mobile Sensor Network Localization in Noisy Environments YEAR 2012 2012 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

10

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

SERIVCE COMPUTING SOA (WEB SERVICE)


S.NO 1 2 3 4 PROJECT CODE SRD1101 SRD1102 SRD1302 SRD1303 TITLE OF THE PAPER Monitoring Service Systems from a Language-Action Perspective Vulnerability Analysis in SOA-based Business Processes Cost-Based Optimization of Service Compositions Evolution of Social Networks Based on Tagging Practices YEAR 2011 2011 2013 2013

PATTERN ANALYSIS AND MACHINE INTELLIGENCE


S.NO 1 2 PROJECT CODE PAD1101 PAD1202 TITLE OF THE PAPER Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models Exploring Context and Content Links in Social Media: A Latent Space Method YEAR 2011 2012

MULTIMEDIA
S.NO 1 PROJECT CODE MMD1301 TITLE OF THE PAPER Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information YEAR 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

11

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

FINAL YEAR PROJECTS


IEEE PROJECTS 2013 2014

JAVA PROJECTS
CLOUD COMPUTING
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 PROJECT CODE CCJ1101 CCJ1102 CCJ1103 CCJ1204 CCJ1205 CCJ1206 CCJ1207 CCJ1208 CCJ1209 CCJ1210 CCJ1311 CCJ1312 CCJ1313 TITLE OF THE PAPER Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing Cloud Computing for Agent-Based Urban Transportation Systems Secure and Practical Outsourcing of Linear Programming in Cloud Computing A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. Cloud Computing Security From Single to Multi-Clouds. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. Outsourced Similarity Search on Metric Data Assets. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. Toward Secure and Dependable Storage Services in Cloud Computing. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud An Adaptive Cloud Downloading Service Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems YEAR 2011 2011 2011 2012 2012 2012 2012 2012 2012 2012 2013 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

12

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

14 15 16 17 18 19 20 21 22 23 24 25 26

CCJ1314 CCJ1315 CCJ1316 CCJ1317 CCJ1318 CCJ1319 CCJ1320 CCJ1321 CCJ1322 CCJ1323 CCJ1324 CCJ1325 CCJ1326

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Privacy-Preserving Public Auditing for Secure Cloud Storage QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CloudMoV: Cloud-based Mobile Social TV Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

DATA MINING
S.NO 1 2 3 4 5 6 7 8 9 PROJECT CODE DMJ1101 DMJ1102 DMJ1103 DMJ1104 DMJ1105 DMJ1106 DMJ1207 DMJ1208 DMJ1209 TITLE OF THE PAPER Text Clustering with Seeds Affinity Propagation Clustering with Multi-Viewpoint based Similarity Measure. Effective Navigation of Query Results Based on Concept Hierarchies Discovering Conditional Functional Dependencies Ranking Spatial Data by Quality Preferences Extended XML Tree Pattern Matching: Theories and Algorithms Clustering with Multi-viewpoint-Based Similarity Measure Efficient Extended Boolean Retrieval Ranking Model Adaptation for Domain-Specific Search YEAR 2011 2011 2011 2011 2011 2011 2012 2012 2012

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

13

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

10 11 12 13 14 15 16 17 18 19 20 21 22 23 1 2 3 4 5 6 7

DMJ1210 DMJ1211 DMJ1212 DMJ1313 DMJ1314 DMJ1315 DMJ1316 DMJ1317 DMJ1318 DMJ1319 DMJ1320 DMJ1321 DMJ1322 DMJ1323 DMJ1101 DMJ1102 DMJ1103 DMJ1104 DMJ1105 DMJ1106 DMJ1207

Slicing: A New Approach for Privacy Preserving Data Publishing Efficient Fuzzy Type-Ahead Search in XML Data Effective Pattern Discovery for Text Mining A Fast Clustering-Based Feature Subset Selection Algorithm for HighDimensional Data A New Algorithm for Inferring User Search Goals with Feedback Sessions Annotating Search Results from Web Databases Anomaly Detection via Online Over-Sampling Principal Component Analysis Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks m-Privacy for Collaborative Data Publishing Protecting Sensitive Labels in Social Network Data Anonymization Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm Text Clustering with Seeds Affinity Propagation Clustering with Multi-Viewpoint based Similarity Measure. Effective Navigation of Query Results Based on Concept Hierarchies Discovering Conditional Functional Dependencies Ranking Spatial Data by Quality Preferences Extended XML Tree Pattern Matching: Theories and Algorithms Clustering with Multi-viewpoint-Based Similarity Measure

2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2011 2011 2011 2011 2011 2011 2012

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

14

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

PARALLEL AND DISTRIBUTED SYSTEMS


S.NO 1 2 3 4 5 6 7 8 PROJECT CODE PDJ1201 PDJ1202 PDJ1203 PDJ1204 PDJ1305 PDJ1306 PDJ1307 PDJ1308 TITLE OF THE PAPER BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks Payments for Outsourced Computations Cut Detection in Wireless Sensor Networks A Framework for Routing Performance Analysis in Delay Tolerant Networks with Application A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Security Analysis of a Privacy-Preserving Decentralized Key-Policy AttributeBased Encryption Scheme IP-Geolocation Mapping for Moderately Connected Internet Regions Optimal Client-Server Assignment for Internet Distributed Systems YEAR 2012 2012 2012 2012 2013 2013 2013 2013

NETWORKING
S.NO 1 2 3 4 5 6 7 8 9 PROJECT CODE NWJ1101 NWJ1102 NWJ1103 NWJ1104 NWJ1105 NWJ1206 NWJ1207 NWJ1208 NWJ1209 TITLE OF THE PAPER A new approach for FEC decoding based on the BP algorithm in LTE and WiMAX systems Buffer Sizing for 802.11 Based Networks Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks ProgME: Towards Programmable Network Measurement Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters Independent Directed Acyclic Graphs for Resilient Multipath Routing MeasuRouting: A Framework for Routing Assisted Traffic Monitoring YEAR 2011 2011 2011 2011 2011 2012 2012 2012 2012

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

15

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

10 11 12 13 14 15 16 17 18 19 20 21

NWJ1210 NWJ1211 NWJ1212 NWJ1213 NWJ1314 NWJ1315 NWJ1316 NWJ1317 NWJ1318 NWJ1319 NWJ1320 NWJ1321

Privacy- and Integrity-Preserving Range Queries in Sensor Networks RIHT: A Novel Hybrid IP Traceback Scheme Router Support for Fine-Grained Latency Measurements Packet Loss Control Using Tokens at the Network Edge A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive Packet Arrivals in DTNs Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols On the Node Clone Detection in Wireless Sensor Networks Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013

SECURE COMPUTING
S.NO 1 2 3 4 5 6 7 8 9 10 11 PROJECT CODE SCJ1101 SCJ1102 SCJ1103 SCJ1104 SCJ1105 SCJ1106 SCJ1107 SCJ1108 SCJ1109 SCJ1110 SCJ1111 TITLE OF THE PAPER Online Intrusion Alert Aggregation with Generative Data Stream Modeling. Towards Situational Awareness of Large-Scale Botnet Probing Events Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding A Competitive Study of Cryptography Techniques over Block Cipher. Analysis on Credit Card Fraud Detection Methods. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Optimal Bandwidth Assignment for Multiple-Description-Coded Video Caching Strategies Based on Information Density Nymble- Blocking Misbehaving Users in Anonymizing Networks YEAR 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

16

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

SCJ1112 SCJ1113 SCJ1214 SCJ1215 SCJ1216 SCJ1217 SCJ1218 SCJ1219 SCJ1220 SCJ1221 SCJ1222 SCJ1323 SCJ1324 SCJ1325 SCJ1326 SCJ1327 SCJ1328 SCJ1329 SCJ1330 SCJ1331 SCJ1332

Modeling and Detection of Camouflaging Worm SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks A Stochastic Model of Multi-virus Dynamics Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Detecting and Resolving Firewall Policy Anomalies Detecting Spam Zombies by Monitoring Outgoing Messages On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks Online Modeling of Proactive Moderation System for Auction Fraud Detection Packet-Hiding Methods for Preventing Selective Jamming Attacks Risk-Aware Mitigation for MANET Routing Attacks DoubleGuard: Detecting Intrusions in Multitier Web Applications EAACKA Secure Intrusion-Detection System for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Privacy Preserving Data Sharing With Anonymous ID Assignment Securing Class Initialization in Java-like Languages Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream Two tales of privacy in online social networks

2011 2011 2012 2012 2012 2012 2012 2012 2012 2012 2012 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

17

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

IMAGE PROCESSING
S.NO 1 2 3 4 5 6 7 8 9 PROJECT CODE IPJ1101 IPJ1102 IPJ1103 IPJ1204 IPJ1205 IPJ1206 IPJ1207 IPJ1208 IPJ1209 TITLE OF THE PAPER Embedded Extended Visual Cryptography Schemes Computational Perceptual Features for Texture Representation and Retrieval Subspace-Based Striping Noise Reduction in Hyper-spectral Images A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers Scalable Coding of Encrypted Images Handwritten Chinese Text Recognition by Integrating Multiple Contexts Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group YEAR 2011 2011 2011 2012 2012 2012 2012 2012 2012

MOBILE COMPUTING
S.NO 1 2 3 4 5 6 7 8 PROJECT CODE MCJ1101 MCJ1202 MCJ1203 MCJ1204 MCJ1205 MCJ1206 MCJ1307 MCJ1308 TITLE OF THE PAPER A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Fast Data Collection in Tree-Based Wireless Sensor Networks Protecting Location Privacy in Sensor Networks against a Global Eavesdropper Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees A Trigger Identification Service for Defending Reactive Jammers in WSN Content Sharing over Smartphone-Based Delay-Tolerant Networks DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks YEAR 2011 2012 2012 2012 2012 2012 2013 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

18

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

9 10 11 12 13 14

MCJ1309 MCJ1310 MCJ1311 MCJ1312 MCJ1313 MCJ1314

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Efficient Rekeying Framework for Secure Multicast with Diverse-SubscriptionPeriod Mobile Users Toward a Statistical Framework for Source Anonymity in Sensor Networks Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

2013 2013 2013 2013 2013 2013

SERIVCE COMPUTING SOA (WEB SERVICE)


S.NO 1 2 3 4 5 PROJECT CODE SRJ1201 SRJ1202 SRJ1303 SRJ1304 SRJ1305 TITLE OF THE PAPER Bootstrapping Ontologies for Web Services Semantics-Based Automated Service Discovery A Decentralized Service Discovery Approach on Peer-to-Peer Networks Personalized QoS-Aware Web Service Recommendation and Visualization Privacy-Enhanced Web Service Composition YEAR 2012 2012 2013 2013 2013

PATTERN ANALYSIS AND MACHINE INTELLIGENCE


S.NO 1 PROJECT CODE PAJ1301 TITLE OF THE PAPER A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data YEAR 2013

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

19

Contact: 8870006111, 9944192557 Email ID: idolphtech@gmail.com www.idolph.com

SOFTWARE ENGINEERING
S.NO 1 2 PROJECT CODE SEJ1101 SEJ1302 TITLE OF THE PAPER Invariant-Based Automatic Testing of Modern Web Applications Whole Test Suite Generation YEAR 2011 2013

MULTIMEDIA
S.NO 1 2 PROJECT CODE MMJ1101 MMJ1202 TITLE OF THE PAPER Learn to Personalized Image Search from the Photo Sharing Websites Understanding the External Links of Video Sharing Sites: Measurement and Analysis YEAR 2011 2012

746 / 348 Javulikadai Signal (Near Old Bus Stand), Trichy Main Road, Gugai, Salem 636006

20

Вам также может понравиться