final year projects - engineeringidolph.com/titles/ieee project titles book 2016.pdffinal year...
Post on 29-Mar-2018
240 Views
Preview:
TRANSCRIPT
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
FINAL YEAR PROJECTS
IEEE PROJECTS 2015 – 2016
ANDROID PROJECTS S.NO
PROJECT CODE
TITLE OF THE PAPER YEAR
1 AN1501 A Location- and Diversity-aware News Feed System for Mobile Users 2015
2 AN1502 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2015
3 AN1503 CWC: A Distributed Computing Infrastructure Using Smartphones 2015
4 AN1504 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015
5 AN1505 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
6 AN1506 Context-Based Access Control Systems for Mobile Devices 2015
7 AN1507 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015
8 AN1508 Privacy-Preserving Relative Location Based Services for Mobile Users 2015
9 AN1509 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015
10 AN1510 Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds
2015
11 AN1511 Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
2015
12 AN1512 Smartphone-Based Wound Assessment System for Patients with Diabetes 2015
13 AN1513 The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
2015
14 AN1514 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2015
15 AN1415 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
2014
16 AN1416 Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks
2014
17 AN1417 Collaborative Policy Administration 2014
18 AN1418 Context-based Access Control Systems for Mobile Devices 2014
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
19 AN1419 Context-driven, Prescription-Based Personal Activity Classification: Methodology, Architecture, and End-to-End Implementation
2014
20 AN1420 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014
21 AN1421 DELTA++: Reducing the Size of Android Application Updates 2014
22 AN1422 Effective Risk Communication for Android Apps 2014
23 AN1423 Face-to-Face Proximity Estimation Using Bluetooth on Smartphones 2014
24 AN1424 Generating Summary Risk Scores for Mobile Applications 2014
25 AN1425 GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications
2014
26 AN1426 Hiding in the Mobile Crowd: Location Privacy through Collaboration 2014
27 AN1427 How Long to Wait? Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing
2014
28 AN1428 MOSES: Supporting and Enforcing Security Profiles on Smartphones 2014
29 AN1429 Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones
2014
30 AN1430 The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data
2014
31 AN1331 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence 2013
32 AN1332 Dynamic Personalized Recommendation on Sparse Data 2013
33 AN1333 Spatial Query Integrity with Voronoi Neighbors 2013
34 AN1334 MeetYou -- Social Networking on Android 2013
35 AN1335 Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
2013
36 AN1336 PMSE: A Personalized Mobile Search Engine 2013
37 AN1337 Crowdsourced Trace Similarity with Smartphones 2013
38 AN1338 Twitsper: Tweeting Privately 2013
39 AN1339 Review of Behavior Malware Analysis for Android 2013
40 AN1340 Research in Progress - Defending Android Smartphones from Malware Attacks 2013
41 AN1341 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
2013
42 AN1342 CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 2013
43 AN1343 Collaborative Policy Administration 2013
44 AN1344 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
2013
45 AN1345 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2013
46 AN1346 Collaborative Learning Assistant for Android 2013
47 AN1247 Safe Driving Using Mobile Phones 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
48 AN1248 EduPad- A Tablet Based Educational System for improving adult literacy in rural India.
2012
49 AN1249 Designing Mobile Language Learning Applications using Multimedia: Implications from a Small-scale Prospective Learner Study.
2012
50 AN1250 Research and design of chatting room system based on Android Bluetooth. 2012
51 AN1251 Design and Implementation of Improved Authentication System for Android Smartphone Users
2012
52 AN1252 Learn to Personalized Image Search from the Photo Sharing Websites. 2012
53 AN1253 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
2012
54 AN1254 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
55 AN1255 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.
2012
56 AN1256 Payments for Outsourced Computations 2012
57 AN1257 Outsourced Similarity Search on Metric Data Assets 2012
58 AN1258 A Query Formulation Language for the Data Web 2012
59 AN1259 PMSE A Personalized Mobile Search Engine 2012
60 AN1260 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
2012
61 AN1261 Ranking Model Adaptation for Domain-Specific Search 2012
62 AN1262 Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points
2012
63 AN1263 Efficient audit service outsourcing for data integrity in Clouds 2012
64 AN1264 Ensuring Distributed Accountability in Data Sharing in the Cloud 2012
65 AN1265 Network Assisted Mobile Computing Optimal Uplink Query Processing 2012
66 AN1266 Tram location and route navigation system using smartphone 2012
67 AN1267 Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.
2012
68 AN1268 A Mobile Application to Access Remote Database using Web Services 2012
69 AN1269 DroidMat: Android Malware Detection through Manifest and API Calls Tracing 2012
70 AN1270 A Framework for Personal Mobile Commerce Pattern Mining and Prediction 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
FINAL YEAR PROJECTS
IEEE PROJECTS 2015 – 2016
DOTNET PROJECTS CLOUD COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 CCD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
Cloud Data 2015
2 CCD1502 Cloud-Based Multimedia Content Protection System 2015
3 CCD1503 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption 2015
4 CCD1504 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid
Clouds 2015
5 CCD1505 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-
dictionaries over Encrypted Cloud Data 2015
6 CCD1506 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015
7 CCD1507 Identity-Based Distributed Provable Data Possession in Multicloud Storage 2015
8 CCD1508 Panda: Public Auditing for Shared Data with Efficient User Revocation in the
Cloud 2015
9 CCD1509 PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving Cooperative
Authentication in Distributed m-Healthcare Cloud Computing System 2015
10 CCD1510 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers 2015
11 CCD1411 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions 2014
12 CCD1412 Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation 2014
13 CCD1413 Consistency as a Service: Auditing Cloud Consistency 2014
14 CCD1414 Decentralized Access Control with Anonymous Authentication of Data Stored in 2014
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
Clouds
15 CCD1415 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014
16 CCD1416 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage:
Theory and Implementation 2014
17 CCD1417 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 2014
18 CCD1418 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014
19 CCD1419 Panda: Public Auditing for Shared Data with Efficient User Revocation in the
Cloud 2014
20 CCD1420 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014
21 CCD1421 Scalable Distributed Service Integrity Attestation for Software-as a-Service Clouds 2014
22 CCD1322 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective
Privacy Preserving of Intermediate Data Sets in Cloud 2013
23 CCD1323 An Adaptive Cloud Downloading Service 2013
24 CCD1324 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems 2013
25 CCD1325 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
26 CCD1326 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 2013
27 CCD1327 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2013
28 CCD1328 Privacy-Preserving Public Auditing for Secure Cloud Storage 2013
29 CCD1329 QoS Ranking Prediction for Cloud Services 2013
30 CCD1330 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption 2013
31 CCD1331 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for
Production Cloud Computing Systems 2013
32 CCD1332 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 2013
33 CCD1233 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. 2012
34 CCD1234 Cloud Computing Security From Single to Multi-Clouds. 2012
35 CCD1235 Enhanced Data Security Model for Cloud Computing 2012
36 CCD1236 Ensuring Distributed Accountability for Data Sharing in the Cloud. 2012
37 CCD1237 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control in Cloud Computing. 2012
38 CCD1238 Outsourced Similarity Search on Metric Data Assets. 2012
39 CCD1239 Privacy-Preserving Public Auditing for Secure Cloud Storage 2012
40 CCD1240 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption. 2012
41 CCD1241 Toward Secure and Dependable Storage Services in Cloud Computing. 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
DATA MINING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 DMD1501 Discovery of Ranking Fraud for Mobile Apps 2015
2 DMD1502 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015
3 DMD1503 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015
4 DMD1504 Query Aware Determinization of Uncertain Objects 2015
5 DMD1405 A Cocktail Approach for Travel Package Recommendation 2014
6 DMD1406 An Empirical Performance Evaluation of Relational Keyword Search Techniques 2014
7 DMD1407 LARS*: An Efficient and Scalable Location-Aware Recommender System 2014
8 DMD1408 Product Aspect Ranking and Its Applications 2014
9 DMD1409 Secure Mining of Association Rules in Horizontally Distributed Databases 2014
10 DMD1410 Supporting Privacy Protection in Personalized Web Search 2014
11 DMD1411 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014
12 DMD1412 Typicality-Based Collaborative Filtering Recommendation 2014
13 DMD1313 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013
14 DMD1314 A Survey of XML Tree Patterns 2013
15 DMD1315 Dynamic Personalized Recommendation on Sparse Data 2013
16 DMD1316 Mining User Queries with Markov Chains: Application to Online Image Retrieval 2013
17 DMD1317 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
2013
18 DMD1318 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
2013
19 DMD1319 Supporting Search-As-You-Type Using SQL in Databases 2013
20 DMD1320 Secure Mining of Association Rules in Horizontally Distributed Databases 2013
21 DMD1221 A Query Formulation Language for the data web 2012
22 DMD1222 Creating Evolving User Behavior Profiles Automatically 2012
23 DMD1223 D-Cache: Universal Distance Cache for Metric Access Methods 2012
24 DMD1224 DDD: A New Ensemble Approach for Dealing with Concept Drift 2012
25 DMD1225 Efficient Computation of Range Aggregates against UncertainLocation-Based Queries
2012
26 DMD1226 Efficient Fuzzy Type-Ahead Search in XML Data 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
27 DMD1227 Horizontal Aggregations in SQL to Prepare Data Sets for Data MiningAnalysis 2012
28 DMD1228 Improving Aggregate Recommendation Diversity Using Ranking-BasedTechniques
2012
29 DMD1229 Measuring the Sky: On Computing Data Cubes via Skylining the Measures 2012
30 DMD1230 Mining Web Graphs for Recommendations 2012
31 DMD1231 Organizing User Search Histories 2012
32 DMD1232 Publishing Search Logs—A Comparative Study of Privacy Guarantees 2012
33 DMD1233 Query Planning for Continuous Aggregation Queries over a Network ofData Aggregators
2012
34 DMD1234 ROAD: A New Spatial Object Search Framework for Road Networks 2012
35 DMD1235 Scalable Learning of Collective Behavior 2012
36 DMD1236 Slicing: A New Approach for Privacy Preserving Data Publishing 2012
37 DMD1237 Tree-Based Mining for Discovering Patterns of Human Interaction inMeetings 2012
38 DMD1238 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems
2012
39 DMD1239 Ranking Model Adaptation for Domain-Specific Search 2012
40 DMD1240 One Size Does Not Fit All: Toward User- and Query-Dependent Ranking for Web Databases
2012
41 DMD1241 Continuous Detour Queries in Spatial Networks 2012
PARALLEL AND DISTRIBUTED SYSTEMS
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PDD1501 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
2 PDD1402 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks 2014
3 PDD1403 A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis 2014
4 PDD1404 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 2014
5 PDD1405 Certificateless Remote Anonymous Authentication Schemes for Wireless Body
Area Networks 2014
6 PDD1406 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014
7 PDD1407 Multicast Capacity in MANET with Infrastructure Support 2014
8 PDD1408 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor
Networks 2014
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
9 PDD1409 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using
Compressive Sensing 2014
10 PDD1310 A Secure Payment Scheme with Low Communication and Processing Overhead
for Multihop Wireless Networks 2013
11 PDD1311 Multicast Capacity in MANET with Infrastructure Support 2013
12 PDD1312 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency 2013
13 PDD1313 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013
14 PDD1314 Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor
Networks 2013
15 PDD1315 A Probabilistic Misbehavior Detection Scheme towards Efficient Trust
Establishment in Delay-tolerant Networks 2013
16 PDD1316 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n
Wireless Sensor Networks 2013
17 PDD1217 Bounding the Impact of UnboundedAttacks in Stabilization 2012
18 PDD1218 Catching Packet Droppers andModifiers in Wireless Sensor Networks 2012
19 PDD1219 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
20 PDD1220 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs 2012
21 PDD1221 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2012
NETWORKING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 NWD1501 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic
Localization 2015
2 NWD1502 Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis 2015
3 NWD1503 Universal Network Coding-Based Opportunistic Routing for Unicast 2015
4 NWD1404 Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic
Traffic 2014
5 NWD1405 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
6 NWD1306 A Distributed Control Law for Load Balancing in Content Delivery Networks 2013
7 NWD1307 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013
8 NWD1308 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad
Hoc Networks 2013
9 NWD1309 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
10 NWD1310 Efficient Algorithms for Neighbor Discovery in Wireless Networks 2013
11 NWD1311 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 2013
12 NWD1312 Resource Allocation for QoS Support in Wireless Mesh Networks 2013
13 NWD1313 A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop
Wireless Networks With Order-Optimal Per-Flow Delay 2013
14 NWD1214 A New Cell-Counting-Based Attack Against Tor 2012
15 NWD1215 Optimal Source-Based Filtering of Malicious Traffic 2012
16 NWD1216 Topology Control In Mobile Ad Hoc Networks With Cooperative Communications 2012
17 NWD1217 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing
Topologies 2012
18 NWD1218 Uncoordinated Cooperative Communications in Highly Dynamic Wireless
Networks 2012
19 NWD1219 Load-Balancing Multipath Switching System with Flow Slice 2012
SECURE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SCD1501 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical
Cyber Physical Systems 2015
2 SCD1502 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast
Keyword Search 2015
3 SCD1503 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined
Fingerprints 2015
4 SCD1504 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System 2015
5 SCD1405 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems 2014
6 SCD1306 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. 2013
7 SCD1307 EAACK—A Secure Intrusion-Detection System for MANETs 2013
8 SCD1308 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed
Information Sharing 2013
9 SCD1309 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable
Links 2013
10 SCD1310 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
11 SCD1311 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
12 SCD1212 A Secure Intrusion detection system against DDOS attack in WirelessMobile Ad-
hoc Network 2012
13 SCD1213 Design and Implementation of TARF: A Trust-Aware Routing Framework
forWSNs 2012
14 SCD1214 ES-MPICH2: A Message Passing Interface with Enhanced Security 2012
15 SCD1215 On the Security and Efficiency of Content Distribution via NetworkCoding 2012
16 SCD1216 SPOC: A Secure and Privacy-preserving Opportunistic ComputingFramework
forMobile-Healthcare Emergency 2012
17 SCD1217 Revisiting Defenses against Large-Scale Online Password GuessingAttacks 2012
18 SCD1218 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a
Knowledge-Based Authentication Mechanism 2012
19 SCD1219 Automatic Reconfiguration for Large-Scale Reliable Storage Systems 2012
IMAGE PROCESSING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 IPD1501 An Attribute-Assisted Reranking Model for Web Image Search 2015
2 IPD1502 Automatic Face Naming by Learning Discriminative Affinity Matrices From
Weakly Labeled Images 2015
3 IPD1503 Detection and Rectification of Distorted Fingerprints 2015
4 IPD1504 Eye Gaze Tracking With a Web Camera in a Desktop Environment 2015
5 IPD1505 Learning Fingerprint Reconstruction: From Minutiae to Image 2015
6 IPD1506 Multiview Alignment Hashing for Efficient Image Search 2015
7 IPD1507 Single Image Super resolution Based on Gradient Profile Sharpness 2015
8 IPD1508 Steganography Using Reversible Texture Synthesis 2015
9 IPD1409 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding 2014
10 IPD1410 Designing an Efficient Image Encryption-Then-Compression System via
Prediction Error Clustering and Random Permutation 2014
11 IPD1311 Query-Adaptive Image Search With Hash Codes 2013
12 IPD1312 Reversible Data Hiding With Optimal Value Transfer 2013
13 IPD1313 Reversible Watermarking Based on Invariant Image Classification and Dynamic
Histogram Shifting 2013
14 IPD1314 Local Directional Number Pattern for Face Analysis: Face and Expression
Recognition 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
15 IPD1315 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet
Transform Shrinkage 2013
16 IPD1216 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2012
17 IPD1217 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 2012
18 IPD1218 Active Visual Segmentation 2012
19 IPD1219 Image Segmentation Based on the Poincaré Map Method 2012
20 IPD1220 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE
USINGRANDOM NUMBER 2012
21 IPD1221 Multiple Exposure Fusion for High Dynamic Range Image Acquisition 2012
22 IPD1222 Semi-supervised Biased Maximum Margin Analysis for Interactive
ImageRetrieval 2012
23 IPD1223 Smile Detection by Boosting Pixel Differences 2012
24 IPD1224 View-invariant action recognition based on Artificial Neural Networks 2012
25 IPD1225 A Novel Anti phishing framework based on visual cryptography 2012
26 IPD1226 Robust Face-Name Graph Matching for Movie Character Identification 2012
27 IPD1227 Low-Complexity Compression Method for Hyperspectral Images Based on
Distributed Source Coding 2012
28 IPD1228 Robustness of Offline Signature Verification Based on Gray Level Features 2012
29 IPD1229 Controllable Secure Watermarking Technique for Tradeoff Between Robustness
and Security 2012
30 IPD1230 A Discriminative Model of Motion and Cross Ratio for View-Invariant Action
Recognition 2012
MOBILE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MCD1501 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid
Wireless Networks 2015
2 MCD1502 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading
in Wireless Sensor Networks 2015
3 MCD1503 Optimal Configuration of Network Coding in Ad Hoc Networks 2015
4 MCD1504 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in
Wireless Ad Hoc Networks 2015
5 MCD1405 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
6 MCD1406 Autonomous Mobile Mesh Networks 2014
7 MCD1407 DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile
Underwater Sensor Networks 2014
8 MCD1408 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected
MANETs 2014
9 MCD1409 Preserving Location Privacy in Geosocial Applications 2014
10 MCD1310 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013
11 MCD1311 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional
Game Approach 2013
12 MCD1312 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc
Networks 2013
13 MCD1313 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2013
14 MCD1314 Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless
Sensor Networks 2013
15 MCD1315 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks 2013
16 MCD1316 Network-Assisted Mobile Computing with Optimal Uplink Query Processing 2013
17 MCD1317 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013
18 MCD1318 On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 2013
19 MCD1319 Toward Accurate Mobile Sensor Network Localization in Noisy Environments 2013
20 MCD1220 Cooperative Download in Vehicular Environments 2012
21 MCD1221 Distributed Throughput Maximization in Wireless Networks via Random Power
Allocation 2012
22 MCD1222 Network Assisted Mobile Computing with Optimal Uplink Query Processing 2012
23 MCD1223 Protecting Location Privacy in Sensor Networks against a Global Eaves dropper 2012
24 MCD1224 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 2012
25 MCD1225 Towards Accurate Mobile Sensor Network Localization in Noisy Environments 2012
26 MCD1226 Leveraging Smartphone Cameras for Collaborative Road Advisories 2012
27 MCD1227 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor
Networks 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
SERIVCE COMPUTING SOA (WEB SERVICE)
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SRD1101 Monitoring Service Systems from a Language-Action Perspective 2011
2 SRD1102 Vulnerability Analysis in SOA-based Business Processes 2011
3 SRD1302 Cost-Based Optimization of Service Compositions 2013
4 SRD1303 Evolution of Social Networks Based on Tagging Practices 2013
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PAD1401 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014
2 PAD1202 Exploring Context and Content Links in Social Media: A Latent Space Method 2012
3 PAD1103 Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models 2011
MULTIMEDIA
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MMD1301 Beyond Text QA: Multimedia Answer Generation by Harvesting Web
Information 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
FINAL YEAR PROJECTS
IEEE PROJECTS 2015 – 2016
JAVA PROJECTS CLOUD COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 CCJ1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2015
2 CCJ1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
Computing 2015
3 CCJ1503 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems 2015
4 CCJ1504 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
Cloud Data 2015
5 CCJ1505 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015
6 CCJ1506 An Authenticated Trust and Reputation Calculation and Management System
for Cloud and Sensor Networks Integration 2015
7 CCJ1507 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2015
8 CCJ1508 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in Cloud Computing 2015
9 CCJ1509 CloudArmor: Supporting Reputation-based Trust Management for Cloud
Services 2015
10 CCJ1510 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption 2015
11 CCJ1511 Enabling Cloud Storage Auditing With Key-Exposure Resistance 2015
12 CCJ1512 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-
dictionaries over Encrypted Cloud Data 2015
13 CCJ1513 Identity-Based Encryption with Outsourced Revocation in Cloud Computing 2015
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
14 CCJ1514 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud
Storage 2015
15 CCJ1515 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in
Cloud Computing 2015
16 CCJ1516 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 2015
17 CCJ1517 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 2015
18 CCJ1518 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User
Revocation 2015
19 CCJ1519 Secure Auditing and Deduplicating Data in Cloud 2015
20 CCJ1520 Stealthy Denial of Service Strategy in Cloud Computing 2015
21 CCJ1421 A Hybrid Cloud Approach for Secure Authorized Deduplication 2014
22 CCJ1422 A Scalable Two-Phase Top-Down Specialization Approach for Data
Anonymization Using MapReduce on Cloud 2014
23 CCJ1423 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems 2014
24 CCJ1424 Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation 2014
25 CCJ1425 Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds 2014
26 CCJ1426 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014
27 CCJ1427 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
Cloud Storage 2014
28 CCJ1428 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014
29 CCJ1429 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014
30 CCJ1430 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014
31 CCJ1431 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014
32 CCJ1432 Scalable Distributed Service Integrity Attestation for Software-asa-Service
Clouds 2014
33 CCJ1433 Towards Differential Query Services in Cost-Efficient Clouds 2014
34 CCJ1334 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems 2013
35 CCJ1335 CloudMoV: Cloud-based Mobile Social TV 2013
36 CCJ1336 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment 2013
37 CCJ1337 Error-Tolerant Resource Allocation and Payment Minimization for Cloud
System 2013
38 CCJ1338 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear
Equations 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
39 CCJ1339 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
40 CCJ1340 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2013
41 CCJ1341 Privacy-Preserving Public Auditing for Secure Cloud Storage 2013
42 CCJ1342 Scalable and Secure Sharing of Personal Health Records in Cloud Computing
Using Attribute-Based Encryption 2013
43 CCJ1343 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems 2013
44 CCJ1244 A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding 2012
45 CCJ1245 Cloud Computing Security: From Single to Multi-Clouds 2012
46 CCJ1246 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud
Storage 2012
47 CCJ1247 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control in Cloud Computing 2012
48 CCJ1248 Outsourced Similarity Search on Metric Data Assets 2012
49 CCJ1249 Scalable and Secure Sharing of Personal Health Records in Cloud Computing
using Attribute-based Encryption 2012
50 CCJ1250 Toward Secure and Dependable Storage Services in Cloud Computing 2012
DATA MINING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 DMJ1501 Best Keyword Cover Search 2015
2 DMJ1502 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based
on the Word Alignment Model 2015
3 DMJ1503 Context-Based Diversification for Keyword Queries over XML Data 2015
4 DMJ1504 Discovery of Ranking Fraud for Mobile Apps 2015
5 DMJ1505 Malware Propagation in Large-Scale Networks 2015
6 DMJ1506 On Summarization and Timeline Generation for Evolutionary Tweet Streams 2015
7 DMJ1507 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015
8 DMJ1508 Progressive Duplicate Detection 2015
9 DMJ1509 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 2015
10 DMJ1510 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing 2015
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
at Location-Based Services
11 DMJ1511 Scalable Constrained Spectral Clustering 2015
12 DMJ1512 Towards Effective Bug Triage with Software Data Reduction Techniques 2015
13 DMJ1513 Tweet Segmentation and Its Application to Named Entity Recognition 2015
14 DMJ1414 A Cocktail Approach for Travel Package Recommendation 2014
15 DMJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for
Relational Data 2014
16 DMJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 2014
17 DMJ1417 Data Mining with Big Data 2014
18 DMJ1418 Dealing With Concept Drifts in Process Mining 2014
19 DMJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
20 DMJ1420 Efficient Prediction of Difficult Keyword Queries over Databases 2014
21 DMJ1421 Facilitating Document Annotation Using Content and Querying Value 2014
22 DMJ1422 Fast Nearest Neighbor Search with Keywords 2014
23 DMJ1423 Keyword Query Routing 2014
24 DMJ1424 Privacy-Preserving and Content-Protecting Location Based Queries 2014
25 DMJ1425 Security Evaluation of Pattern Classifiers under Attack 2014
26 DMJ1426 Supporting Privacy Protection in Personalized Web Search 2014
27 DMJ1427 Towards Online Shortest Path Computation 2014
28 DMJ1328 A Fast Clustering-Based Feature Subset Selection Algorithm for High-
Dimensional Data 2013
29 DMJ1329 A New Algorithm for Inferring User Search Goals with Feedback Sessions 2013
30 DMJ1330 Annotating Search Results from Web Databases 2013
31 DMJ1331 Anomaly Detection via Online Over-Sampling Principal Component Analysis 2013
32 DMJ1332 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor
Networks 2013
33 DMJ1333 m-Privacy for Collaborative Data Publishing 2013
34 DMJ1334 Protecting Sensitive Labels in Social Network Data Anonymization 2013
35 DMJ1335 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting
System Development 2013
36 DMJ1236 Clustering with Multi-viewpoint-Based Similarity Measure 2012
37 DMJ1237 Efficient Extended Boolean Retrieval 2012
38 DMJ1238 Ranking Model Adaptation for Domain-Specific Search 2012
39 DMJ1239 Slicing: A New Approach for Privacy Preserving Data Publishing 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
40 DMJ1240 Efficient Fuzzy Type-Ahead Search in XML Data 2012
41 DMJ1241 Effective Pattern Discovery for Text Mining 2012
42 DMJ1242 Resilient Identity Crime Detection 2012
43 DMJ1243 A Genetic Programming Approach to Record De-duplication 2012
44 DMJ1244 Enabling Multilevel Trust in Privacy Preserving Data Mining 2012
PARALLEL AND DISTRIBUTED SYSTEMS
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PDJ1501 Asymmetric Social Proximity Based Private Matching Protocols for Online Social
Networks 2015
2 PDJ1502 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
3 PDJ1503 Secure Distributed Deduplication Systems with Improved Reliability 2015
4 PDJ1404 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks 2014
5 PDJ1405 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014
6 PDJ1406 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014
7 PDJ1407 On False Data-Injection Attacks against Power System State Estimation:
Modeling and Countermeasures 2014
8 PDJ1408 RRE: A Game-Theoretic Intrusion Response and Recovery Engine 2014
9 PDJ1409 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based
Encryption 2014
10 PDJ1410 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
11 PDJ1411 The Client Assignment Problem for Continuous Distributed Interactive
Applications: Analysis, Algorithms, and Evaluation 2014
12 PDJ1412 The Design and Evaluation of An Information Sharing System for Human
Networks 2014
13 PDJ1413 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery
Networks 2014
14 PDJ1414 Secure Outsourced Attribute-based Signatures 2014
15 PDJ1315 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 2013
16 PDJ1316 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems 2013
17 PDJ1317 IP-Geolocation Mapping for Moderately Connected Internet Regions 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
18 PDJ1318 Optimal Client-Server Assignment for Internet Distributed Systems 2013
19 PDJ1219 Cut Detection in Wireless Sensor Networks 2012
20 PDJ1220 A Framework for Routing Performance Analysis in Delay Tolerant Networks
with Application to Non-cooperative Net 2012
21 PDJ1221 Footprint: Detecting Sybil Attacks in Urban Vehicular Networks 2012
22 PDJ1222 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
NETWORKING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 NWJ1501 A Distortion-Resistant Routing Framework for Video Traffic in Wireless
Multihop Networks 2015
2 NWJ1502 A Proximity-Aware Interest-Clustered P2P File Sharing System 2015
3 NWJ1503 Detecting Malicious Facebook Applications 2015
4 NWJ1504 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though
Replication for Efficient File Sharing 2015
5 NWJ1405 Automatic Test Packet Generation 2014
6 NWJ1406 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014
7 NWJ1407 Boundary Cutting for Packet Classification 2014
8 NWJ1408 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
9 NWJ1309 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013
10 NWJ1310 Delay-Based Network Utility Maximization 2013
11 NWJ1311 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 2013
12 NWJ1212 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks 2012
13 NWJ1213 Design, Implementation, and Performance of a Load Balancer for SIP Server
Clusters 2012
14 NWJ1214 Independent Directed Acyclic Graphs for Resilient Multipath Routing 2012
15 NWJ1215 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 2012
16 NWJ1216 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012
17 NWJ1217 RIHT: A Novel Hybrid IP Traceback Scheme 2012
18 NWJ1218 Router Support for Fine-Grained Latency Measurements 2012
19 NWJ1219 Packet Loss Control Using Tokens at the Network Edge 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
SECURE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SCJ1501 A Computational Dynamic Trust Model for User Authorization 2015
2 SCJ1502 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet
Drop Attacks in Wireless Sensor Networks 2015
3 SCJ1503 Continuous and Transparent User Identity Verification for Secure Internet
Services 2015
4 SCJ1504 Contributory Broadcast Encryption with Efficient Encryption and Short
Ciphertexts 2015
5 SCJ1505 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting
Masquerade Attacks 2015
6 SCJ1506 Improved Privacy-Preserving P2P Multimedia Distribution Based on
Recombined Fingerprints 2015
7 SCJ1507 Secure Data Aggregation Technique for Wireless Sensor Networks in the
Presence of Collusion Attacks 2015
8 SCJ1508 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service
Providers 2015
9 SCJ1409 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems 2014
10 SCJ1410 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
11 SCJ1411 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks 2014
12 SCJ1412 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014
13 SCJ1313 EAACK—A Secure Intrusion-Detection System for MANETs 2013
14 SCJ1314 Identity-Based Secure Distributed Data Storage Schemes 2013
15 SCJ1315 Modeling the Pairwise Key Predistribution Scheme in the Presence of
Unreliable Links 2013
16 SCJ1316 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual
Network Systems 2013
17 SCJ1317 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
18 SCJ1318 Securing Class Initialization in Java-like Languages 2013
19 SCJ1319 Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks 2013
20 SCJ1320 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 2013
21 SCJ1321 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
Twitter Stream
22 SCJ1222 A Stochastic Model of Multi-virus Dynamics 2012
23 SCJ1223 Design and Implementation of TARF: A Trust-Aware Routing Framework for
WSNs 2012
24 SCJ1224 Detecting and Resolving Firewall Policy Anomalies 2012
25 SCJ1225 Detecting Spam Zombies by Monitoring Outgoing Messages 2012
26 SCJ1226 On the Security of a Ticket-Based Anonymity System with Traceability Property
in Wireless Mesh Networks 2012
27 SCJ1227 Online Modeling of Proactive Moderation System for Auction Fraud Detection 2012
28 SCJ1228 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012
29 SCJ1229 Risk-Aware Mitigation for MANET Routing Attacks 2012
30 SCJ1230 Bootstrapping Ontologies for Web Services 2012
31 SCJ1231 DoubleGuard: Detecting Intrusions in Multitier Web Applications 2012
IMAGE PROCESSING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 IPJ1501 An Attribute-Assisted Reranking Model for Web Image Search 2015
2 IPJ1502 EMR: A Scalable Graph-based Ranking Model for Content-based Image
Retrieval 2015
3 IPJ1503 Learning to Rank Image Tags With Limited Training Examples 2015
4 IPJ1204 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2012
5 IPJ1205 Improving Various Reversible Data Hiding Schemes Via Optimal Codes for
Binary Covers 2012
6 IPJ1206 Scalable Coding of Encrypted Images 2012
7 IPJ1207 Handwritten Chinese Text Recognition by Integrating Multiple Contexts 2012
8 IPJ1208 Adaptive Membership Functions for Hand-Written Character Recognition by
Voronoi-based Image Zoning 2012
9 IPJ1209 A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
MOBILE COMPUTING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MCJ1501 Dynamic Routing for Data Integrity and Delay Differentiated Services in
Wireless Sensor Networks 2015
2 MCJ1502 Friendbook: A Semantic-Based Friend Recommendation System for Social
Networks 2015
3 MCJ1503 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in
Wireless Ad Hoc Networks 2015
4 MCJ1504 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
5 MCJ1405 An Incentive Framework for Cellular Traffic Offloading 2014
6 MCJ1406 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
7 MCJ1407 Efficient Authentication for Mobile and Pervasive Computing 2014
8 MCJ1408 Friendbook: A Semantic-based Friend Recommendation System for Social
Networks 2014
9 MCJ1409 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous
Devices 2014
10 MCJ1310 Content Sharing over Smartphone-Based Delay-Tolerant Networks 2013
11 MCJ1311 DCIM: Distributed Cache Invalidation Method for Maintaining Cache
Consistency in Wireless Mobile Networks 2013
12 MCJ1312 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 2013
13 MCJ1313 Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-
Period Mobile Users 2013
14 MCJ1214 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012
15 MCJ1215 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 2012
16 MCJ1216 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions
over Wireless Networks 2012
17 MCJ1217 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees 2012
18 MCJ1218 A Trigger Identification Service for Defending Reactive Jammers in WSN 2012
19 MCJ1219 Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number
of Transmissions 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
SERIVCE COMPUTING SOA (WEB SERVICE)
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SRJ1501 Designing High Performance Web-Based Computing Services to Promote
Telemedicine Database Management System 2015
2 SRJ1502 Location-Aware and Personalized Collaborative Filtering for Web Service
Recommendation 2015
3 SRJ1403 Privacy-Enhanced Web Service Composition 2014
4 SRJ1404 Web Service Recommendation via Exploiting Location and QoS Information 2014
5 SRJ1305 A Decentralized Service Discovery Approach on Peer-to-Peer Networks 2013
6 SRJ1306 Personalized QoS-Aware Web Service Recommendation and Visualization 2013
7 SRJ1307 Privacy-Enhanced Web Service Composition 2013
8 SRJ1208 Bootstrapping Ontologies for Web Services 2012
INFORMATION FORENSICS AND SECURITY
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 IFJ1501 A Framework for Secure Computations with Two Non-Colluding Servers and
Multiple Clients, Applied to Recommendations 2015
2 IFJ1502 Effective Key Management in Dynamic Wireless Sensor Networks 2015
3 IFJ1503 Key Updating for Leakage Resiliency with Application to AES Modes of
Operation 2015
4 IFJ1504 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path
Backscatter 2015
5 IFJ1505 Software Puzzle: A Countermeasure to Resource-Inflated Denialof- Service
Attacks 2015
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 PAJ1301 A Framework for Mining Signatures from Event Sequences and Its Applications
in Healthcare Data 2013
SOFTWARE ENGINEERING
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 SEJ1101 Invariant-Based Automatic Testing of Modern Web Applications 2011
2 SEJ1302 Whole Test Suite Generation 2013
MULTIMEDIA
S.NO PROJECT
CODE TITLE OF THE PAPER YEAR
1 MMJ1201 Learn to Personalized Image Search from the Photo Sharing Websites 2012
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
FINAL YEAR PROJECTS
IEEE PROJECTS 2015 – 2016
HADOOP PROJECTS S.NO
PROJECT CODE
TITLE OF THE PAPER YEAR
1 HA1501 An Incremental and Distributed Inference Method for Large-Scale Ontologies Based on MapReduce Paradigm
2015
2 HA1502 DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors 2015
3 HA1503 Hadoop Recognition of Biomedical Named Entity Using Conditional Random Fields
2015
4 HA1504 Real-Time Big Data Analytical Architecture for Remote Sensing Application 2015
5 HA1505 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters
2015
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
FINAL YEAR PROJECTS
IEEE PROJECTS 2015 – 2016
NS2 PROJECTS NETWORK SIMULATOR
S.NO PROJECT
CODE TITLE OF THE PAPER DOMAIN YEAR
1 NS1501 A Historical-Beacon-Aided Localization Algorithm for
Mobile Sensor Networks MANET 2015
2 NS1502 CoCoWa: A Collaborative Contact-Based Watchdog for
Detecting Selfish Nodes MANET 2015
3 NS1503 Cooperative Load Balancing and Dynamic Channel
Allocation for Cluster-Based Mobile Ad Hoc Networks MANET 2015
4 NS1504
Defending Against Collaborative Attacks by Malicious
Nodes in MANETs: A Cooperative Bait Detection
Approach
MANET 2015
5 NS1505 Minimizing Transmission Cost for Third-Party
Information Exchange with Network Coding MANET 2015
6 NS1506
Mobile-Projected Trajectory Algorithm with Velocity-
Change Detection for Predicting Residual Link Lifetime in
MANET
MANET 2015
7 NS1507 Optimal Configuration of Network Coding in Ad Hoc
Networks MANET 2015
8 NS1508 Packet Delivery Ratio/Cost in MANETs with Erasure
Coding and Packet Replication MANET 2015
9 NS1509 Privacy and Quality Preserving Multimedia Data
Aggregation for Participatory Sensing Systems MANET 2015
10 NS1510 Privacy-Preserving and Truthful Detection of Packet MANET 2015
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
Dropping Attacks in Wireless Ad Hoc Networks
11 NS1511 User Privacy and Data Trustworthiness in Mobile Crowd
Sensing MANET 2015
12 NS1512 A Virtual Coordinate-Based Bypassing Void Routing for
WSN WSN (Routing) 2015
13 NS1513 Adaptive Routing for Dynamic On-Body WSN WSN (Routing) 2015
14 NS1514 An Energy Efficient Cross-Layer Network Operation
Model for IEEE 802.15.4-Based Mobile WSN WSN (Routing) 2015
15 NS1515 Cost-Aware SEcure Routing (CASER) Protocol Design for
WSN WSN (Routing) 2015
16 NS1516 Efficient Coverage and Connectivity Preservation With
Load Balance for WSN WSN (Routing) 2015
17 NS1517 Geographic Routing in Clustered WSN Among Obstacles WSN (Routing) 2015
18 NS1518 Impact of Limiting Hop Count on the Lifetime of WSN WSN (Routing) 2015
19 NS1519 Joint Cooperative Routing and Power Allocation for
Collision Minimization in WSN With Multiple Flows WSN (Routing) 2015
20 NS1520 Joint Virtual MIMO and Data Gathering for WSN WSN (Routing) 2015
21 NS1521 Mobile Data Gathering with Load Balanced Clustering
and Dual Data Uploading in Wireless Sensor Networks WSN (Routing) 2015
22 NS1522 Opportunistic Routing Algorithm for Relay Node
Selection in WSN WSN (Routing) 2015
23 NS1523 PWDGR: Pair-Wise Directional Geographical Routing
Based on Wireless Sensor Network WSN (Routing) 2015
24 NS1524 Time-Sensitive Utility-Based Single-Copy Routing in Low-
Duty-Cycle WSN WSN (Routing) 2015
25 NS1525 VGDRA: A Virtual Grid-Based Dynamic Routes
Adjustment Scheme for Mobile Sink-Based WSN WSN (Routing) 2015
26 NS1526
A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
WSN (Routing) 2015
27 NS1527 A Secure Scheme Against Power Exhausting Attacks in
Hierarchical Wireless Sensor Networks WSN (Routing) 2015
28 NS1528 An Efficient Distributed Trust Model for Wireless Sensor
Networks WSN (Routing) 2015
29 NS1529 An Encryption Scheme Using Chaotic Map and Genetic
Operations for Wireless Sensor Networks WSN (Routing) 2015
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
30 NS1530 Effective Key Management in Dynamic Wireless Sensor
Networks WSN (Routing) 2015
31 NS1531 Secure and Distributed Data Discovery and
Dissemination in Wireless Sensor Networks WSN (Routing) 2015
32 NS1532 Toward Energy-Efficient Trust System Through
Watchdog Optimization for WSNs WSN (Routing) 2015
33 NS1533 A Novel PER Degradation Model for VANETs VANET 2015
34 NS1534
ACPN: A Novel Authentication Framework with
Conditional Privacy-Preservation and Non-Repudiation
for VANETs
VANET 2015
35 NS1535 BUS-VANET: A BUS Vehicular Network Integrated with
Traffic Infrastructure VANET 2015
36 NS1536 Real-Time Path Planning Based on Hybrid-VANET-
Enhanced Transportation System VANET 2015
37 NS1537 VANET Modeling and Clustering Design Under Practical
Traffic,Channel and Mobility Conditions VANET 2015
38 NS1538 Defeating Jamming With the Power of Silence: A Game-
Theoretic Analysis
WIRELESS
COMMUNICATI
ONS
2015
39 NS1539 Passive IP Traceback: Disclosing the Locations of IP
Spoofers from Path Backscatter
INFORMATION
FORENSICS AND
SECURITY
2015
40 NS1540 Time-Delayed Broadcasting for Defeating Inside
Jammers
SECURE
COMPUTING 2015
41 NS1541 Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
SECURE
COMPUTING 2015
42 NS1442 A QoS-Oriented Distributed Routing Protocol for Hybrid
Wireless Networks
MOBILE
COMPUTING 2014
43 NS1443 A Study on False Channel Condition Reporting Attacks in
Wireless Networks
MOBILE
COMPUTING 2014
44 NS1444 Autonomous Mobile Mesh Networks MOBILE
COMPUTING 2014
45 NS1445 Optimal Multicast Capacity and Delay Tradeoffs in
MANETs
MOBILE
COMPUTING 2014
46 NS1446 RBTP: Low-Power Mobile Discovery Protocol through
Recursive Binary Time Partitioning
MOBILE
COMPUTING 2014
47 NS1447 Snapshot and Continuous Data Collection in MOBILE 2014
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
Probabilistic Wireless Sensor Networks COMPUTING
48 NS1448 ALBA-R: Load-Balancing Geographic Routing Around
Connectivity Holes in Wireless Sensor Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
49 NS1449 Hop-by-Hop Message Authentication and Source Privacy
in Wireless Sensor Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
50 NS1450 Neighbor Table Based Shortcut Tree Routing in ZigBee
Wireless Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
51 NS1451 Secure and Efficient Data Transmission for Cluster-Based
Wireless Sensor Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
52 NS1452 Secure Continuous Aggregation in Wireless Sensor
Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
53 NS1453 Transmission-Efficient Clustering Method for Wireless
Sensor Networks Using Compressive Sensing
PARALLEL &
DISTRIBUTED
SYSTEMS
2014
54 NS1454 An Energy-Balanced Routing Method Based on Forward-
Aware Factor for Wireless Sensor Networks
INDUSTRIAL
INFORMATICS 2014
55 NS1455 Distributed Deployment Algorithms for Improved
Coverage in a Network of Wireless Mobile Sensors
INDUSTRIAL
INFORMATICS 2014
56 NS1456 R3E: Reliable Reactive Routing Enhancement for
Wireless Sensor Networks
INDUSTRIAL
INFORMATICS 2014
57 NS1457 Sleep Scheduling for Geographic Routing in Duty-Cycled
Mobile Sensor Networks
INDUSTRIAL
INFORMATICS 2014
58 NS1458 AASR: An Authenticated Anonymous Secure Routing
Protocol for MANETs in Adversarial Environment
VEHICULAR
TECHNOLOGY 2014
59 NS1459 PSR: A Lightweight Proactive Source Routing Protocol
For Mobile Ad Hoc Networks
VEHICULAR
TECHNOLOGY 2014
60 NS1460 VSPN: VANET-Based Secure and Privacy-Preserving
Navigation
VEHICULAR
TECHNOLOGY 2014
61 NS1461 Joint Routing and Medium Access Control in Fixed
Random Access Wireless Multihop Networks NETWORKING 2014
62 NS1462 Defending Against Collaborative Attacks by Malicious
Nodes in MANETs: A Cooperative Bait Detection MANET 2014
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
Approach
63 NS1463 STARS: A Statistical Traffic Pattern Discovery System for
MANETs MANET 2014
64 NS1464 Data Density Correlation Degree Clustering Method for
Data Aggregation in WSN WSN 2014
65 NS1365 An Efficient and Robust Addressing Protocol for Node
Auto-configuration in Ad Hoc Networks NETWORKING 2013
66 NS1366 Back-Pressure-Based Packet-by-Packet Adaptive Routing
in Communication Networks NETWORKING 2013
67 NS1367 Efficient Algorithms for Neighbor Discovery in Wireless
Networks NETWORKING 2013
68 NS1368 Enhanced OLSR for Defense against DOS Attack in Ad
Hoc Networks NETWORKING 2013
69 NS1369 Opportunistic MANETs: Mobility Can Make Up for Low
Transmission Power NETWORKING 2013
70 NS1370 A Rank Correlation Based Detection against Distributed
Reflection DoS Attacks
NETWORK
SECURITY 2013
71 NS1371 Adaptive Position Update for Geographic Routing in
Mobile Ad Hoc Networks
MOBILE
COMPUTING 2013
72 NS1372 ALERT: An Anonymous Location-Based Efficient Routing
Protocol in MANETs
MOBILE
COMPUTING 2013
73 NS1373
DCIM: Distributed Cache Invalidation Method for
Maintaining Cache Consistency in Wireless Mobile
Networks
MOBILE
COMPUTING 2013
74 NS1374 Discovery and Verification of Neighbor Positions in
Mobile Ad Hoc Networks
MOBILE
COMPUTING 2013
75 NS1375 Distributed Cooperative Caching in Social Wireless
Networks
MOBILE
COMPUTING 2013
76 NS1376 EAACK—A Secure Intrusion-Detection System for
MANETs
MOBILE
COMPUTING 2013
77 NS1377 Optimal Multicast Capacity and Delay Tradeoffs in
MANETs
MOBILE
COMPUTING 2013
78 NS1378 Proteus: Multiflow Diversity Routing for Wireless
Networks with Cooperative Transmissions
MOBILE
COMPUTING 2013
79 NS1379 Target Tracking and Mobile Sensor Navigation in
Wireless Sensor Networks
MOBILE
COMPUTING 2013
80 NS1380 Toward a Statistical Framework for Source Anonymity in MOBILE 2013
Contact: 8870006111, 9952590305 Email ID: idolphtech@gmail.com
www.idolph.com
746 / 348 – JavulikadaiSignal(Near Old Bus Stand), Trichy Main Road,Gugai, Salem – 636006
Sensor Networks COMPUTING
81 NS1381 BAHG: Back-Bone-Assisted Hop Greedy Routing for
VANETs City Environments
INTELLIGENT
TRANSPORTATI
ON SYSTEMS
2013
top related