best final year ieee project titles 2010 - 2011 @ brainrich technology
DESCRIPTION
HiBrainrich Technology (BT) is a fast growing organization which offers a wide variety of services to match your Research Project needs. The company is promoted by a team of young professionals having vast experience in different domains. Our Team members are well qualified and experienced.Research and DevelopmentOur dedicated team of researchers, working at our R & D Labs and our Research Developers group, focus on technologies that will become more relevant for enterprises in the long-term; how they will evolve and impact enterprise competitiveness; what is the most effective way of managing the emerging technologies and integrating them into the enterprise nervous system. Our research efforts are supported by some international Standards such as IEEE and ACM infrastructure and collaboration with universities and industry leaders.Project Guidance by Experienced Developers.Provides real time training on information technology and provide projects on the following• M.E• M.Tech• BE/BTech (CSE & IT)• B.Sc/ M.Sc (CSE)• MSc (IT)• BCA• MCA• Diploma Student’s.Very Low cost….LATEST TECHNOLOGIES USED IN OUR PROJECTSWe would be really glad to help you with your project development.Our Service Address:Contact : Mr.S. SakthivelMobile : 9894604623Phone : 0422-4377414Address : 6/1, 1st Floor, Gokhale Street, Ramnagar, Coimbatorewebsite : http://www.brainrichtech.comMail : [email protected]TRANSCRIPT
IEEE / SOFTWARE PROJECTS
In various Domains
JAVA * J2EE * J2MELatest Projects, 2008, 2009,
2010
Our Service Address
6/1, Selvanaayaki Complex1st Floor, Gokulae Street,
Ramnagar, Coimbatore- 641009.
Mobile: 9894604623 Phone: 0422-4377414Mai : [email protected] Web : www.brainrichtech.com
We are offering IEEE & Non IEEE Projects
In various Domains including
IEEE Projects on Image Processing
IEEE Projects on Knowledge and Data Mining
IEEE Projects on Networking
IEEE Projects on Artificial Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Pattern Analysis & Machine
Intelligence
IEEE Projects on Multimedia
IEEE Projects on Parallel and Distributed
Systems
IEEE Projects on Mobile Computing
IEEE Projects on Software Engineering
IEEE Projects on Information Forensics and
Security
IEEE Projects on Dependable and Secure
Computing
IEEE Projects on Systems, Man & Cybernetics
IEEE Projects on Computers
IEEE Projects on Learning Technologies
PROJECT SUPPORTS & DELIVERABLES
Project Abstract
IEEE Paper
PPT / Review Details
Project Report
Working Procedure/Screen
Shots
Materials & Books in CD
Project Certification
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE DIGITAL IMAGE PROCESSING
S.NO CODE PROJECT TITLE YEAR01 IP 01 Fast Image Recovery Using Variable
Splittingand Constrained Optimization
2010
02 IP 02 Sliding-Window Raptor Codes for Efficient Scalable Wireless Video Broadcasting with Unequal Loss Protection
2010
03 IP 03 Generic Lossless Visible Watermarking—A New Approach
2010
04 IP 04 Biased Discriminant Euclidean Embedding for Content-Based Image
2010
Retrieval05 IP 05 Data Embedding in JPEG Bit stream
by Code Mapping2010
06 IP 06 Video Segmentation Based on Motion Coherence of Particles in a Video Sequence
2010
07 IP 07 Adaptive Non separable Wavelet Transform via Lifting and its Application to Content-Based Image Retrieval
2010
08 IP 08 Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization
2010
09 IP 09 Watermarking of Free-view Video 2010
10 IP 10 Ultrasound De speckling for Contrast Enhancement
2010
11 IP 11 A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding
2010
12 IP 12 Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment
2010
13 IP 13 Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
2010
14 IP 14 Soft Edge Smoothness Prior for Color Image Super-Resolution
2009
15 IP 15 A Shearlet Approach to Edge Analysis and Detection
2009
16 IP 16 Complex Wavelet Structural Similarity: A New Image Similarity Index
2009
17 IP 17 A Histogram Modification Framework and Its Application for Image Contrast Enhancement
2009
18 IP 18 Personal Authentication Using Hand 2009
Vein Triangulation and Knuckle Shape19 IP 19 Huber Fractal Image Compression 2009
20 IP 20 Active Mask Segmentation of FluorescenceMicroscope Images
2009
21 IP 21 Color Texture Segmentation Based on the Modal Energy of Deformable Surfaces
2009
22 IP 22 Entropy Interpretation of the LogarithmicImage Processing Model With Application toContrast Enhancement
2009
23 IP 23 A New Look to Multichannel BlindImage Deconvolution
2009
24 IP 24 Improved Resolution Scalability forBilevel Image Data in JPEG2000
2009
25 IP 25 An Adaptable Image Retrieval System With Relevance Feedback Using Kernel Machines and Selective Sampling
2009
26 IP 26 A High-Capacity Steganography Scheme for JPEG2000 Baseline System
2009
27 IP 27 Independent Component Analysis-Based Background Subtraction for Indoor Surveillance
2008
28 IP 28 Sparse Representation for Color Image Restoration
2008
29 IP29 High-Fidelity Data Embedding for Image Annotation
2008
30 IP30 A New Look to Multi channel Blind Image De-convolution
2008
31 IP31 Image Segmentation Using Information Bottleneck Method
2008
32 IP32 A Fast Optimization Transfer 2008
Algorithm for Image In painting in Wavelet Domains
33 IP33 Enhancement of Color Images by Scaling the DCT Coefficients
2008
34 IP34 Improved Resolution Scalability for Bilevel Image Data in JPEG2000
2008
35 IP35 A Unified Relevance Feedback Framework for Web Image Retrieval
2008
36 IP36 Optimal Spread Spectrum Watermark Embedding via a Multi step Feasibility Formulation
2008
37 IP37 Watermarking of Co lour Images in the DCT Domain Using Y Channel
2008
38 IP38 A Robust Image Encryption Scheme using State-Feedback Control
2008
39 IP39 Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature
2008
40 IP40 A Histogram Modification Framework and Its Application for Image Contrast Enhancement
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE KNOWLEDGE AND DATA MINING
S.NO CODE PROJECT TITLE YEAR01 KD MILD: Multiple-Instance Learning via 2010
01 Disambiguation02 KD
02LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs
2010
03 KD 03
An Up Down Directed Acyclic Graph Approachfor Sequential Pattern Mining
2010
04 KD 04
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
2010
05 KD 05
Efficient Algorithm for Localized Support Vector Machine
2010
06 KD 06
Deriving Concept-Based User Profiles from Search Engine Logs
2010
07 KD 07
An Efficient Concept-Based Mining Model for Enhancing Text Clustering
2010
08 KD 08
Adaptive Subspace Symbolization for Content-Based Video Detection
2010
09 KD 09 Non-Negative Matrix
Factorization for Semisupervised Heterogeneous Data Coclustering
2010
10 KD 10
Efficient Relevance Feedback for Content-based Image Retrieval by Mining User Navigation Patterns
2010
11 KD 11
Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases
2009
12 KD 12
Olex: Effective Rule Learning for Text Categorization
2009
13 KD 13
Towards Suspicious Behavior Discovery in Video Surveillance System
2009
14 KD 14
A Relation-Based Page Rank Algorithm for Semantic Web Search
2009
Engines15 KD
15Learning Image-Text Associations 2009
16 KD 16
A Framework for ClusteringConcept-Drifting Categorical Data
2009
17 KD 17
Communication Perspective on AutomaticText Categorization
2009
18 KD 18
Predicting Missing Items in Shopping Carts
2009
19 KD 19
Exact Knowledge Hiding through Database Extension
2009
20 KD 20
Fast Query Point Movement Techniques for Large CBIR Systems
2009
21 KD 21
Evaluating the Effectiveness of Personalized Web Search
2009
22 KD 22
Similarity-Profiled Temporal Association Mining
2009
23 KD 23
Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval
2009
24 KD 24
Enhancing Learning Objects with an Ontology-Based Memory
2009
25 KD 25
Using Association Rule Mining to Improve Semantic Web Services Composition Performance
2008
26 KD 26
Biometric Authentication for Border Control Applications
2008
27 KD 27
Desktop search in the intranet with integrated desktop search engines
2008
28 KD 28
A Least Grade Page Replacement Algorithm for Web Cache Optimization
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE NETWORKING
S.NO CODE PROJECT TITLE YEAR
01 NS
01
Broadcasting Video Streams Encoded With Arbitrary Bit Rates in Energy-Constrained Mobile TV Networks
2010
02 NS
02
S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks
2010
03 NS
03
Rate Control with Pair wise Intersession Network Coding
2010
04 NS
04
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
2010
05 NS
05
Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis
2010
06 NS
06
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility
2010
07 NS
07
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks
2010
08 NS
08A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless
2010
Networks09 NS
09
Upgrading Mice to Elephants: Effects and End-Point Solutions
2010
10 NS
10
Distributed Algorithms for Minimum Cost Multicast With Network Coding
2010
11 NS
11
Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints
2010
12 NS
12
Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and Approximations
2010
13 NS
13
Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
2010
14 NS
14
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications
2010
15 NS
15
Spatio-Temporal Network Anomaly Detection byAssessing Deviations of Empirical Measures
2009
16 NS
16
Monitoring the Application-Layer DDoS Attacks for Popular Websites
2009
17 NS
17
Multiple Routing Configurations for FastIP Network Recovery
2009
18 NS
18
Improving Locality of Bit Torrent with ISP Cooperation
2009
19 NS
19
PRIME: Peer-to-Peer Receiver-Driven Mesh-Based Streaming
2009
20 NS
20
A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
2009
21 NS
21
Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search
2009
22 NS
22
Capturing Router Congestion and Delay
2009
23 NS
23
Node Isolation Model and Age-Based NeighborSelection in Unstructured P2P Networks
2009
24 NS
24
Residual-Based Estimation of Peer and LinkLifetimes in P2P Networks
2009
25 NS
25
A Peer-to-Peer Resources Search Algorithm Based on Small-World Model
2009
26 NS
26
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks
2009
27 NS
27
Multicast Capacity of Wireless Ad Hoc Networks
2009
28 NS
28
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
2009
29 NS
29
Novel Approach for Computation –Efficient Rekeying for Multicast Key Distribution
2009
30 NS
30
SIMPS: Using Sociology for Personal Mobility
2009
31 NS
31
DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks
2009
32 NS
32
Credit Card Fraud Detection Using Hidden Markov Model
2008
33 NS
33
Encryption Techniques for the Security of Satellite Images
2008
34 NS34Modeling Node Capture Attacks in Wireless Sensor Networks
2008
35 NS35 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
36 NS36 The Design Trade-Offs of Bit Torrent-Like File Sharing Protocols
2008
37 NS37 Honey pot Scheme for Distributed Denial-of-Service Attack
2008
38 NS38 Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis
2008
39 NS39 P2P File Sharing Software in IPv4/IPv6 Network
2008
40 NS40 Design and Implementation of a SIP-based Centralized Multimedia Conferencing System
2008
41 NS41 Design and Implementation of Distributed Firewall System for IPv6
2008
42 NS42 A Hypothesis Testing Approach to Semi-fragile Watermark Based Authentication
2008
43 NS43 A New RMI Framework for Outdoor 2008
Objects Recognition44 NS44 Contributory group key exchange in
the presence of malicious participants2008
45 NS45 Schemes for Evaluating Signal Processing Properties of Audio Watermarking
2008
46 NS46 Double compression in JPEG images 2008
47 NS47 The Evaluation Report of SHA-256 Crypt Analysis Hash Function
2008
48 NS48 Jig DFS: A Secure Distributed File System
2008
49 NS49 General access structures in audio cryptography
2008
50 NS50 Improving Locality of Bit Torrent with ISP Cooperation
2008
51 NS51 Minimizing File Download Time in StochasticPeer-to-Peer Networks
2008
52 NS52 Triple DES Algorithm Based Image
Watermarking
2008
53 NS53 Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
2008
TECHNOLOGY : JAVA / DOT NET / MATLABDOMAIN : IEEE MULTIMEDIA
S.NO CODE PROJECT TITLE YEAR01 M 01 A Stochastic Approach to Image
Retrieval Using Relevance Feedback and Particle Swarm Optimization
2010
02 M 02 An Efficient and Robust Algorithm for Shape Indexing and Retrieval
2010
03 M 03 An Adaptive Computational Model for Salient Object Detection
2010
04 M 04 An Adaptive Strategy for Mobile Ad Hoc Media Streaming
2010
05 M 05 Video Annotation Through Search and Graph Reinforcement Mining
2010
06 M 06 Image Annotation by Graph-Based Inference With Integrated Multiple/Single Instance Representations
2010
07 M 07 Network Awareness of P2P Live Streaming Applications: A Measurement Study
2010
08 M 08 Fine-Granularity Transmission Distortion Modeling for Video Packet Scheduling Over Mesh Networks
2010
09 M 09 Investigating the Scheduling Sensitivity of P2P Video Streaming
2009
10 M 10 Coherent Phrase Model for Efficient Image Near Duplicate Retrieval
2009
11 M 11 Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor
2009
12 M 12 LayerP2P: Using Layered Video Chunks in P2P Live Streaming
2009
13 M 13Content-Based Image Retrieval Using Multi resolution Color and Texture Features
2008
14 M 14 Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques
2008
15 M 15 Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing
2008
16 M 16 Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver
2008
17 M 17 Locality-Awareness in BitTorrent-Like P2P Applications
2008
18 M 18 Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
2008
19 M 19 Analyzing Voice Quality in Popular VoIP Applications
2008
20 M 20 Image Retrieval With Relevance Feedback Based on Graph-Theoretic Region Correspondence Estimation
2008
21 M 21 Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector
2008
22 M 22 Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE AUDIO,SPEECH & VIDEO
PROCESSING
S.NO CODE PROJECT TITLE YEAR
01 AV 01 Robust Multiplicative Patchwork Method for Audio Watermarking
2009
02 AV 02 Scalable Audio Compression at Low
Bitrates
2008
03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based System for Large-Scale Conference Support
2008
04 AV 04 Extracting Question/Answer Pairs In Multi-Party Meeting
2008
05 AV 05 Hybrid Signal-and-Link-Parametric Speech Quality Measurement for VoIP Communications
2008
06 AV 06 Rate-Distortion Optimal Video Transport Over IP Allowing Packets With Bit Errors
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE ARTIFICAL INTELLIGENCE
S.NO CODE PROJECT TITLE YEAR
01 AI 01 Vehicle Number Plate Recognition Using Mathematical Morphology and Neural Networks
2008
02 AI 02 Vision-Based Eye Blink Monitoring System for Human-Computer Interfacing
2008
03 AI 03 Multi-modal Interfaces for Interaction Communication between Hearing and Visually Impaired Individuals: Problems & Issues
2008
04 AI 04 Embedded Vehicle Control System Based on Voice Processing Technologies
2008
05 AI 05 A Test bed for Voice-Based Robot Control
2008
06 AI 06 Human Voice Based Wheel Chair Control
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE MOBILE COMPUTING
S.NO CODE PROJECT TITLE YEAR
01 M01 Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
2010
02 M02 MABS: Multicast Authentication Based on Batch signature
2010
03 M03 Handling Mobility in Wireless Sensor and Actor Networks
2010
04 M04 Clustering and cluster-based routing protocol for delay-
2010
tolerant mobile networks05 MC
05
Energy-Efficient Communication Scheme forMobile Ad Hoc Networks
2009
06 MC
06
A Novel Scheduled Power Saving Mechanism for 802.11 Wireless LANs
2009
07 MC
07
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
2009
08 MC
08
Mitigation of Control Channel Jamming under Node Capture Attacks
2009
09 MC
09
Tabu Search Algorithm for Cluster Buildingin Wireless Sensor Networks
2009
10 MC
10
An Energy Efficient Communication Scheme for Mobile AD HOC Networks
2009
11 MC
11
Hybrid routing in clustered DTNs with message ferrying
2007
12 MC
12
Transmission Power Control in Wireless Ad Hoc Networks
2007
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE INFORMATION AND FORENSICS SECURITY
S.NO CODE PROJECT TITLE YEAR
01 IF 01Edge Adaptive Image Steganography Based on LSB Matching Revisited
2010
02 IF 02Blind Authentication: A Secure
2010
Crypto-Biometric Verification Protocol03 IF 03
Predictive Network Anomaly Detection and Visualization
2010
04 IF 04Lossless Data Embedding in Electronic Inks
2010
05 IF 05SVD-Based Universal Spatial Domain Image Steganalysis
2010
06 IF 06Reversible Image Watermarking Using Interpolation Technique
2010
07 IF 07MPSteg-Color: Data Hiding Through Redundant Basis Decomposition
2009
08 IF 08 Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis
2009
09 IF 09 Halftone Visual Cryptography Via Error Diffusion
2009
10 IF 10 A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication
2009
11 IF 11 Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
2009
12 IF 12 Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms
2009
13 IF 13 Spread-Spectrum Watermarking Security
2008
14 IF 14Robust Blind Watermarking of Point-Sampled Geometry
2009
15 IF 15 Security of Lattice-Based Data Hiding 2008
Against the Watermarked-Only Attack16 IF 16 Multipurpose Watermarking Based on
Multiscale Curvelet Transform2008
17 IF 17 Cryptographic Secrecy of Steganographic Matrix Embedding
2008
18 IF 18 Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase
2008
19 IF 19 A Novel Difference Expansion Transform for Reversible Data Embedding
2008
20 IF 20 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
21 IF 21Color Image Watermarking Using Multidimensional Fourier Transforms
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE Pattern Analysis & Machine Intelligence
S.NO CODE PROJECT TITLE YEAR01 PA 01 Using Language to Learn Structured
Appearance Models for Image Annotation
2010
02 PA 02 A Boosting Framework for Visuality-Preserving Distance Metric Learning and Its Application to Medical Image Retrieval
2010
03 PA 03 Accurate Image Search Using the Contextual Dissimilarity Measure
2010
04 PA 04 Faster and Better: A Machine LearningApproach to Corner Detection
2010
05 PA 05 In the Eye of the Beholder: A Survey of Models for Eyes and Gaze
2010
06 PA 06 Polynomial Time Algorithms for Ratio Regions and a Variant of Normalized Cut
2010
07 PA 07 Single-Image Super-Resolution Using Sparse Regression and Natural Image Prior
2010
08 PA 08 Self-Similarity and Points of Interest 2010
09 PA 09 Iris Recognition: On the Segmentation of Degraded Images Acquired in the Visible Wavelength
2010
10 PA 10 Image Segmentation with a Unified Graphical Model
2010
11 PA 11 A Perceptually Inspired Variation Framework for Color Enhancement
2009
12 PA 12 Image Transformations and Blurring 2009
13 PA 13 Robust Wavelet-Based Super-Resolution Reconstruction: Theory and Algorithm
2009
14 PA 14 IRGS: Image Segmentation Using Edge Penalties and Region Growing
2009
15 PA 15 Real World Image Annotation and Retrieval
2008
16 PA 16 Visual Rank: Applying Page Rank to Large-Scale Image Search
2008
17 PA 17 Localized Content-Based Image Retrieval
2008
18 PA 18 Annotating Images by Mining Image Search Results
2008
19 PA 19 A Discriminative Kernel-Based Approach to Rank Images from Text Queries
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE Internet Computing
S.NO CODE PROJECT TITLE YEAR
01 I 01 Learning-Based Approaches for Matching Web Data Entities
2010
02 I 02Peer-to-Peer 3D Streaming
2010
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE Parallel And Distributed Systems
S.NO CODE PROJECT TITLE YEAR
01 PD 01 An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems
2010
02 PD 02 An Analytical Approach to Optimizing Parallel Image Registration/Retrieval
2010
03 PD 03 Improving Reliability for Application-Layer Multicast Overlays
2010
04 PD 04 Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
2010
05 PD 05 Snoogle: A Search Engine for Pervasive Environments
2010
06 PD 06 A Cross-Layer Approach-Based Gnutella for Collaborative Virtual Environments over Mobile Ad Hoc Networks
2010
07 PD 07 Correlation-Based Traffic Analysis Attacks on Anonymity Networks
2010
08 PD 08 A Hypergraph Approach to Linear Network Coding in Multicast Networks
2010
09 PD 09 On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
2010
10 PD 10 SocioNet: A Social-Based Multimedia 2010
Access System for Unstructured P2P Networks
11 PD 11 An Efficient Superpeer Overlay Construction and Broadcasting Scheme Based on Perfect Difference Graph
2010
12 PD 12 Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?
2010
13 PD 13 mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming
2010
14 PD 14 Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs
2010
15 PD 15 A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
2010
16 PD 16 Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks
2010
17 PD 17 A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer
2010
18 PD 18 Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows
2009
19 PD 19 Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming
2009
20 PD 20 Enforcing Minimum-Cost Multicast Routingagainst Selfish Information Flows
2009
21 PD 21 Scalable Routing in Cyclic Mobile Networks
2009
22 PD 22 Dynamic Search Algorithm in UnstructuredPeer-to-Peer Networks
2009
23 PD 23 Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor
2009
Networks24 PD 24 A Faithful Distributed Mechanism for
Sharingthe Cost of Multicast Transmissions
2009
25 PD 25 Multipath Dissemination in Regular Mesh Topologies
2009
26 PD 26 Detecting Malicious Packet Losses 2009
27 PD 27 Diverse Firewall Design 2008
28 PD 28 Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement
2008
29 PD 29 Computation-Efficient Multicast Key Distribution
2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE Dependable and Secure Computing
S.NO CODE PROJECT TITLE YEAR
01 DSC
01
Layered Approach Using Conditional Random Fields for Intrusion Detection
2010
02 DSC
02
In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm
2010
03 DSC 03
An Advanced Hybrid Peer-to-Peer Botnet
2010
04 DSC 04
Error Detection and Fault Tolerance in ECSM Using Input Randomization
2009
05 DSC
05
Security Analysis of the SASI
Protocol
2009
06 DSC Flexible Rollback Recovery in 2009
06 Dynamic Heterogeneous Grid Computing
07 DSC 07
The Effectiveness of Checksums for Embedded Control Networks
2009
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE Software Engineering
S.NO CODE PROJECT TITLE YEAR
01 SW 01 Enhanced Modeling and Solution of Layered Queuing Networks
2009
02 SW 02 COMOM: Efficient Class Oriented Evaluation of Multiclass Performance Models
2009
03 SW 03 An Investigation Into the Functional Form of the Size-Defect Relationship For Software Modules
2009
04 SW 04 Optimized Resource Allocation for Software Release Planning
2009
05 SW 05 Automatic Extraction of Heap ReferenceProperties in Object-Oriented Programs
2009
06 SW 06 CHARMY: A Framework for Designing andVerifying Architectural Specifications
2009
07 SW 07 Synthesis of Partial Behavior Models from Properties and Scenarios
2009
08 SW 08 Identification of Move Method Refactoring Opportunities
2009
09 SW 09 A Hierarchical Model for Object-Oriented Design Quality Assessment
2009
10 SW 10 Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the same System
2009