Documente Academic
Documente Profesional
Documente Cultură
IEEE 2011-2012
IEEE TRANSACTION ON CLOUD COMPUTING Domain: Dot. Net
Project Titles
Year
EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced Computer Science Course
Description: Demonstrates that platform clouds are valued by both students and professors to achieve the course objectives and that clouds offer a significant improvement over the previous situation in labs where much effort was devoted to setting up the software necessary for course activities
2011
SDCC02
2011
SDCC03
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Description: Proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol
2011
SDCC04
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Description: Identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design.
2011
SDCC05
2011
SDCC06
2011
SDCC07
Multi-level
Intrusion
Detection
system
and
Log
2011
2010
Sl.No
Project Code
Project Titles
Year
SDMC01 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
Description: Efficient Geographic Multicast Protocol -uses a virtualzone-based structure to implement scalable and efficient group membership management.
2011
2010
SDMC03 A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
Description: A distributed and scalable scheduling access scheme that mitigates high data loss in data-intensive sensor networks and can also handle some mobility. It alleviates transmission collisions by employing virtual grids that adopt Latin Squares characteristics to time slot assignments.
2011
2011
SDMC05
2010
SDMC06
2010
the fly" and can guarantee both full delivery and a constant approximation ratio to the optimal solution.
SDMC07
2010
Sl.NO 1.
Code SDNS01
Project titles SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless
Description: Ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs.
Year 2011
2.
SDNS02
Replica Placement for Route Diversity in Tree-based Routing Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route diversity for these DHTs.
2011
3.
SDNS03
Privacy-Preserving
Updates
to
Anonymous
and
2011
Confidential Databases
Description: Protocols solving suppression-based and generalizationbased k-anonymous and confidential databases. And it will rely on wellknown cryptographic assumptions.
4.
SDNS04
2011
(PGRP), derived upon revisiting prior proposals designed to restrict such attacks.
5.
SDNS05
2011
6.
SDNS06
2011
7.
SDNS07
Blind
Authentication:
Secure
Crypto-Biometric
2010
Verification Protocol
Description: we propose a Provably secure and blind biometric authentication protocol, which addresses the concerns of users privacy, template protection, and trust issues. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography. The authentication protocol can run over public networks and provide non reputable identity verification.
8.
SDNS08
2010
modern processors that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory such that a processor will never be able to fetch injected code for execution. This virtual split memory system can be implemented as a software-only patch to an operating system and can be used to supplement existing schemes for improved protection.
9.
SDNS09
2010
10.
SDNS10
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance
Description: we present a novel approach to behavioral distance measurement using a new type of Hidden Markov Model, and present an architecture realizing this new approach. We evaluate the detection capability of this approach using synthetic workloads and recorded workloads of production web and game servers, and show that it detects intrusions with substantially greater accuracy than a prior proposal on measuring behavioral distance.
2009
11.
SDNS11
2009
both benign faults, i.e., crash faults, and node or subnet volatility. Specifically, the protocols base the state of the execution on a dataflow graph, allowing for efficient recovery in dynamic heterogeneous systems as well as multithreaded applications.
12.
SDNS12
2009
13.
SDNS13
2009
IEEE TRANSACTION ON KNOWLEDGE AND DATA ENGINEERING, DATAMINING Domain: Dot. Net
Sl.No 1.
Code
Project Titles
Year 2011
SDDM01 Mining Group Movement Patterns For Tracking Moving Objects Efficiently
Description: Comprises a local mining phase and a cluster ensembling phase to finds movement patterns based on local trajectories. Then, based on the derived patterns, similarity measure to compute the similarity of moving objects and identify the local group relationships.
2.
SDDM02 Efficient Periodicity Mining In Time Series Databases Using Suffix Trees
Description: Detect symbol, sequence (partial), and segment (full cycle) periodicity in time series. The algorithm uses suffix tree as the underlying data structure;
2011
3.
2011
4.
SDDM04 Experience Transfer for the Configuration Tuning in Large-Scale Computing Systems
Description: Facilitate the management of large-scale computing systems. The utilization of management experiences in one system to benefit the same management task in other systems (or current systems).
2011
5.
SDDM05 A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
Description: An empirical method to estimate semantic similarity using page counts and text snippets retrieved from a web search engine for two words. Word co-occurrence using page counts and Integrate those with lexical patterns extracted from text snippets.
2011
6.
2011
7.
SDDM07 A Machine Learning Approach for Identifying DiseaseTreatment Relations in Short Texts
Description: Describes a ML-based methodology for building an application that is capable of identifying and disseminating healthcare information. It extracts sentences from published medical papers that mention diseases and treatments, and identifies semantic relations that exist between diseases and treatments.
2011
8.
2011
9.
2011
Systems
Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource conflicts subject to temporal constraints and simultaneously optimizes throughput or utilization subject to resources constraints.
2010
distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i.e., the distance between the two distributions should be no more than a threshold propose a more flexible privacy model called higher utility. ). We then
11. SDDM11 Record Matching over Query Results from Multiple Web Databases
Description: we present an unsupervised, online record matching method, UDD, which, for a given query, can effectively identify duplicates from the query result records of multiple Web databases. After removal of the same-source duplicates, the "presumed" nonduplicate records from the same source can be used as training examples
2010
2010
13. SDDM13 Bridging Domains Using World Wide Knowledge for Transfer Learning
Description: we design a novel transfer learning approach, called BIG (Bridging Information Gap), to effectively extract useful knowledge in a worldwide knowledge base, which is then used to link the source and target domains for improving the classification performance. BIG works when the source and target domains share the same feature space but different underlying data distributions.
2010
14. SDDM14 Personalizing web directories with the aid of web usage data
Description: we introduce a novel methodology that combines the users' browsing behavior with thematic information from the Web directories. Following this methodology, we enhance the clustering and probabilistic approaches presented in previous work and also present a new algorithm that combines these two approaches. The resulting community models take the form of Community Web Directories.
2010
15. SDDM15 Filter-Based Data Partitioning for Training Multiple Classifier Systems
Description: To assess the effectiveness of different types of training partitions, we generated a large number of disjoint training partitions with distinctive distributions. Then, we empirically assessed these training partitions and their impact on the performance of the system by utilizing the proposed feature-based and class-based measures. We applied the findings of this analysis and developed a new partitioning method called "Clustering, Declustering, and Selection" (CDS).
2010
Page-Level
Web
Data
Extraction
from
2010
Template Pages
Description: We propose an unsupervised, page-level data extraction approach to deduce the schema and templates for each individual Deep Website, which contains either singleton or multiple data records in one Webpage. FiVaTech applies tree matching, tree alignment, and mining techniques to achieve the challenging task.
2009
Correction
and
Recommendation
for
2009
19. SDDM19 Optimal Lot Sizing Policies for Sequential Online Auctions
Description: We first present a goal programming approach for estimating the bid distribution for the bidder population from the observed bids, readily available in these auctions. We then develop models to compute optimal lot sizes for both stationary and nonstationary bid distributions. For stationary bid distributions, we present closed-form
2009
2009
21. SDDM21 Fast Query Point Movement Techniques for Large CBIR Systems
Description: We propose a new index structure and query processing technique to improve retrieval effectiveness and efficiency. We also consider strategies to minimize the effects of users' inaccurate RF. Extensive experiments in simulated and realistic environments show that our approach significantly reduces the number of required iterations and improves overall retrieval performance.
2009
2009
23. SDDM23 Hierarchical distribute p2p document clustering and clustering summarization
Description: we propose a Hierarchically distributed Peer-to-Peer (HP2PC) architecture and clustering algorithm. The architecture is based on a multilayer overlay network of peer neighborhoods. Super-nodes, which act as representatives of neighborhoods, are recursively grouped to form higher level neighborhoods. Within a certain level of the hierarchy, peers cooperate within their respective neighborhoods to perform P2P clustering.
2009
Sl.No 1.
Code SDIP01
Year 2011
2.
SDIP02
A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization
2011
Description: In this paper, an innovative approach is proposed that combines a relevance feedback (RF) approach with an evolutionary stochastic algorithm, called particle swarm optimizer (PSO), as a way to grasp user's semantics through optimized iterative learning. The retrieval uses human interaction to achieve a twofold goal: 1) to guide the swarm particles in the exploration of the solution space towards the cluster of relevant images; 2) to dynamically modify the feature space by appropriately weighting the descriptive features according to the users' perception of relevance.
3.
SDIP03
2010
4.
SDIP04
2010
5.
SDIP05
2010
Technique
Description: we present a novel reversible watermarking scheme using an interpolation technique, which can embed a large amount of covert data into images with imperceptible modification. we utilize the interpolation-error, the difference between interpolation value and corresponding pixel value, to embed bit ??1?? or ??0?? by expanding it additively or leaving it unchanged.Due to the slight modification of pixels, high image quality is preserved.
6.
SDIP06
2010
Sl.No 1.
Code
Project Titles
Year 2011
Description: Unconditionally secure authentication code for multicast network coding, where the trusted authority gives the key rights to the destinations and intermediate nodes. A digital signature, A message authentication code or An authentication code
2.
Multicast
Networks
With
QoS
2011
Description: Each edge node admits not more than a specified amount of traffic; the network will never experience link congestion. A non blocking unicast network and a multicast network share the same optimal paths, and that a nonblocking multicast network with network coding can admit the same amount of traffic as a nonblocking unicast network.
3.
SDNW03 A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless Networks
Description: Denote as TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling of transmissions within the TCP Congestion window.
2011
4.
2011
5.
2011
6.
SDNW06 DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis
Description: we propose an anomaly-based detection system by using strategically distributed monitoring stubs (MSs). We have categorized various attacks against cryptographic protocols. The MSs, by sniffing the encrypted traffic, extract features for detecting these attacks and construct normal usage behavior profiles. Upon detecting suspicious activities due to the deviations from these normal profiles, the MSs notify the victim servers, which may then take necessary actions.
2010
7.
SDNW07 Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
Description: we propose a general framework for designing topology inference algorithms based on additive metrics. The framework can flexibly fuse information from multiple measurements to achieve better estimation accuracy. We develop computationally efficient (polynomialtime) topology inference algorithms based on the framework
2010
8.
SDNW08 A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems
Description: The main contribution of this paper is a modeling framework for the peers that accounts for the file size distribution, the search time, load distribution at peers, and number of concurrent downloads allowed by a peer. We propose a queuing model that models
2010
the nodes or peers in such systems as M/G/1/K processor sharing queues. The model is extended to account for peers which alternate between online and offline states.
9.
SDNW09 An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems
Description: This paper presents an Efficient and adaptive
2010
decentralized file replication algorithm (EAD) that achieves high query efficiency and high replica utilization at a significantly low cost. EAD enhances the utilization of file replicas by selecting query traffic hubs and frequent requesters as replica nodes, and dynamically adapting to non-uniform and time-varying file popularity and node interest.
2010
11. SDNW11 POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority
Description: we present an end-to-end approach for PFP inference and its associated tool, POPI. This is the first attempt to infer router packet forwarding priority through end-to-end measurement. POPI enables users to discover such network policies through measurements of packet losses of different packet types.
2010
2010
2010
2010
15. SDNW15 Plexus-A scalable p2p Protocol enabling efficient subset search
Description: Plexus, a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit-sequence (pattern), and discovering it using any subset of its 1-bits. A pattern (e.g., Bloom filter) summarizes the properties (e.g., keywords, service description) associated with a shared object (e.g., document, service). Plexus has a
2009
partially decentralized architecture involving super-peers. It adopts a novel structured routing mechanism derived from the theory of error correcting codes (ECC).
Scheduling
for
Market-Like
2009
Computational Grids
Description: We present an incentive-based scheduling scheme, which utilizes a peer-to-peer decentralized scheduling framework, a set of local heuristic algorithms, and three market instruments of job announcement, price, and competition degree.
2009
COMPUTING
Domain: Dot. Net
Sl.No
Project Code
Project Titles
Year
SDP01
2011
cooperative communication capability of the physical layer to improve robustness in wireless ad hoc networks.
SDP02
Collective Applications
Receiver-Initiated
Multicast
for
Grid
2011
Description: Present Robber, a collective, receiver-initiated, highthroughput multicast approach inspired by the Bit Torrent protocol to maximize the throughput between multiple cluster computers.
SDP03
2011
SDP04
2011
SDP05
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
Description: Investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication.
2011
SDP06
2011
SDP07
2011
SDP08
2011
JAVA:
IEEE TRANSACTION ON MOBILE COMPUTING
Project Titles
Year
2011
Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. This avoids the fluctuation of packets transferring over the inter-related networks.
SJMC02 Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing
Description: We propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. This is the best work to tackle the problem of replica node attacks in mobile sensor networks.
2011
SJMC03 Decentralized
QoS-Aware
Checkpointing
2010
SJMC04 Distributed
Algorithms
for
Minimum
Cost
2010
Multicast with Network Coding in Wireless Networks 5 SJMC05 SSUM: Smart Server Update Mechanism for Maintaining Environments 6 SJMC06 CAR: context aware adaptive routing for delay tolerant mobile networks 2010 Cache Consistency in Mobile 2010
Project Titles
Year
Authenticated Multistep Nearest Neighbor Search A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
Description: Describes a ML-based methodology for building an application that is capable of identifying and disseminating healthcare information. It extracts
2011 2011
sentences from published medical papers that mention diseases and treatments, and identifies semantic relations that exist between diseases and treatments.
3.
Domain: Java
Project Titles
Year
SJNS01 Flexible Robust Group Key Agreement SJNS02 Replica Placement for Route Diversity in TreeBased Routing Distributed Hash Tables
Description: Tree-based routing DHTs and define
2011 2011
SJNS03 Design and Implementation of an Intrusion Response System for Relational Databases
2011
SJNS04 A
Puzzle-Based
Defense
Strategy
Against
2010
Flooding Attacks Using Game Theory 5 SJNS05 Layered Approach Using Conditional Random Fields for Intrusion Detection 6 SJNS06 An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks 2010 2010
Domain: Java
Project Titles
Year
Joint Optimization of Complexity and Overhead for the Routing in Hierarchical Networks
Description: The main contribution of this paper is to analyze the routing complexity and the routing table size in the hierarchical network by using routing algorithm known as area-based link-vector algorithm (ALVA) was proposed to allow more flexible Topologies and to remove the network bottleneck.
2011
SJP02
2011
protocol for decentralized P2P systems. This is also known as the Mutual path for data transferring and avoiding the collision.
SJP03
Cooperative
Channelization
in
Wireless
2011
which portions of the transmission media are allocated to links that are congested at the point.
SJP04
2011
Sl.No
Project Code
Project Titles
Year
2011
performance of cooperative transmission, and an energyefficient cooperative protocol, and we analyzed the robustness of the protocol to data packet loss.
2011
2011
wireless link failures. Network channels cause significant and varying degrees of losses or collisions in packet transmissions
2011
Joint Optimization of Complexity and Overhead for the Routing in Hierarchical Networks Cooperative Channelization in Wireless Networks with Network Coding Load Balance with Imperfect Information in Structured Peer-to-Peer Systems
Fabsys Technologies Pvt.Ltd | 32 IEEE Projects Software
SJNW05 Path Diversity Over Packet Switched Networks: Performance Analysis and Rate Allocation
2010
SJNW06 Normalized queuing delay: congestion control jointly utilizing delay and marking
2010
2009
2009
SJNW09 Node isolation model and age-based neighbor selection in unstructured p2p networks
2009
10
2009
11 12
2009 2009
SINO
PROJECT CODE
TITLES
LANGUAG E
1 2 3 4
Effective blogger with XML interchange Alert based monitoring and scheduling on Proportional shares An Architectural Approach to Preventing Code Injection Attacks
Record Matching over Query Results from Multiple Web Dotnet/Ja Databases va Dotnet
6 7
Dotnet
9 10 11 12 13 14 15
A Relation-Based Page Ranking in Web Search Engines Credit card fraud detection using HMM model Database Enterprise manager Online Bug tracking System Trace back of DoS Attacks using Entropy Variations Exact Knowledge hiding for automobiles industry
16 17 18
Efficient Property Interpretor Personalizing web directories with the aid of web usage data
Dotnet Dotnet
A new steganographic method based on information sharing via Dotnet PNG images
19 20 21 22 23 24 25
Step Construction of Visual Cryptography Schemes Perspective Access Management Generic Lossless Visible WatermarkingA New Approach Efficient Compression of Encrypted Grayscale Images Latent Fingerprint Matching Online Data leakage detection
Bridging Domains Using World Wide Knowledge for Transfer Dotnet Learning
26 27 28 29 30 31 32 33 34 35 36 37
Intrusion Detection System based on Data Mining Optimal Lot Sizing Policies for Sequential Online Auctions Credit card fraud detection using hidden Markov model Efficient Broadcasting in Mobile AD-Hoc Network Online Buying and Selling System. Reversible Image Watermarking Using Interpolation Technique Email Proxy Server with Secure Service Secure Mobile health care for rural with electronic alerts Southern Railway Recruitment Portal Development Of A Campaign Information System Fast Firewall Implementations
Dotnet Dotnet Dotnet Dotnet Dotnet Dotnet Dotnet Dotnet Dotnet Dotnet Dotnet
Web-based Recruitment Process System for the HR group for a Dotnet company
38 39 40 41 42 43
Medical anonymity processing and publishing Global roaming and target tracking in mobile sensor network Fast Firewall Implementations Security and Privacy for Social Networks. Still to animation movie creation
A Queuing Model for Evaluating the Transfer Latency of Peer-to- Dotnet Peer Systems
44
45
Dotnet/Ja va
46
Dotnet/Ja va
47
48 49 50
Approximate query processing in peer to peer networks Accurately Measuring Denial Of Service
Dotnet Dotnet
Normalized queuing delay: congestion control jointly utilizing Java delay and marking
51 52 53
Java Java
Node isolation model and age-based neighbor selection in Java unstructured p2p networks
54
An Identity-Based Security System for User Privacy in Vehicular Java Ad Hoc Networks
55
Layered Approach Using Conditional Random Fields for Java Intrusion Detection
56
A Puzzle based defense strategy against flooding attacks using Java game theory
57
Adaptive Join Operators for Result Rate Optimization on Java Streaming Inputs
58
Bin Rank: Scaling Dynamic Authority-Based Search Using Java Materialized Subgraphs
59 60
NNexus: An automatic linker for collaborative web based corpora Java SSUM: Smart Server Update Mechanism for Maintaining Cache Java Consistency in Mobile Environments
61
CAR: context aware adaptive routing for delay tolerant mobile Java networks
62 63 64 65
QKDP: Provably secured third party authenticated quantum key Java distribution protocol
66 67 68
Controlling IP spoofing through inter-domain packet filters A service centric multicast architecture and routing protocol
Java Java
Enhancing search performance in unstructured p2p networks Java based on users common interest
69
70
Dotnet
71 72 73 74 75 76
Secured Data Object Replication in data grid Blind Banking Transformation System Medical anonymity processing and publishing Object tracking system Lossless Visible Watermarking Secure data transformation system
SINO
PROJECT CODE
TITLES
1.
SPHP01
Real time
2.
SPHP02
Real time
3.
SPHP03
Real time
4.
SPHP04
Real time
5.
SPHP05
Real time
6.
SPHP06
Real time
7.
SPHP07
Online Examination
Real time
8.
SPHP08
Real time
9.
SPHP09
Real time
10.
SPHP10
Real time