Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
2011 updated titles [ skiveprojects ]
1. Skiveprojects
TABLE OF CONTENTS
S. No PROJECT TITLES PAGE.NO
1 DOT NET IEEE TITLES 3
1.1 Cloud Computing 3
1.2 Mobile Computing 4
1.3 Network Security 5
1.4 Data Mining 8
1.5 Image Processing 11
1.6 Distributed Networking 12
1.7 Parallel & Distributed Computing 15
17
2 JAVA IEEE TITLES
2.1 Data Mining 17
2.2 Network Security 19
2.3 Parallel and Distributed Computing 20
2.4 Distributed Networking 21
2.5 Image Processing 23
3 NETWORK SIMULATOR(NS2) TITLES 25
4 APPLICATION PROJECT TITLES 26
4.1 DOT NET APPLICATION TITLES 26
4.2 JAVA APPLICATION TITLES 28
5 FLASH AND ANIMATION TITLES 29
6 EMBEDDED SYSTEM IEEE TITLES 30
7 EMBEDDED SYSTEM NON IEEE TITLES 33
8 MATLAB IEEE TITLES 35
8.1 Communication 35
8.2 Image Processing 36
9 VLSI IEEE TITLES 36
Fabsys Technologies Pvt.Ltd | 1
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
2. Skiveprojects
About Skiveprojects
Skiveprojects.com is a division of Fabsys Technologies (P) Ltd. It is specially organized for students’
guidance in their project work as well as in career development. As a team, we provide technical
assistance in various technologies and domains. By efficient training methodologies, we train students in
their desired field. We focus on needs of the students. To make students career brighter in desired field,
we are functioning as a bridge for students.
We provide
Project Guidance for all departments(UG & PG)
In plant training for IT, CSE, ECE departments respectively
Career Development programs
Seminars in various Domain & Technology every day!!
Internship Training & Certification
What is the real use of doing IEEE Project in final year?
Well, it is simple. Doing Project in final year will help you
To make an entry in Real time working environment
In most of the technical interview, Companies will ask questions around your final year projects
Exposure in latest technology in the field
Backbone for placement
Real time Training in an organization
Bring Own Concepts!!
You can bring your own concepts to us. We will develop projects according your requirement.
Project Guidance with Short Term Course.
Online Training for out-station students
Fabsys Technologies Pvt.Ltd | 2
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
3. Skiveprojects
DOT NET IEEE TITLES
IEEE TRANSACTION ON: CLOUD COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLE & DESCRIPTION Published
Year
1. SDCC01 EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced 2011
Computer Science Course.
Description: Platform clouds are valued by both students and professors to achieve the
course objectives and that clouds offer a significant improvement over the previous
situation in labs.
Technology: Paas Cloud Usage : Cloud In Education
2. SDCC02 CloudTPS: Scalable Transactions for Web Applications in the Cloud. 2011
Description: CloudTPS (scalable transaction manager) guarantees full ACID properties
for multi-item transactions issued by Web applications, even in the presence of server
failures and network partitions.
Technology: Local Transaction Manager Usage: Acid Properties To Nosql
3. SDCC03 A Privacy-Preserving Remote Data Integrity Checking Protocol with 2011
Data Dynamics and Public Verifiability.
Description: Proposed protocol supports public verifiability without help of a third party
auditor. In addition, the proposed protocol does not leak any private information to third
party verifiers.
Technology: Public Verifiability Usage : Integrity In Cloud
4. SDCC04 Enabling Public Auditability and Data Dynamics for Storage Security 2011
in Cloud Computing.
Description: Identifying the difficulties & potential security problems of direct
extensions with fully dynamic data updates from prior works and then construct an
elegant verification scheme for the seamless integration.
Technology: Third Party auditor Usage : Data Security in Cloud
5. SDCC05 Optimal Service Pricing for a Cloud Cache. 2011
Description: A novel SOA-aware approach with a special focus on the data flow. The
tight interaction of new cloud technologies with SOA technologies enables us to
optimize the execution of data-intensive service.
Technology: Framework For Dynamic Pricing Usage : Cloud Profit
Fabsys Technologies Pvt.Ltd | 3
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
4. Skiveprojects
6. SDCC06 Failure Avoidance through Fault Prediction Based on Synthetic 2011
Transactions.
Description: Enhancing an online service’s reliability, availability and performance.
Synthetic transactions in pre-production environments, and combined with data-mining
on compact, specialized logs.
Technology: Synthetic Transactions Usage : Eliminate Failure
7. SDCC07 Multi-level Intrusion Detection system and Log Management in 2011
Cloud Computing.
Description: A method that enables cloud computing systems both effectiveness of
using system resource and system strength of security.
Technology: Levels of IDS Usage: Security with high Accessibility
8. SDCC08 Using Cloud Technologies to Optimize Data-Intensive Service 2010
Applications
Description: The tight interaction of new cloud technologies with SOA technologies
enables us to optimize the execution of data-intensive service applications by reducing
the data exchange tasks to a minimum.
Technology: Cloud SOA Usage : Eliminate Unwanted Data
IEEE TRANSACTION ON: MOBILE COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDMC01 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011
Networks.
Description: Efficient Geographic Multicast Protocol -uses a virtual-zone-based
structure to implement scalable and efficient group membership management.
Technology: Virtual Zone Usage: Reliable Packet Transmissions
2. SDMC02 Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh 2010
Networks.
Description: A specialization that accounts for peculiar features of wireless mesh
networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast
nature of wireless communication.
Technology: 1-Hop Broadcast Usage :Information retrieval efficiency
3. SDMC03 A Distributed and Scalable Time Slot Allocation Protocol for Wireless 2011
Sensor Networks.
Description: A distributed and scalable scheduling access scheme that mitigates high
data loss in data-intensive sensor networks and can also handle some mobility.
Technology: Latin Squares Usage: Eliminate Collision
Fabsys Technologies Pvt.Ltd | 4
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
5. Skiveprojects
4. SDMC04 Secure High-Throughput Multicast Routing in Wireless Mesh 2011
Networks.
Description: Identifying novel attacks against high throughput multicast protocols in
wireless mesh networks.
Technology: Defense Mechanisms Usage: Prevent from identified attacks
5. SDMC05 Message Authentication in Computationally Constrained 2010
Environments.
Description: An approach to implement a compact HMAC by the use of stream
ciphering is presented in this paper.
Technology: Stream Cipher Usage: Authentication, Integrity
6. SDMC06 Efficient Broadcasting in Mobile AD-Hoc Network. 2010
Description: New broadcasting algorithm that constructs a CDS "on the fly" and can
guarantee both full delivery and a constant approximation ratio to the optimal solution.
Technology: Broadcasting Algorithms Usage: Reliable Transmission
7. SDMC07 Multicasting with Localized Control in Wireless AD-Hoc Network 2010
Description: The proposed scheme combines the layered multicast concept with the
routing-based congestion avoidance idea to reduce the aggregated rate of multicast flows.
Technology: cross-layer approach Usage: Congestion Avoidance
IEEE TRANSACTION ON : NETWORK SECURITY
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDNS01 SAT: A Security Architecture Achieving Anonymity and 2011
Traceability in Wireless.
Description: Ensure unconditional anonymity for honest users and traceability of
misbehaving users for network authorities in WMNs.
Technology: Anonymity And Traceability Usage : Identify Users
2. SDNS02 Replica Placement for Route Diversity in Tree-based Routing 2011
Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
diversity for these DHTs.
Technology: Route Diversity Usage : Response Time Reduced
3. SDNS03 Privacy-Preserving Updates to Anonymous and Confidential 2011
Databases
Description: Protocols solving suppression-based and generalization-based k-
anonymous and confidential databases. And it will rely on well-known cryptographic
assumptions.
Technology: Secure Computation Usage : Privacy-Preserving
Fabsys Technologies Pvt.Ltd | 5
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
6. Skiveprojects
4. SDNS04 Revisiting Defenses Against Large-Scale Online Password Guessing 2011
Attacks
Description: A new Password Guessing Resistant Protocol (PGRP), derived upon
revisiting prior proposals designed to restrict such attacks.
Technology: Automated Turing Tests Usage : Identify Malicious Login
5. SDNS05 Balancing Revocation and Storage Trade-Offs in Secure Group 2011
Communication
Description: Hybrid key management algorithm. Trade-offs between storage cost and
rekeying cost for secure multicast.
Technology: A Family Of Algorithms Usage : Reduce Cost Of Rekeying
6. SDNS06 Nymble: Blocking Misbehaving Users in Anonymizing Networks 2011
Description: Servers can “blacklist” misbehaving users, thereby blocking users
without compromising their anonymity. Nymble Tickets and Credentials, Blacklist.
Technology: A Secure System Usage : Block Misbehaving Users
7. SDNS07 Blind Authentication: A Secure Crypto-Biometric Verification 2010
Protocol
Description: A Provably secure and blind biometric authentication protocol, which
addresses the concerns of user’s privacy, template protection, and trust issues.
Technology: Biometric Authentication Usage : Nonrepudiable identity
8. SDNS08 An Architectural Approach to Preventing Code Injection Attacks 2010
Description: The memory architecture of modern processors that addresses the code
injection problem at its very root by virtually splitting memory into code memory and
data memory.
Technology: Memory Architecture Usage : Improved Protection
9. SDNS09 Authenticated Group Key Transfer Protocol Based on Secret 2010
Sharing
Description: An authenticated key transfer protocol based on secret sharing scheme
that KGC can broadcast group key information to all group members at once.
Technology: Trusted Key Generation Center Usage : Secret Sharing
10. SDNS10 Beyond Output Voting: Detecting Compromised Replicas Using 2009
HMM-Based Behavioral Distance
Description: A novel approach to behavioral distance measurement using a new type
of Hidden Markov Model, and present an architecture realizing this new approach.
Technology: Hidden Markov Model Usage : Detect Mimicry Attacks
11. SDNS11 Flexible and Rollback recovery for grid environment 2009
Description: Two fault-tolerance mechanisms called Theft-Induced Check pointing
and Systematic Event Logging.
Technology: Theft-Induced Check Usage : Controlling The Overhead
12. SDNS12 Accurately Measuring Denial of Service in Simulation and Testbed 2009
Experiments
Description: Several DoS impact metrics that measure the quality of service
experienced by users during an attack. Our metrics are quantitative
Technology: Denial of Service Metrics Usage :Measure service quality
Fabsys Technologies Pvt.Ltd | 6
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
7. Skiveprojects
13. SDNS13 Credit card fraud detection using hidden Markov model 2009
Description: An HMM is initially trained with the normal behavior of a cardholder. If
an incoming credit card transaction is not accepted by the trained HMM with
sufficiently high probability.
Technology: Hidden Markov Model Usage :Most accurate detection
14. SDNS14 In-depth packet inspection using a hierarchical pattern matching 2010
algorithm.
Description: EHMA is a two-tier and cluster-wise matching algorithm, which
significantly reduces the amount of external memory accesses and the capacity of
memory.
Technology: Cluster-Wise Matching Usage : Fast scanning process
15. SDNS15 Practical Management And Standard Administrative System 2010
Description: To reduce the manual workload of the administrative activities,
organizations began to electronically automate many of these processes.
Technology: Electronic Automation Usage : increasing scalability
16. SDNS16 Predictive Network Anomaly Detection And Visualization 2010
Description: An approach that uses short-term observations of network features and
their respective time averaged entropies. Acute changes are localized in network
feature space using adaptive Wiener filtering.
Technology: Fisher linear discriminant Usage : Identifying Anomalies
17. Network Traffic Monitor 2010
SDNS17
Description: UniMon (Universal Network Traffic Monitor) is an external and
passive network traffic monitor designed to adapt any type of network and protocols.
Technology: Entropy of Network Traffic Usage: Monitor User Activity
18. Steward : Scaling Byzantine Fault-Tolerant Replication To Wide 2010
SDNS18
Area Networks
Description: The architecture confines the effects of any malicious replica to its local
site, reduces message complexity of wide-area communication.
Technology: Fault-Tolerant Replication Usage :Secure Transmission
Do you need more Explanation for any Project? Contact Skiveprojects @ 9176990090
Fabsys Technologies Pvt.Ltd | 7
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
8. Skiveprojects
IEEE TRANSACTION ON : DATAMINING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1. SDDM01 Mining Group Movement Patterns For Tracking Moving Objects
Efficiently.
Description: A local mining phase & cluster ensembling phase to find movement 2011
patterns based on local trajectories and computing the similarity of moving objects &
identify the local group relationships.
Technology: Distributed clustering Usage : Track Moving Objects
2. SDDM02 Efficient Periodicity Mining In Time Series Databases Using Suffix
Trees.
Description: The algorithm uses suffix tree as the underlying data structure. Detect 2011
symbol, sequence (partial), and segment (full cycle) periodicity in time series.
Technology: Suffix Tree Usage : Time Efficient
3. SDDM03 Automatic Discovery of Personal Name Aliases From the Web
Description: Automatically extracted lexical pattern-based approach to efficiently
extract a large set of candidate aliases from snippets retrieved from a web search engine. 2011
Technology: Lexical Pattern Approach Usage : Information Retrieval
4. SDDM04 Experience Transfer for the Configuration Tuning in Large-Scale 2011
Computing Systems
Description: The utilization of management experiences in one system to benefit the
same management task in other systems (or current systems). Bayesian network to
model configuration dependencies.
Technology: Configuration Tuning Usage : Configuration Tuning
5. SDDM05 A Web Search Engine-Based Approach to Measure Semantic 2011
Similarity between Words.
Description: An empirical method to estimate semantic similarity using page counts
and text snippets retrieved from a web search engine for two words.
Technology: Empirical Method Usage : Improves The Accuracy
6. SDDM06 Data Leakage Detection. 2011
Description: Data allocation strategies that improve the probability of identifying
leakages and develop a model for assessing the “guilt” of agents. That improves chances
of identifying the guilty agents.
Technology: Data Allocation Strategies Usage : Identifying Guilty Party
7. SDDM07 A Machine Learning Approach for Identifying Disease-Treatment 2011
Relations in Short Texts.
Description: A ML-based methodology for building an application that is capable of
identifying and disseminating healthcare information Identifies semantic relations that
exist between diseases and treatments.
Technology: ML-based methodology Usage : Integrated Application
Fabsys Technologies Pvt.Ltd | 8
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
9. Skiveprojects
8. SDDM08 Authenticated Multistep Nearest Neighbor Search 2011
Description: The multistep NN algorithm incurs prohibitive network overhead due to
the transmission of false hits, but are nevertheless necessary for its verification.
Technology: Query Authentication Usage : Reduces Size Of False Hit
9. SDDM09 Optimizing Resource Conflicts in Workflow Management Systems 2011
Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource
conflicts subject to temporal constraints and simultaneously optimizes throughput.
Technology: Eigen-value Analysis Usage :Minimize Resource Conflicts
10. SDDM10 Closeness: A New Privacy Measure for Data Publishing 2010
Description: A new notion of privacy called "closeness." It present the base model -
closeness, which requires that the distribution of a sensitive attribute
Technology: Closeness Usage : Offers Higher Utility
11. SDDM11 Record Matching over Query Results from Multiple Web Databases. 2010
Description: An unsupervised, online record matching method, UDD, where a given
query, can effectively identify duplicates from the query result records of multiple Web
databases.
Technology: Data Deduplication Usage : Get accurate results
12. SDDM12 Towards an Effective XML Keyword Search. 2010
Description: A novel formulae to identify the search for nodes and search via nodes of
a query, and present a novel XML TF*IDF ranking strategy to rank the individual
matches of all possible search intentions.
Technology: Relevance Ranking Usage : Rank the individual matches
13. SDDM13 Bridging Domains Using World Wide Knowledge for Transfer 2010
Learning
Description: A novel transfer learning approach, called BIG to effectively extract
useful knowledge in a worldwide knowledge base, which is then used to link the source
and target domains.
Technology: Cross-Domain Usage: Cross-domain text classification
14. SDDM14 Personalizing web directories with the aid of web usage data 2010
Description: A novel methodology that combines the users' browsing behavior with
thematic information from the Web directories.
Technology: Personalization Methodology Usage : Web Directories
15. SDDM15 Filter-Based Data Partitioning for Training Multiple Classifier 2010
Systems
Description: To assess the effectiveness of different types of training partitions, It
generated a large number of disjoint training partitions with distinctive distributions.
Technology: Clustering and Selection Usage : Classifier Systems
Fabsys Technologies Pvt.Ltd | 9
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
10. Skiveprojects
16. SDDM16 FiVaTech: Page-Level Web Data Extraction from Template Pages 2010
Description: An unsupervised, page-level data extraction approach to deduce the
schema and templates for each individual Deep Website, which contains either singleton
or multiple data records in one Webpage.
Technology: Multiple Trees Merging Usage : Web Data Extraction
17. SDDM17 Histogram-Based Global Load Balancing in Structured Peer-to-Peer 2009
Systems
Description: A general framework, HiGLOB, for global load balancing in structured
P2P systems. Each node with 1) a histogram manager, and 2) a load-balancing manager.
Technology: Histogram Buckets Usage : Load-Balancing
18. SDDM18 Interactive Correction and Recommendation for Computer 2009
Language Learning and Training
Description: An automated learning and skills training system for a database
programming environment that promotes procedural knowledge acquisition and skills
training.
Technology: Error Classification Usage : Personalized Guidance
19. SDDM19 Optimal Lot Sizing Policies for Sequential Online Auctions 2009
Description: A goal programming approach for estimating the bid distribution for the
bidder population from the observed bids, readily available in these auctions.
Technology: Closed-Form Solution Usage : Increases users holding costs
20. SDDM20 Intrusion Detection System based on Data Mining 2009
Description: The system that performs anomaly detection can detect intrusions known
and unknown, reduce omissions and misstatements, improve accuracy and speed of
intrusion detection.
Technology: Hidden Honey pot Usage : Solicit possible attacks
21. SDDM21 Fast Query Point Movement Techniques for Large CBIR Systems 2009
Description: A new index structure and query processing technique to improve retrieval
effectiveness and efficiency.
Technology: Relevance Feedback Usage : Retrieval Performance
22. SDDM22 Exact Knowledge Hiding Through Database Extension 2009
Description: A novel, exact border-based approach that provides an optimal solution
for the hiding of sensitive frequent item.
Technology: Exact Border Approach Usage : Hiding The Sensitive Item
23. SDDM23 Hierarchical distribute p2p document clustering and clustering 2009
summarization
Description: A Hierarchically distributed Peer-to-Peer (HP2PC) architecture and
clustering algorithm. The architecture is based on a multilayer overlay network of peer
neighborhoods.
Technology: distributed key phrase extraction Usage : Global Clustering
Fabsys Technologies Pvt.Ltd | 10
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
11. Skiveprojects
24. SDDM24 Vide: A Vision-Based Approach For Deep Web Data Extraction 2010
Description: A novel technique is proposed for data extraction from deep Web pages
using primarily visual features. A new performance measure, revision, is proposed to
evaluate Web data extraction tools.
Technology: Visual Features Of Web Pages Usage : Web data extraction
25. Multidimensional Suppressions For K-Anonymity 2010
SDDM25
Description: A new method for achieving k-anonymity named K-anonymity of
Classification Trees Using Suppression (kACTUS).
Technology: De-Indentified Data Usage : Multidimensional Suppression
26. Voting Systems With Trust Mechanisms In Cyberspace: 2010
SDDM26
Vulnerabilities And Defenses
Description: Proposing two defense schemes 1. Hide correlation knowledge from
attackers 2. Introduce robustness-of-evidence, a new metric, in trust calculation
Technology: RepTrap Usage : Reduce rate of attacks
IEEE TRANSACTION ON: IMAGE PROCESSING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1. SDIP01 1-D Transforms for the Motion Compensation Residual 2011
Description: An adaptive auto-covariance characterization for the MC-residual that
shows some statistical differences between the MC-residual and the image.
Technology:1D directional transform Usage: Conventional Transforms
2. SDIP02 A Stochastic Approach to Image Retrieval Using Relevance 2011
Feedback and Particle Swarm Optimization
Description: An innovative approach is proposed with combination of relevance
feedback (RF) approach & evolutionary stochastic algorithm, called particle swarm
optimizer (PSO).
Technology: Particle Swarm Optimizer Usage : Visual Query
3. SDIP03 Contourlet-Based Image Watermarking Using Optimum Detector in 2010
a Noisy Environment
Description: A new Watermarking technique for eliminating the noises in the
environment by using the optimum detector.
Technology: General Gaussian Distribution Usage : Watermarking
Fabsys Technologies Pvt.Ltd | 11
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
12. Skiveprojects
4. SDIP04 Latent Finger print matching 2010
Description: A system for matching latent fingerprints found at crime scenes to rolled
fingerprints enrolled in law enforcement databases with extended features.
Technology: Matching Fingerprints Usage : fingerprint quality measure
5. SDIP05 Reversible Image Watermarking Using Interpolation Technique 2010
Description: A novel reversible watermarking scheme using an interpolation technique,
which can embed a large amount of covert data into images with imperceptible
modification.
Technology: Interpolation Technique Usage :Higher Image Fidelity
6. SDIP06 Generic Lossless visible Watermarking 2010
Description: The new watermarking methosd is based on the use of deterministic one-
to-one compound mappings of image pixel values.
Technology:1-To-1 Compound Mappings Usage : Recover Image
7. SDIP07 Bridging The Semantic Gap Between Image Contents And Tags 2010
Description: A unified framework which stems from a two-level data fusions between
the image contents and tags: 1) A unified graph is built and; 2) A novel random walk
model is then proposed.
Technology: Random Walk Model Usage : Image Annotation
IEEE TRANSACTION ON: DISTRIBUTED NETWORKING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1. SDNW01 An Authentication Code Against Pollution Attacks in Network 2011
Coding
Description: Unconditionally secure authentication code for multicast network coding,
where the trusted authority gives the key rights to the destinations and intermediate
nodes.
Technology: Secure Authentication Code Usage :Pollution Is Canceled
2. SDNW02 Network-Coding Multicast Networks With QoS Guarantees 2011
Description: Proposing a System where Each edge node admits not more than a
specified amount of traffic; the network will never experience link congestion.
Technology: Network Coding Usage : Multicast Network
Fabsys Technologies Pvt.Ltd | 12
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
13. Skiveprojects
3. SDNW03 A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless 2011
Networks
Description: TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling
of transmissions within the TCP Congestion window.
Technology: Rate-Based Scheduling Usage :Overcome deficiencies
4. SDNW04 On the Fair Coexistence of Loss-and Delay-Based TCP 2011
Description: A novel delay-based additive increase, multiplicative decrease (AIMD)
congestion control algorithm which depends on a nonzero average queuing delay.
Technology: Congestion Control Usage : Fair Coexistence Possible
5. SDNW05 Energy-Efficient Protocol for Cooperative Networks 2011
Description: Derive the upper bound of the capacity of the protocol, and it analyze the
end-to-end robustness of the protocol to data-packet loss, along with the tradeoff
between energy consumption and error rate.
Technology: Cooperative Communication Usage : Congestion Control
6. SDNW06 DTRAB: Combating Against Attacks on Encrypted Protocols 2010
Through Traffic-Feature Analysis
Description: An anomaly-based detection system by using strategically distributed
monitoring stubs (MSs). The MSs, by sniffing the encrypted traffic, extract features for
detecting these attacks.
Technology: Anomaly-Based Detection Usage : Avoid False Alarms
7. SDNW07 Efficient and Dynamic Routing Topology Inference From End-to- 2010
End Measurements
Description: A framework for designing topology inference algorithms based on
additive metrics. The framework can flexibly fuse information from multiple
measurements to achieve better estimation accuracy.
Technology: Topology Inference Usage : Faster Convergence Rate
8. SDNW08 A Queuing Model for Evaluating the Transfer Latency of Peer-to- 2010
Peer Systems
Description: A new Modeling Framework for the peers that accounts for the file size
distribution, the search time, load distribution at peers, and number of concurrent
downloads allowed by a peer.
Technology: Framework For Peers Usage : Reduces Probing Overhead
Fabsys Technologies Pvt.Ltd | 13
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
14. Skiveprojects
9. SDNW09 An Efficient and Adaptive Decentralized File Replication Algorithm 2010
in P2P File Sharing Systems
Description: This paper presents an Efficient and adaptive decentralized file replication
algorithm (EAD) that achieves high query efficiency and high replica utilization at a
significantly low cost.
Technology: EAD file replication Usage : Overloaded node reduction
10. SDNW10 Traceback of DDoS Attacks Using Entropy Variations 2010
Description: A novel trace back method for DDoS attacks during the process. The
proposed strategy is memory non-intensive, efficiently scalable, robust against packet
pollution.
Technology: Entropy Variations Usage : Memory Non-Intensive
11. SDNW11 POPI: A User-Level Tool for Inferring Router Packet Forwarding 2010
Priority
Description: An end-to-end approach for PFP inference and its associated tool, POPI. It
enables users to discover such network policies through measurements of packet losses
of different packet types.
Technology: End-To-End Approach Usage : Packet forwarding priority
12. SDNW12 A Directory Service for Perspective Access Networks 2010
Description: A perspective access network (PAN) is a peer-to-peer overlay network
that incorporates routing and directory services that allow network perspective-sharing
and nonhierarchical organization.
Technology: Directory Service For Networks Usage : Network Sharing
13. SDNW13 Web User-Session Inference by Means of Clustering Techniques 2010
Description: A novel methodology with clustering techniques to identify Web user-
sessions without requiring an a priori definition of threshold values.
Technology: Web Usage Mining Techniques Usage : User-Sessions
14. SDNW14 Mitigating Attacks on Open Functionality in SMS-Capable Cellular 2010
Networks
Description: A combination of modeling and simulation to demonstrate the feasibility
of targeted text messaging attacks.
Technology: Queue Management Usage: Mitigating messaging attacks.
15. SDNW15 Plexus-A scalable p2p Protocol enabling efficient subset search 2009
Description: Plexus, a peer-to-peer search protocol that provides an efficient
mechanism for advertising a bit-sequence (pattern) & discovering it using any subset of
its 1-bits.
Technology: Peer-To-Peer Search Usage : Discovery Of Information
Fabsys Technologies Pvt.Ltd | 14
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
15. Skiveprojects
16. SDNW16 Incentive-Based Scheduling for Market-Like Computational Grids 2009
Description: An incentive-based scheduling scheme, which utilizes a peer-to-peer
decentralized scheduling framework, a set of local heuristic algorithms, and three
market instruments of job announcement, price, and competition degree.
Technology: Heuristic Algorithms Usage : Fair Profit Allocation
17. SDNW17 Multiple Routing Configurations for Fast IP Network Recovery 2009
Description: MRC is strictly connectionless, and assumes only destination based hop-
by-hop forwarding, keeps additional routing information in the routers, and allows
packet forwarding to continue.
Technology: Hop-By-Hop Forwarding Usage : Load Distribution
18. SDNW18 Distributed Computing For E-Learning 2010
Description: Applying Distributed Computing strategy in E-Learning Environment to
make the learning process more interactive.
Technology: Semantic Applications Usage: Centralized E-Learning
IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SDP01 A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad 2011
hoc Networks
Description: Cooperative Diversity MAC, which exploits the cooperative communication
capability of the physical layer to improve robustness in wireless ad hoc networks.
Technology: Partner Selection Usage : Mitigates Interference
2 SDP02 Collective Receiver-Initiated Multicast for Grid Applications 2011
Description: Present Robber, a collective, receiver-initiated, high-throughput multicast
approach inspired by the Bit Torrent protocol to maximize the throughput between multiple
cluster computers.
Technology: High-Throughput Multicast Usage: Static Load Balancing
3 SDP03 Compressing Network Access Control Lists 2011
Description: ACL Compressor, a framework that can significantly reduce the number of
rules in an access control list while maintaining the same semantics.
Technology: Dynamic Programming Usage : Access Control Lists
Fabsys Technologies Pvt.Ltd | 15
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
16. Skiveprojects
4 SDP04 A Distributed Algorithm for the Replica Placement Problem 2011
Description: A new Distributed Algorithm to Improve the efficiency of object replication
within a given distributed replication group.
Technology: Distributed Approximation Usage : Object Replication
5 SDP05 A Generic Framework for Three-Factor Authentication: Preserving 2011
Security and Privacy in Distributed Systems
Description: A systematic approach for authenticating clients by three factors, namely
password, smart card, and biometrics.
Technology: 3-Factor Authentication Usage: Identity Of Remote Client
6 SDP06 TASA: Tag-Free Activity Sensing using RFID Tag Arrays 2011
Description: TASA For location sensing and frequent route detection. TASA can locate
objects more accurately.
Technology: Frequent Route Detection Usage : Location Sensing
7 SDP07 Flexible Robust Group key Agreement 2011
Description: A new robust group key agreement protocol (GKA) allows a set of players to
establish a shared secret key, regardless of network/node failures.
Technology: Group Key Agreement Usage: logarithmic-sized message
8 SDP08 Symmetric Key Approaches to Securing BGP-A Little Bit Trust is 2011
Enough
Description: Key approach for Trade-off between efficiency and security by giving a little
dose of trust to BGP routers.
Technology: Central Key Distribution Usage : Signature Verification
DO YOU HAVE OWN CONCEPT!!! Come Let’s Discuss at Skiveprojects corporate office.
What is your department!! Now, you can Select project based on your dept at skiveprojects.com
Need BASEPAPER or ABSTRACT ? Send a mail to skiveprojects@gmail.com
Fabsys Technologies Pvt.Ltd | 16
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
17. Skiveprojects
JAVA IEEE TITLES
IEEE TRANSACTION ON : DATAMINING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
SJDM01 Authenticated Multistep Nearest Neighbor Search 2011
1.
Description: We propose a new technique multi-step NN Algorithm that reduces the size
of each false hit. Moreover, we generalize our solution for a distributed setting, where the
database is horizontally partitioned over several servers.
Technology: Query Authentication Usage : Reduces Size Of False Hit
2. SJDM02 A Machine Learning Approach for Identifying Disease-Treatment 2011
Relations in Short Texts
Description: In this we Describes a ML-based Technology for identifying and
disseminating healthcare information. It extracts sentences from published medical papers
that mention diseases and treatments in short text format.
Technology: ML-based Technology Usage : Integrated Application
3 SJDM03 Automatic Discovery of Personal Name Aliases from the Web 2011
Description: We describes the method numerous baselines and previously proposed
name alias extraction methods, achieving a statistically significant mean reciprocal rank
(MRR) of 0.67.
Technology: Mean Reciprocal Rank Usage: Information Retrieval
4 SJDM04 Design and Implementation of Enterprise Financing Decision Model 2011
Based on Data Mining
Description: In proposed system we have response policy such as Conservative,
Aggressive, and Fine grant and here we are going to implement hashed messaged
authentication (HMAC) for secure process.
Technology: Financing decision Usage: Heterogeneous data integration
Fabsys Technologies Pvt.Ltd | 17
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
18. Skiveprojects
5 SJDM05 Enhancing the k-means clustering algorithm by using a O(n 2011
logn)heuristic method for finding better initial centroids.
Description: This project proposes an improvement on the classic k-means algorithm to
produce more accurate clusters. For that we comprises of a O(n logn) heuristic method,
based on sorting and partitioning the input data, for finding the centroids .
Technology: Enhanced k-meansAlgorithm Usage : Accurate Clusters
6 SJDM06 Clustering with Multi-Viewpoint based Similarity Measure 2011
Description: Two criterion functions for document clustering are proposed based on this
new measure. We compare them with several well-known similarity and dissimilarity with
dataset from this we are Getting accurate cluster.
Technology: Text mining Usage : Informative Assessment
7 SJDM07 Publishing Search Logs – A Comparative Study of Privacy Guarantees 2011
Description: We propose a k-anonymity in search log publishing. comparable utility to
k−anonymity while at the same time it achieving much stronger privacy guarantee
Technology: Security, integrity, and protection Usage : Probabilistic Privacy
8 SJDM08 Bin Rank: Scaling Dynamic Authority-Based Search Using 2011
Materialized Sub graphs
Description: we shows Dynamic authority-based keyword search algorithms, such as
Object Rank and personalized Page Rank, link information to provide high quality, high
recall search in databases, and the Web.
Technology: Object Rank Usage: High Quality Search Results
9 SJDM09 Asking Generalized Queries to Domain Experts to Improve Learning 2011
Description: we propose a novel active learning algorithm that asks good generalized
queries. It improves the knowledge of domain experts.
Technology: Generalized query Usage: Good Generalized Queries
10 SJDM10 Constrained Skyline Query Processing against Distributed Data Sites 2011
Description: We first propose a partition algorithm that divides all data sites into
incomparable groups. We also implement multi filtering technique to improve the skyline
query processes.
Technology: Filtering Point Usage: Parallel Skyline Query Processing
11 SJDM11 Managing Multidimensional Historical Aggregate Data in 2011
Unstructured P2P Networks
Description: In this project historical multidimensional data aggregates and supported by
P2P-based framework which provides efficient and robust query evaluation.
Technology: Data compression Usage : Extraction of Aggregates
Fabsys Technologies Pvt.Ltd | 18
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
19. Skiveprojects
12 SJDM12 Knowledge-Based Interactive Post mining of Association Rules Using 2011
Ontologies
Description: This paper proposes a prune and filter discovered rules. And it describes
ontologies to improve the integration of user knowledge in the post processing.
Technology: Data exploration and discovery Usage : Prune And Filter Rule
13 SJDM13 C-Trend : Temporal Cluster Graphs for Identifying and Visualizing 2011
Description: This paper introduces Cluster-based Temporal Representation of Event
Data (C-TREND), that system implements dendogram algorithm for sorting. It takes very
less time for sorting.
Technology: Temporal Data Mining Usage : Discover Patterns
IEEE TRANSACTION ON : NETWORK SECURITY
Domain: Dot. Net
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJNS01 Flexible Robust Group Key Agreement 2011
Description: We propose a novel 2-round group key agreement protocol .We show that
the new protocol implies a fully-robust group key agreement with logarithmic-sized
messages and expected round complexity close to 2 and finding random node faults.
Technology: fault-tolerance Usage: Logarithmic-Sized Messages
2 SJNS02 Replica Placement for Route Diversity in Tree-Based Routing 2011
Distributed Hash Tables
Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
diversity for these DHTs. Using this We prove that this placement creates disjoint
routes and find the replication degree necessary to produce a desired number of disjoint
routes.
Technology: Route Diversity Usage: Response Time Reduced
3 SJNS03 Design and Implementation of an Intrusion Response System for 2011
Relational Databases
Description: we propose Joint Threshold Administration Model that efficiently
searches the policy database for policies that match an anomalous request. This is used
to overcoming the policy matching problem.
Technology: Threshold signatures Usage: Specify Appropriate Response
Fabsys Technologies Pvt.Ltd | 19
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
20. Skiveprojects
4 SJNS04 A Puzzle-Based Defense Strategy Against Flooding Attacks Using 2010
Game Theory
Description: It describes the game theory to propose a series of optimal puzzle-based
strategies for handling increasingly sophisticated flooding attack.
Technology: Client-Puzzle Approach Usage : Handling Distributed Attacks
5 SJNS05 Layered Approach Using Conditional Random Fields for Intrusion 2010
Detection
Description: We propose high attack detection accuracy that can be achieved by
using Conditional Random Fields and high efficiency it show that our system is
robust and is able to handle noisy data without compromising performance
Technology: Decision trees Usage: Detect Malicious Activities
6 SJNS06 An Identity-Based Security System for User Privacy in Vehicular Ad 2010
Hoc Networks
Description: We propose a privacy-preserving defense technique For network
authorities to handle misbehavior in VANET access and it challenge that privacy
provides avenue for misbehavior.
Technology: Identity-Based Cryptography Usage: Privacy And Traceability
IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJP01 Joint Optimization of Complexity and Overhead for the Routing in 2011
Hierarchical Networks
Description: We show that area-based link-vector algorithm (ALVA) which is used to
analyze the routing complexity and the routing table size in the hierarchical network.
Technology: Area-Based Link-Vector Usage: Find Best Routing Policy
2 SJP02 Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems(S) 2011
Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
sequential probability ratio test in Unstructured Peer-to-Peer Systems for finding
anomaly intruder.
Technology: Mutual Anonymity Usage: Achieving Anonymity
Fabsys Technologies Pvt.Ltd | 20
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
21. Skiveprojects
3 SJP03 Cooperative Channelization in Wireless Networks with Network 2011
Coding
Description: We propose cooperative channelization technique, this is used to find
which portions of the transmission media are allocated to links which are congested at
the point and where network coding cannot efficiently repair loss.
Technology: Resource Reservation Usage: Reduce No of Transmissions
4 SJP04 Load Balance with Imperfect Information in Structured Peer-to- 2011
Peer Systems
Description: We propose a novel load balancing algorithm it is used to estimate
the probability distributions of the capacities of peers and the loads of virtual servers.
Technology: Virtual Server Usage : Probability Distributions
IEEE TRANSACTION ON: DISTRIBUTED NETWORKING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
Year
1 SJNW01 Energy-Efficient Protocol for Cooperative Networks 2011
Description: We propose a cooperative communication protocol, which is used to
controlling traffic, and delay process. And we analyzed the robustness of the protocol
to data packet loss.
Technology: cooperative communication protocol Usage : Congestion Control
2 SJNW02 Parametric Methods for Anomaly Detection in Aggregate Traffic 2011
Description: We introduce the bi-variate Parametric Detection Mechanism (bPDM),
which can detect anomalies and low-rate attacks in a few seconds.
Technology: Bi-variate Parametric Detection Usage: Detect Network Anomalies
3 SJNW03 Self-Reconfigurable Wireless Mesh Networks 2011
Description: This paper presented an autonomous network reconfiguration system
(ARS) that enables a multi-radio WMN to autonomously recover from wireless link
failures.
Technology: Cooperatively reconfiguration Usage: Preserve Network Performance
Fabsys Technologies Pvt.Ltd | 21
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
22. Skiveprojects
4 SJNW04 Rumor Riding: Anonymzing Unstructured Peer-to-Peer Systems 2011
Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
sequential probability ratio test for finding anomaly intruder.
Technology: Mutual Anonymity Usage : To Achieve Anonymity
5 SJNW05 Joint Optimization of Complexity and Overhead for the Routing in 2011
Hierarchical Networks
Description: We show that area-based link-vector algorithm (ALVA) which is used is
to analyze the routing complexity and the routing table size in the hierarchical
network.
Technology: Area-based link-vector Usage: Find Best Routing Policy
6 SJNW06 Cooperative Channelization in Wireless Networks with Network 2011
Coding
Description: We propose cooperative channelization, this is used to find which
portions of the transmission media are allocated to links and which are congested at the
point and where network coding cannot efficiently repair loss.
Technology: Resource Reservation Usage : Reduce No of Transmissions
7 SJNW07 Load Balance with Imperfect Information in Structured Peer-to- 2011
Peer Systems
Description: We propose a novel load balancing algorithm it is used to estimate the
probability distributions of the capacities of peers and the loads of virtual servers
Technology: Virtual Server Usage : Load-Balancing
8 SJNW08 Path Diversity Over Packet Switched Networks: Performance 2010
Analysis and Rate Allocation
Description: In this paper, Forward Error Correction (FEC) is applied across multiple
independent paths to enhance the end-to-end reliability. We prove that the probability of
irrecoverable loss (PE) decays exponentially with the number of paths.
Technology: Gilbert-Elliot channels Usage : End-To-End Reliability
9 SJNW09 Normalized queuing delay: congestion control jointly utilizing delay 2010
and marking
Description: In this paper, we consider the design of a congestion control scheme and
the concept of normalized queuing delay. Which is used to reduces the bottleneck
problem. And controlling traffic congestion
Technology: Network Calculus Usage : Congestion Measure
Fabsys Technologies Pvt.Ltd | 22
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
23. Skiveprojects
10 SJNW10 Multiple Routing Configurations For Fast IP Network Recovery 2009
Description: we present a new recovery scheme called MRC is based on keeping
additional routing information in the routers, and allows packet forwarding to continue
on an alter native output link immediately after the detection of a failure.
Technology: Hop-by-Hop Forwarding Usage: Handle Link And Node Failures
11 SJNW11 Differentiated bandwidth allocation with TCP protection in core 2009
routers
Description: We present an Active Queue Management (AQM) scheme. which draws
a packet at random from the buffer, compares it with the arriving packet, and drops both
if they are from the same flow.
Technology: Active Queue Management (AQM) Usage : Flows In Same Priority
12 SJNW12 Node Isolation Model And Age-Based Neighbor Selection In 2009
Unstructured P2p Networks
Description: we show that two age-biased neighbor-selection strategies, which
dramatically reduces the probability of user isolation and graph partitioning compared
with uniform selection of neighbors.
Technology: Node isolation model Usage: Reduce Probability Of User Isolation
13 SJNW13 A Traffic Engineering Approach For Placement And Selection Of 2009
Network Services
Description: We propose service placement problem which is used finding the best
location for each service gateway, and selecting the best service gateway for each flow.
Technology: Service gateway placement Usage : Minimize Traffic Flow
14 SJNW14 Dynamic Routing With Security Consideration 2009
Description: We proposing a dynamic routing algorithm such as the Routing
Information Protocol in wired networks and Destination-Sequenced Distance Vector
protocol in wireless networks that could randomize delivery paths for data transmission.
Technology: Security-enhanced data transmission Usage: Defeat Various Threats
15 SJNW15 Colored Tree 2009
Description: We show through extensive simulations that the average length of the
disjoint paths obtained using the SimCT algorithm is lesser compared to the previously
known techniques.
Technology: SimCT algorithm Usage: Minimize Cost Of Routing
You Can Register project free at skiveprojects.com Technical Assistance any time @ 9176990090
Fabsys Technologies Pvt.Ltd | 23
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
24. Skiveprojects
IEEE TRANSACTION ON: IMAGE PROCESSING
Domain: JAVA
S.NO CODE PROJECT TITLES & DESCRIPTION Published
year
1 SJIP01 Graph Cuts for Curvature Based Image Denoising
Description: we will present an efficient minimization algorithm based on graph cuts
2011
for minimizing the energy in the Euler’s elastic model which is used to minimizing the
staircase effects.
Technology: Binary MRF models Usage :Image Denoising
2. SJIP02 Image Denoising in Mixed Poisson–Gaussian Noise
Description: We propose a general Technology (PURE-LET) to design and optimize a
2011
wide class of transform domain thresholding algorithms for denoising images corrupted
by mixed Poisson-Gaussian noise.
Technology: Linear expansion of thresholds Usage : Image Denoising
3 SJIP03 Practical Bounds on Image Denoising: From Estimation to
Information
Description: We show that the, cluster co variances and level of redundancy for 2011
patches in the image, can be estimated directly from the noise corrupted image.
Technology: Shannon entropy Usage : Noise-Free Image
4 SJIP04 From Tiger to Panda: Animal Head Detection 2011
Description: we proposed two detection algorithms, namely Brute force detection and
Deformable detection for capture the shape and texture features on animal head.
Technology: Fusion Usage: Animal Head Detection
5 SJIP05 On High-Order Denoising Models and Fast Algorithms for Vector-
Valued Images
Description: we introduce three high-order and curvature-based model and a fast multi
2010
grid algorithm which proves image denosing calculation. And removes staircase effects.
Technology: partial differential equations(PDEs) Usage :Vector Denoising
6 SJIP06 A Perceptually Relevant Approach to Ringing Region Detection
Description: The proposed ringing regions detection method which is used to show
2010
the ringing regions resulting images in psycho visual experiment
Technology: Luminance masking Usage : Automatic Detection
Fabsys Technologies Pvt.Ltd | 24
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
25. Skiveprojects
NETWORK SIMULATOR (NS2) TITLES
IEEE TRANSACTION ON: NS2 - NETWORK SIMULATOR
Domain: NS2
S.NO CODE PROJECT TITLES Published
year
1. S11NS01 Secure Trust Management Model for Peer-to-Peer File Sharing System 2011
2. S11NS02 Channel-Aware Routing in MANETs With Route Handoff 2011
3. S11NS03 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2011
4. S11NS04 ConverSS: A Hybrid MAC/Routing Solution for Small-Scale, 2011
Convergecast Wireless Networks
5. S11NS05 Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks 2011
Using SVM and FDA
6. S11NS06 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011
Networks
7. S11NS07 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2010
Networks
8. S11NS08 Trust Management in Mobile Ad Hoc Networks Using a Scalable 2010
Maturity-Based Model
9. S11NS09 Channel Assignment for Multihop Cellular Networks: Minimum Delay 2010
Training provided by experienced IT Professionals.
Own Concepts can be developed in NS2
Fabsys Technologies Pvt.Ltd | 25
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
26. Skiveprojects
APPLICATION PROJECT TITLES
Web and Windows Application: DOT NET
REALTIME APPLICATION PROJECT TITLES
S.No CODE PROJECT TITLES LANGUAGE
1 SDAP01 An Intelligent tutoring system with web enhanced training Dotnet
assessments
2 SDAP02 Role Engineering via role based access control Dotnet
3 SDAP03 A Relation-Based Page Ranking in Web Search Engines Dotnet
4 SDAP04 Database Enterprise Manager Dotnet
5 SDAP05 Online Bug tracking System Dotnet
6 SDAP06 Trace back of DoS Attacks using Entropy Variations Dotnet
7 SDAP07 A new steganographic method based on information sharing via Dotnet
PNG images
8 SDAP08 Step Construction of Visual Cryptography Schemes (VCS) Dotnet
9 SDAP09 Efficient Compression of Encrypted Grayscale Images Dotnet
10 SDAP10 Latent Fingerprint Matching Dotnet
11 SDAP11 Online Data leakage detection Dotnet
12 SDAP12 Online Buying and Selling System. Dotnet
13 SDAP13 Secure Mobile health care for rural with electronic alerts Dotnet
14 SDAP14 Southern Railway Recruitment Portal Dotnet
15 SDAP15 Web-based Recruitment Process System for the HR group for a Dotnet
company
16 SDAP16 Fast firewall implementations for software and hardware-based Dotnet
routers
Fabsys Technologies Pvt.Ltd | 26
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
27. Skiveprojects
17 SDAP17 File Replication Detection Algorithm in P2P File Sharing Systems Dotnet
18 SDAP18 Dynamic Routing Topology with Security Consideration Dotnet/Java
19 SDAP19 Incentive-Based Scheduling for Market-Like Computational Grids Dotnet
20 SDAP20 Approximate query processing in peer to peer networks Dotnet
21 SDAP21 XML Based Ranking and Keyword Search Dotnet
22 SDAP22 Secured Data Object Replication in data grid Dotnet
23 SDAP23 Medical Anonymity Processing And Publishing Dotnet
24 SDAP24 Object Tracking System Dotnet
25 SDAP25 Secure Data Transformation System Dotnet
26 SDAP26 Effective blogger with XML interchange Dotnet
27 SDAP27 Alert based monitoring and scheduling on Proportional shares Dotnet
28 SDAP28 Exact Knowledge hiding for automobiles industry Dotnet
29 SDAP29 Efficient Property Interpreter Dotnet
30 SDAP30 Blind Banking Transformation System Dotnet
31 SDAP31 Security and Privacy for Social Networks. Dotnet
32 SDAP32 Still to animation movie creation Dotnet
33 SDAP33 Medical anonymity processing and publishing Dotnet
34 SDAP34 Global roaming and target tracking in mobile sensor network Dotnet
35 SDAP35 Development Of A Campaign Information System Dotnet
36 SDAP36 Perspective Access Management Dotnet
37 SDAP37 Email Proxy Server with Secure Service Dotnet
38 SDAP38 Online Bus Ticket Booking Dotnet
39 SDAP39 Dotnet
Customer Relationship Management
Fabsys Technologies Pvt.Ltd | 27
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
28. Skiveprojects
APPLICATION PROJECT TITLES
Web and Windows Application: JAVA
REALTIME APPLICATION PROJECT TITLES
DOMAIN: JAVA
S.NO CODE PROJECT TITLES DOMAIN
1 SJAP Normalized queuing delay: congestion control jointly utilizing Java
delay and marking
2 SJAP Distributed Algorithm for Minimum path Java
3 SJAP Path Diversity for packets Java
4 SJAP Node isolation model and age-based neighbor selection in Java
unstructured p2p networks
5 SJAP An Identity-Based Security System for User Privacy in Vehicular Java
Ad Hoc Networks
6 SJAP Layered Approach Using Conditional Random Fields for Intrusion Java
Detection.
7 SJAP A Puzzle based defense strategy against flooding attacks using Java
game theory
8 SJAP Adaptive Join Operators for Result Rate Optimization on Java
Streaming Inputs
9 SJAP Bin Rank: Scaling Dynamic Authority-Based Search Using Java
Materialized Sub graphs
Fabsys Technologies Pvt.Ltd | 28
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
29. Skiveprojects
10 SJAP NNexus: An automatic linker for collaborative web based corpora Java
11 SJAP SSUM: Smart Server Update Mechanism for Maintaining Cache Java
Consistency in Mobile Environments
12 SJAP CAR: context aware adaptive routing for delay tolerant mobile Java
networks
13 SJAP Generic Loss Less Watermarking Java
14 SJAP Unseen Visible Water Marking Java
15 SJAP Colored tree Java
16 SJAP QKDP: Provably secured third party authenticated quantum key Java
distribution protocol
17 SJAP Controlling IP spoofing through inter-domain packet filters Java
18 SJAP A service centric multicast architecture and routing protocol Java
19 SJAP Enhancing search performance in unstructured p2p networks Java
based on users’ common interest
20 SJAP Two Techniques for Fast computation of constrained shortest path Java
For Application Project Description, visit Skiveprojects.com!!
Get free Project Explanation @ 9176990090, 044-42712737
Fabsys Technologies Pvt.Ltd | 29
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software