SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
Skiveprojects
                                             TABLE OF CONTENTS

           S. No                                  PROJECT TITLES                                        PAGE.NO
             1       DOT NET IEEE TITLES                                                                3
            1.1              Cloud Computing                                                           3
            1.2              Mobile Computing                                                          4
            1.3              Network Security                                                          5
            1.4              Data Mining                                                               8
            1.5              Image Processing                                                          11
            1.6              Distributed Networking                                                    12
            1.7              Parallel & Distributed Computing                                          15
                                                                                                        17
             2       JAVA IEEE TITLES
            2.1              Data Mining                                                               17
            2.2              Network Security                                                          19
            2.3              Parallel and Distributed Computing                                        20
            2.4              Distributed Networking                                                    21
            2.5              Image Processing                                                          23

             3       NETWORK SIMULATOR(NS2) TITLES                                                      25

             4       APPLICATION PROJECT TITLES                                                         26
            4.1              DOT NET APPLICATION TITLES                                                26
            4.2              JAVA APPLICATION TITLES                                                   28

             5       FLASH AND ANIMATION TITLES                                                         29

             6       EMBEDDED SYSTEM IEEE TITLES                                                        30

             7       EMBEDDED SYSTEM NON IEEE TITLES                                                    33

             8       MATLAB IEEE TITLES                                                                 35
            8.1         Communication                                                                  35
            8.2         Image Processing                                                               36

             9      VLSI IEEE TITLES                                                                    36

                                                                                               Fabsys Technologies Pvt.Ltd | 1
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects

       About Skiveprojects
       Skiveprojects.com is a division of Fabsys Technologies (P) Ltd. It is specially organized for students’
       guidance in their project work as well as in career development. As a team, we provide technical
       assistance in various technologies and domains. By efficient training methodologies, we train students in
       their desired field. We focus on needs of the students. To make students career brighter in desired field,
       we are functioning as a bridge for students.

       We provide

            Project Guidance for all departments(UG & PG)

            In plant training for IT, CSE, ECE departments respectively

            Career Development programs

            Seminars in various Domain & Technology every day!!

            Internship Training & Certification



       What is the real use of doing IEEE Project in final year?
       Well, it is simple. Doing Project in final year will help you

            To make an entry in Real time working environment

            In most of the technical interview, Companies will ask questions around your final year projects

            Exposure in latest technology in the field

            Backbone for placement

            Real time Training in an organization

       Bring Own Concepts!!
       You can bring your own concepts to us. We will develop projects according your requirement.


            Project Guidance with Short Term Course.

            Online Training for out-station students
                                                                                               Fabsys Technologies Pvt.Ltd | 2
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects


DOT NET IEEE TITLES
                   IEEE TRANSACTION ON: CLOUD COMPUTING
                                                    Domain: Dot. Net

  S.NO       CODE                             PROJECT TITLE & DESCRIPTION        Published
                                                                                   Year
    1.      SDCC01        EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced   2011
                          Computer Science Course.
                          Description: Platform clouds are valued by both students and professors to achieve the
                          course objectives and that clouds offer a significant improvement over the previous
                          situation in labs.
                          Technology: Paas Cloud                                   Usage : Cloud In Education
    2.      SDCC02        CloudTPS: Scalable Transactions for Web Applications in the Cloud.                           2011
                          Description: CloudTPS (scalable transaction manager) guarantees full ACID properties
                          for multi-item transactions issued by Web applications, even in the presence of server
                          failures and network partitions.
                          Technology: Local Transaction Manager                Usage: Acid Properties To Nosql
    3.      SDCC03        A Privacy-Preserving Remote Data Integrity Checking Protocol with                            2011
                          Data Dynamics and Public Verifiability.
                          Description: Proposed protocol supports public verifiability without help of a third party
                          auditor. In addition, the proposed protocol does not leak any private information to third
                          party verifiers.
                          Technology: Public Verifiability                              Usage : Integrity In Cloud
    4.      SDCC04        Enabling Public Auditability and Data Dynamics for Storage Security                          2011
                          in Cloud Computing.
                          Description: Identifying the difficulties & potential security problems of direct
                          extensions with fully dynamic data updates from prior works and then construct an
                          elegant verification scheme for the seamless integration.
                          Technology: Third Party auditor                           Usage : Data Security in Cloud
    5.      SDCC05        Optimal Service Pricing for a Cloud Cache.                                                   2011
                          Description: A novel SOA-aware approach with a special focus on the data flow. The
                          tight interaction of new cloud technologies with SOA technologies enables us to
                          optimize the execution of data-intensive service.
                          Technology: Framework For Dynamic Pricing                    Usage : Cloud Profit


                                                                                                       Fabsys Technologies Pvt.Ltd | 3
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
    6.      SDCC06        Failure Avoidance through Fault Prediction Based on Synthetic                              2011
                          Transactions.
                          Description: Enhancing an online service’s reliability, availability and performance.
                          Synthetic transactions in pre-production environments, and combined with data-mining
                          on compact, specialized logs.
                          Technology: Synthetic Transactions                          Usage : Eliminate Failure
    7.      SDCC07        Multi-level Intrusion Detection system and Log Management in                               2011
                          Cloud Computing.
                          Description: A method that enables cloud computing systems both effectiveness of
                          using system resource and system strength of security.
                          Technology: Levels of IDS                       Usage: Security with high Accessibility
    8.      SDCC08        Using Cloud Technologies to Optimize Data-Intensive Service                                2010
                          Applications
                          Description: The tight interaction of new cloud technologies with SOA technologies
                          enables us to optimize the execution of data-intensive service applications by reducing
                          the data exchange tasks to a minimum.
                          Technology: Cloud SOA                               Usage : Eliminate Unwanted Data



                  IEEE TRANSACTION ON: MOBILE COMPUTING

                                                   Domain: Dot. Net

 S.NO        CODE                            PROJECT TITLES & DESCRIPTION                   Published
                                                                                              Year
    1.     SDMC01         Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc   2011
                          Networks.
                          Description: Efficient Geographic Multicast Protocol -uses a virtual-zone-based
                          structure to implement scalable and efficient group membership management.
                          Technology: Virtual Zone                         Usage: Reliable Packet Transmissions
    2.     SDMC02         Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh                          2010
                          Networks.
                          Description: A specialization that accounts for peculiar features of wireless mesh
                          networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast
                          nature of wireless communication.
                          Technology: 1-Hop Broadcast                    Usage :Information retrieval efficiency
    3.     SDMC03         A Distributed and Scalable Time Slot Allocation Protocol for Wireless                      2011
                          Sensor Networks.
                          Description: A distributed and scalable scheduling access scheme that mitigates high
                          data loss in data-intensive sensor networks and can also handle some mobility.
                          Technology: Latin Squares                                   Usage: Eliminate Collision

                                                                                                     Fabsys Technologies Pvt.Ltd | 4
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
    4.     SDMC04         Secure High-Throughput Multicast Routing in Wireless Mesh                                   2011
                          Networks.
                          Description: Identifying novel attacks against high throughput multicast protocols in
                          wireless mesh networks.
                          Technology: Defense Mechanisms                Usage: Prevent from identified attacks
    5.     SDMC05         Message   Authentication               in      Computationally           Constrained        2010
                          Environments.
                          Description: An approach to implement a compact HMAC by the use of stream
                          ciphering is presented in this paper.
                          Technology: Stream Cipher                    Usage: Authentication, Integrity
    6.     SDMC06         Efficient Broadcasting in Mobile AD-Hoc Network.                                            2010
                          Description: New broadcasting algorithm that constructs a CDS "on the fly" and can
                          guarantee both full delivery and a constant approximation ratio to the optimal solution.
                          Technology: Broadcasting Algorithms                     Usage: Reliable Transmission
    7.     SDMC07         Multicasting with Localized Control in Wireless AD-Hoc Network                              2010
                          Description: The proposed scheme combines the layered multicast concept with the
                          routing-based congestion avoidance idea to reduce the aggregated rate of multicast flows.
                          Technology: cross-layer approach                       Usage: Congestion Avoidance




                 IEEE TRANSACTION ON : NETWORK SECURITY
                                                    Domain: Dot. Net

  S.NO        CODE                             PROJECT TITLES & DESCRIPTION                                       Published
                                                                                                                    Year
     1.     SDNS01           SAT: A Security Architecture                    Achieving       Anonymity        and   2011
                             Traceability in Wireless.
                             Description: Ensure unconditional anonymity for honest users and traceability of
                             misbehaving users for network authorities in WMNs.
                             Technology: Anonymity And Traceability                   Usage : Identify Users
     2.     SDNS02           Replica Placement for Route Diversity in Tree-based Routing                              2011
                             Distributed Hash Tables
                             Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
                             diversity for these DHTs.
                             Technology: Route Diversity                      Usage : Response Time Reduced
     3.     SDNS03           Privacy-Preserving Updates to Anonymous and Confidential                                 2011
                             Databases
                             Description: Protocols solving suppression-based and generalization-based k-
                             anonymous and confidential databases. And it will rely on well-known cryptographic
                             assumptions.
                             Technology: Secure Computation                           Usage : Privacy-Preserving
                                                                                                      Fabsys Technologies Pvt.Ltd | 5
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     4.     SDNS04         Revisiting Defenses Against Large-Scale Online Password Guessing                          2011
                           Attacks
                           Description: A new Password Guessing Resistant Protocol (PGRP), derived upon
                           revisiting prior proposals designed to restrict such attacks.
                           Technology: Automated Turing Tests                     Usage : Identify Malicious Login
     5.     SDNS05         Balancing Revocation and Storage Trade-Offs in Secure Group                               2011
                           Communication
                           Description: Hybrid key management algorithm. Trade-offs between storage cost and
                           rekeying cost for secure multicast.
                           Technology: A Family Of Algorithms             Usage : Reduce Cost Of Rekeying
     6.     SDNS06         Nymble: Blocking Misbehaving Users in Anonymizing Networks                                2011
                           Description: Servers can “blacklist” misbehaving users, thereby blocking users
                           without compromising their anonymity. Nymble Tickets and Credentials, Blacklist.
                           Technology: A Secure System                    Usage : Block Misbehaving Users
     7.     SDNS07         Blind Authentication: A Secure Crypto-Biometric Verification                              2010
                           Protocol
                           Description: A Provably secure and blind biometric authentication protocol, which
                           addresses the concerns of user’s privacy, template protection, and trust issues.
                           Technology: Biometric Authentication                   Usage : Nonrepudiable identity
     8.     SDNS08         An Architectural Approach to Preventing Code Injection Attacks                            2010
                           Description: The memory architecture of modern processors that addresses the code
                           injection problem at its very root by virtually splitting memory into code memory and
                           data memory.
                           Technology: Memory Architecture                            Usage : Improved Protection
     9.     SDNS09         Authenticated Group Key Transfer Protocol Based on Secret                                 2010
                           Sharing
                           Description: An authenticated key transfer protocol based on secret sharing scheme
                           that KGC can broadcast group key information to all group members at once.
                           Technology: Trusted Key Generation Center                   Usage : Secret Sharing
     10.    SDNS10         Beyond Output Voting: Detecting Compromised Replicas Using                                2009
                           HMM-Based Behavioral Distance
                           Description: A novel approach to behavioral distance measurement using a new type
                           of Hidden Markov Model, and present an architecture realizing this new approach.
                           Technology: Hidden Markov Model                    Usage : Detect Mimicry Attacks
     11.    SDNS11         Flexible and Rollback recovery for grid environment                                       2009
                           Description: Two fault-tolerance mechanisms called Theft-Induced Check pointing
                           and Systematic Event Logging.
                           Technology: Theft-Induced Check                Usage : Controlling The Overhead
     12.    SDNS12         Accurately Measuring Denial of Service in Simulation and Testbed                          2009
                           Experiments
                           Description: Several DoS impact metrics that measure the quality of service
                           experienced by users during an attack. Our metrics are quantitative
                           Technology: Denial of Service Metrics                Usage :Measure service quality

                                                                                                     Fabsys Technologies Pvt.Ltd | 6
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     13.    SDNS13         Credit card fraud detection using hidden Markov model                                      2009
                           Description: An HMM is initially trained with the normal behavior of a cardholder. If
                           an incoming credit card transaction is not accepted by the trained HMM with
                           sufficiently high probability.
                           Technology: Hidden Markov Model                       Usage :Most accurate detection
     14.    SDNS14         In-depth packet inspection using a hierarchical pattern matching                           2010
                           algorithm.
                           Description:    EHMA is a two-tier and cluster-wise matching algorithm, which
                           significantly reduces the amount of external memory accesses and the capacity of
                           memory.
                           Technology: Cluster-Wise Matching                       Usage : Fast scanning process
     15.    SDNS15         Practical Management And Standard Administrative System                                    2010
                           Description:    To reduce the manual workload of the administrative activities,
                           organizations began to electronically automate many of these processes.
                           Technology: Electronic Automation                        Usage : increasing scalability
     16.    SDNS16         Predictive Network Anomaly Detection And Visualization                                     2010
                           Description: An approach that uses short-term observations of network features and
                           their respective time averaged entropies. Acute changes are localized in network
                           feature space using adaptive Wiener filtering.
                           Technology: Fisher linear discriminant                 Usage : Identifying Anomalies
     17.                   Network Traffic Monitor                                                                    2010
            SDNS17
                           Description:    UniMon (Universal Network Traffic Monitor) is an external and
                           passive network traffic monitor designed to adapt any type of network and protocols.
                           Technology: Entropy of Network Traffic                  Usage: Monitor User Activity
     18.                   Steward : Scaling Byzantine Fault-Tolerant Replication To Wide                             2010
            SDNS18
                           Area Networks
                           Description: The architecture confines the effects of any malicious replica to its local
                           site, reduces message complexity of wide-area communication.
                           Technology: Fault-Tolerant Replication                   Usage :Secure Transmission




Do you need more Explanation for any Project? Contact Skiveprojects @ 9176990090




                                                                                                      Fabsys Technologies Pvt.Ltd | 7
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
                          IEEE TRANSACTION ON : DATAMINING

                                                   Domain: Dot. Net


 S.NO        CODE                            PROJECT TITLES & DESCRIPTION                                              Published
                                                                                                                         Year
     1.   SDDM01          Mining Group Movement Patterns For Tracking Moving Objects
                          Efficiently.
                          Description: A local mining phase & cluster ensembling phase to find movement                  2011
                          patterns based on local trajectories and computing the similarity of moving objects &
                          identify the local group relationships.
                          Technology: Distributed clustering                   Usage : Track Moving Objects
     2.   SDDM02          Efficient Periodicity Mining In Time Series Databases Using Suffix
                          Trees.
                          Description: The algorithm uses suffix tree as the underlying data structure. Detect           2011
                          symbol, sequence (partial), and segment (full cycle) periodicity in time series.
                          Technology: Suffix Tree                                         Usage : Time Efficient
     3.   SDDM03          Automatic Discovery of Personal Name Aliases From the Web
                          Description: Automatically extracted lexical pattern-based approach to efficiently
                          extract a large set of candidate aliases from snippets retrieved from a web search engine.     2011
                          Technology: Lexical Pattern Approach                      Usage : Information Retrieval

     4.   SDDM04          Experience Transfer for the Configuration Tuning in Large-Scale                                2011
                          Computing Systems
                          Description: The utilization of management experiences in one system to benefit the
                          same management task in other systems (or current systems). Bayesian network to
                          model configuration dependencies.
                          Technology: Configuration Tuning                    Usage : Configuration Tuning
     5.   SDDM05          A Web Search Engine-Based Approach to Measure Semantic                                         2011
                          Similarity between Words.
                          Description: An empirical method to estimate semantic similarity using page counts
                          and text snippets retrieved from a web search engine for two words.
                          Technology: Empirical Method                     Usage : Improves The Accuracy
     6.   SDDM06          Data Leakage Detection.                                                                        2011
                          Description: Data allocation strategies that improve the probability of identifying
                          leakages and develop a model for assessing the “guilt” of agents. That improves chances
                          of identifying the guilty agents.
                          Technology: Data Allocation Strategies               Usage : Identifying Guilty Party
     7.   SDDM07          A Machine Learning Approach for Identifying Disease-Treatment                                  2011
                          Relations in Short Texts.
                          Description: A ML-based methodology for building an application that is capable of
                          identifying and disseminating healthcare information Identifies semantic relations that
                          exist between diseases and treatments.
                          Technology: ML-based methodology                     Usage : Integrated Application
                                                                                                       Fabsys Technologies Pvt.Ltd | 8
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     8.   SDDM08          Authenticated Multistep Nearest Neighbor Search                                                2011
                          Description: The multistep NN algorithm incurs prohibitive network overhead due to
                          the transmission of false hits, but are nevertheless necessary for its verification.
                          Technology: Query Authentication                       Usage : Reduces Size Of False Hit
     9.   SDDM09          Optimizing Resource Conflicts in Workflow Management Systems                                   2011
                          Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource
                          conflicts subject to temporal constraints and simultaneously optimizes throughput.
                          Technology: Eigen-value Analysis                    Usage :Minimize Resource Conflicts
     10. SDDM10           Closeness: A New Privacy Measure for Data Publishing                                           2010
                          Description: A new notion of privacy called "closeness." It present the base model -
                          closeness, which requires that the distribution of a sensitive attribute
                          Technology: Closeness                                        Usage : Offers Higher Utility
     11. SDDM11           Record Matching over Query Results from Multiple Web Databases.                                2010
                          Description: An unsupervised, online record matching method, UDD, where a given
                          query, can effectively identify duplicates from the query result records of multiple Web
                          databases.
                          Technology: Data Deduplication                               Usage : Get accurate results
     12. SDDM12           Towards an Effective XML Keyword Search.                                                       2010
                          Description: A novel formulae to identify the search for nodes and search via nodes of
                          a query, and present a novel XML TF*IDF ranking strategy to rank the individual
                          matches of all possible search intentions.
                          Technology: Relevance Ranking                       Usage : Rank the individual matches
     13. SDDM13           Bridging Domains Using World Wide Knowledge for Transfer                                       2010
                          Learning
                          Description: A novel transfer learning approach, called BIG to effectively extract
                          useful knowledge in a worldwide knowledge base, which is then used to link the source
                          and target domains.
                          Technology: Cross-Domain                         Usage: Cross-domain text classification
     14. SDDM14           Personalizing web directories with the aid of web usage data                                   2010
                          Description: A novel methodology that combines the users' browsing behavior with
                          thematic information from the Web directories.
                          Technology: Personalization Methodology                          Usage : Web Directories
     15. SDDM15           Filter-Based Data Partitioning for Training Multiple Classifier                                2010
                          Systems
                          Description: To assess the effectiveness of different types of training partitions, It
                          generated a large number of disjoint training partitions with distinctive distributions.
                          Technology: Clustering and Selection                          Usage : Classifier Systems


                                                                                                         Fabsys Technologies Pvt.Ltd | 9
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     16. SDDM16           FiVaTech: Page-Level Web Data Extraction from Template Pages                              2010
                          Description: An unsupervised, page-level data extraction approach to deduce the
                          schema and templates for each individual Deep Website, which contains either singleton
                          or multiple data records in one Webpage.
                          Technology: Multiple Trees Merging                      Usage : Web Data Extraction
     17. SDDM17           Histogram-Based Global Load Balancing in Structured Peer-to-Peer                          2009
                          Systems
                          Description: A general framework, HiGLOB, for global load balancing in structured
                          P2P systems. Each node with 1) a histogram manager, and 2) a load-balancing manager.
                          Technology: Histogram Buckets                              Usage : Load-Balancing
     18. SDDM18           Interactive Correction and Recommendation                          for    Computer        2009
                          Language Learning and Training
                          Description: An automated learning and skills training system for a database
                          programming environment that promotes procedural knowledge acquisition and skills
                          training.
                          Technology: Error Classification                  Usage : Personalized Guidance
     19. SDDM19           Optimal Lot Sizing Policies for Sequential Online Auctions                                2009
                          Description: A goal programming approach for estimating the bid distribution for the
                          bidder population from the observed bids, readily available in these auctions.
                          Technology: Closed-Form Solution                  Usage : Increases users holding costs
     20. SDDM20           Intrusion Detection System based on Data Mining                                           2009
                          Description: The system that performs anomaly detection can detect intrusions known
                          and unknown, reduce omissions and misstatements, improve accuracy and speed of
                          intrusion detection.
                          Technology: Hidden Honey pot                        Usage : Solicit possible attacks
     21. SDDM21           Fast Query Point Movement Techniques for Large CBIR Systems                               2009
                          Description: A new index structure and query processing technique to improve retrieval
                          effectiveness and efficiency.
                          Technology: Relevance Feedback                        Usage : Retrieval Performance
     22. SDDM22           Exact Knowledge Hiding Through Database Extension                                         2009
                          Description: A novel, exact border-based approach that provides an optimal solution
                          for the hiding of sensitive frequent item.
                          Technology: Exact Border Approach                   Usage : Hiding The Sensitive Item
     23. SDDM23           Hierarchical distribute p2p document clustering and clustering                            2009
                          summarization
                          Description: A Hierarchically distributed Peer-to-Peer (HP2PC) architecture and
                          clustering algorithm. The architecture is based on a multilayer overlay network of peer
                          neighborhoods.
                          Technology: distributed key phrase extraction               Usage : Global Clustering



                                                                                                   Fabsys Technologies Pvt.Ltd | 10
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     24. SDDM24           Vide: A Vision-Based Approach For Deep Web Data Extraction                                   2010
                          Description: A novel technique is proposed for data extraction from deep Web pages
                          using primarily visual features. A new performance measure, revision, is proposed to
                          evaluate Web data extraction tools.
                          Technology: Visual Features Of Web Pages                    Usage : Web data extraction
     25.                  Multidimensional Suppressions For K-Anonymity                                                2010
           SDDM25
                          Description:    A new method for achieving k-anonymity named K-anonymity of
                          Classification Trees Using Suppression (kACTUS).
                          Technology: De-Indentified Data                  Usage : Multidimensional Suppression
     26.                  Voting      Systems       With        Trust    Mechanisms          In     Cyberspace: 2010
           SDDM26
                          Vulnerabilities And Defenses
                          Description: Proposing two defense schemes 1. Hide correlation knowledge from
                          attackers 2. Introduce robustness-of-evidence, a new metric, in trust calculation
                          Technology: RepTrap                                      Usage : Reduce rate of attacks




                  IEEE TRANSACTION ON: IMAGE PROCESSING

                                                   Domain: Dot. Net


 S.NO        CODE                            PROJECT TITLES & DESCRIPTION                                           Published
                                                                                                                      year
     1.    SDIP01         1-D Transforms for the Motion Compensation Residual                                         2011
                          Description: An adaptive auto-covariance characterization for the MC-residual that
                          shows some statistical differences between the MC-residual and the image.
                          Technology:1D directional transform                  Usage: Conventional Transforms
     2.    SDIP02         A Stochastic Approach to Image Retrieval Using Relevance                                     2011
                          Feedback and Particle Swarm Optimization
                          Description: An innovative approach is proposed with combination of relevance
                          feedback (RF) approach & evolutionary stochastic algorithm, called particle swarm
                          optimizer (PSO).
                          Technology: Particle Swarm Optimizer                      Usage : Visual Query
     3.    SDIP03         Contourlet-Based Image Watermarking Using Optimum Detector in                                2010
                          a Noisy Environment
                          Description: A new Watermarking technique for eliminating the noises in the
                          environment by using the optimum detector.
                          Technology: General Gaussian Distribution           Usage : Watermarking


                                                                                                      Fabsys Technologies Pvt.Ltd | 11
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     4.   SDIP04          Latent Finger print matching                                                                2010
                          Description: A system for matching latent fingerprints found at crime scenes to rolled
                          fingerprints enrolled in law enforcement databases with extended features.
                          Technology: Matching Fingerprints                Usage : fingerprint quality measure
     5.   SDIP05          Reversible Image Watermarking Using Interpolation Technique                                 2010
                          Description: A novel reversible watermarking scheme using an interpolation technique,
                          which can embed a large amount of covert data into images with imperceptible
                          modification.
                          Technology: Interpolation Technique                Usage :Higher Image Fidelity
     6.   SDIP06          Generic Lossless visible Watermarking                                                       2010
                          Description: The new watermarking methosd is based on the use of deterministic one-
                          to-one compound mappings of image pixel values.
                          Technology:1-To-1 Compound Mappings                     Usage : Recover Image
     7.   SDIP07          Bridging The Semantic Gap Between Image Contents And Tags                                2010
                          Description: A unified framework which stems from a two-level data fusions between
                          the image contents and tags: 1) A unified graph is built and; 2) A novel random walk
                          model is then proposed.
                          Technology: Random Walk Model                            Usage : Image Annotation




           IEEE TRANSACTION ON: DISTRIBUTED NETWORKING

                                                   Domain: Dot. Net


 S.NO        CODE                            PROJECT TITLES & DESCRIPTION                                          Published
                                                                                                                      year
     1.   SDNW01          An Authentication Code Against Pollution Attacks in Network                                 2011
                          Coding
                          Description: Unconditionally secure authentication code for multicast network coding,
                          where the trusted authority gives the key rights to the destinations and intermediate
                          nodes.
                          Technology: Secure Authentication Code                   Usage :Pollution Is Canceled
     2.   SDNW02          Network-Coding Multicast Networks With QoS Guarantees                                       2011

                          Description: Proposing a System where Each edge node admits not more than a
                          specified amount of traffic; the network will never experience link congestion.

                          Technology: Network Coding                                 Usage : Multicast Network



                                                                                                     Fabsys Technologies Pvt.Ltd | 12
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     3.   SDNW03          A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless                            2011
                          Networks
                          Description: TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling
                          of transmissions within the TCP Congestion window.
                          Technology: Rate-Based Scheduling                     Usage :Overcome deficiencies
     4.   SDNW04          On the Fair Coexistence of Loss-and Delay-Based TCP                                        2011
                          Description: A novel delay-based additive increase, multiplicative decrease (AIMD)
                          congestion control algorithm which depends on a nonzero average queuing delay.
                          Technology: Congestion Control                     Usage : Fair Coexistence Possible
     5.   SDNW05          Energy-Efficient Protocol for Cooperative Networks                                         2011
                          Description: Derive the upper bound of the capacity of the protocol, and it analyze the
                          end-to-end robustness of the protocol to data-packet loss, along with the tradeoff
                          between energy consumption and error rate.
                          Technology: Cooperative Communication                    Usage : Congestion Control
     6.   SDNW06          DTRAB: Combating Against Attacks on Encrypted Protocols                                    2010
                          Through Traffic-Feature Analysis
                          Description: An anomaly-based detection system by using strategically distributed
                          monitoring stubs (MSs). The MSs, by sniffing the encrypted traffic, extract features for
                          detecting these attacks.
                          Technology: Anomaly-Based Detection                      Usage : Avoid False Alarms
     7.   SDNW07          Efficient and Dynamic Routing Topology Inference From End-to-                              2010
                          End Measurements

                          Description: A framework for designing topology inference algorithms based on
                          additive metrics. The framework can flexibly fuse information from multiple
                          measurements to achieve better estimation accuracy.

                          Technology: Topology Inference                     Usage : Faster Convergence Rate

     8.   SDNW08          A Queuing Model for Evaluating the Transfer Latency of Peer-to-                            2010
                          Peer Systems
                          Description: A new Modeling Framework for the peers that accounts for the file size
                          distribution, the search time, load distribution at peers, and number of concurrent
                          downloads allowed by a peer.
                          Technology: Framework For Peers                  Usage : Reduces Probing Overhead



                                                                                                    Fabsys Technologies Pvt.Ltd | 13
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
     9.   SDNW09          An Efficient and Adaptive Decentralized File Replication Algorithm                          2010
                          in P2P File Sharing Systems
                          Description: This paper presents an Efficient and adaptive decentralized file replication
                          algorithm (EAD) that achieves high query efficiency and high replica utilization at a
                          significantly low cost.
                          Technology: EAD file replication                   Usage : Overloaded node reduction
     10. SDNW10           Traceback of DDoS Attacks Using Entropy Variations                                          2010
                          Description: A novel trace back method for DDoS attacks during the process. The
                          proposed strategy is memory non-intensive, efficiently scalable, robust against packet
                          pollution.
                          Technology: Entropy Variations                          Usage : Memory Non-Intensive
     11. SDNW11           POPI: A User-Level Tool for Inferring Router Packet Forwarding                              2010
                          Priority
                          Description: An end-to-end approach for PFP inference and its associated tool, POPI. It
                          enables users to discover such network policies through measurements of packet losses
                          of different packet types.
                          Technology: End-To-End Approach                   Usage : Packet forwarding priority
     12. SDNW12           A Directory Service for Perspective Access Networks                                         2010
                          Description: A perspective access network (PAN) is a peer-to-peer overlay network
                          that incorporates routing and directory services that allow network perspective-sharing
                          and nonhierarchical organization.
                          Technology: Directory Service For Networks                     Usage : Network Sharing
     13. SDNW13           Web User-Session Inference by Means of Clustering Techniques                                2010
                          Description: A novel methodology with clustering techniques to identify Web user-
                          sessions without requiring an a priori definition of threshold values.
                          Technology: Web Usage Mining Techniques                          Usage : User-Sessions
     14. SDNW14           Mitigating Attacks on Open Functionality in SMS-Capable Cellular                            2010
                          Networks
                          Description: A combination of modeling and simulation to demonstrate the feasibility
                          of targeted text messaging attacks.
                          Technology: Queue Management                     Usage: Mitigating messaging attacks.
     15. SDNW15           Plexus-A scalable p2p Protocol enabling efficient subset search                             2009

                          Description: Plexus, a peer-to-peer search protocol that provides an efficient
                          mechanism for advertising a bit-sequence (pattern) & discovering it using any subset of
                          its 1-bits.

                          Technology: Peer-To-Peer Search                      Usage : Discovery Of Information

                                                                                                     Fabsys Technologies Pvt.Ltd | 14
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
       16. SDNW16         Incentive-Based Scheduling for Market-Like Computational Grids                              2009
                          Description: An incentive-based scheduling scheme, which utilizes a peer-to-peer
                          decentralized scheduling framework, a set of local heuristic algorithms, and three
                          market instruments of job announcement, price, and competition degree.
                          Technology: Heuristic Algorithms                         Usage : Fair Profit Allocation
       17. SDNW17         Multiple Routing Configurations for Fast IP Network Recovery                                2009
                          Description: MRC is strictly connectionless, and assumes only destination based hop-
                          by-hop forwarding, keeps additional routing information in the routers, and allows
                          packet forwarding to continue.
                          Technology: Hop-By-Hop Forwarding                           Usage : Load Distribution
       18. SDNW18         Distributed Computing For E-Learning                                                      2010
                          Description: Applying Distributed Computing strategy in E-Learning Environment to
                          make the learning process more interactive.
                          Technology: Semantic Applications                 Usage: Centralized E-Learning



  IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING

                                                     Domain: Dot. Net

 S.NO        CODE                              PROJECT TITLES & DESCRIPTION                                           Published
                                                                                                                           Year
   1      SDP01           A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad                                 2011
                          hoc Networks
                          Description: Cooperative Diversity MAC, which exploits the cooperative communication
                          capability of the physical layer to improve robustness in wireless ad hoc networks.
                          Technology: Partner Selection                         Usage : Mitigates Interference
   2      SDP02           Collective Receiver-Initiated Multicast for Grid Applications                                    2011
                          Description: Present Robber, a collective, receiver-initiated, high-throughput multicast
                          approach inspired by the Bit Torrent protocol to maximize the throughput between multiple
                          cluster computers.
                          Technology: High-Throughput Multicast                   Usage: Static Load Balancing
   3      SDP03           Compressing Network Access Control Lists                                                         2011
                          Description: ACL Compressor, a framework that can significantly reduce the number of
                          rules in an access control list while maintaining the same semantics.
                          Technology: Dynamic Programming                         Usage : Access Control Lists
                                                                                                     Fabsys Technologies Pvt.Ltd | 15
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
   4      SDP04           A Distributed Algorithm for the Replica Placement Problem                                      2011

                          Description: A new Distributed Algorithm to Improve the efficiency of object replication

                          within a given distributed replication group.

                          Technology: Distributed Approximation                     Usage : Object Replication

   5      SDP05           A Generic Framework for Three-Factor Authentication: Preserving                                2011
                          Security and Privacy in Distributed Systems
                          Description: A systematic approach for authenticating clients by three factors, namely
                          password, smart card, and biometrics.
                          Technology: 3-Factor Authentication                 Usage: Identity Of Remote Client
   6      SDP06           TASA: Tag-Free Activity Sensing using RFID Tag Arrays                                          2011
                          Description: TASA For location sensing and frequent route detection. TASA can locate
                          objects more accurately.
                          Technology: Frequent Route Detection                        Usage : Location Sensing
   7      SDP07           Flexible Robust Group key Agreement                                                            2011
                          Description: A new robust group key agreement protocol (GKA) allows a set of players to
                          establish a shared secret key, regardless of network/node failures.
                          Technology: Group Key Agreement                    Usage: logarithmic-sized message
   8      SDP08           Symmetric Key Approaches to Securing BGP-A Little Bit Trust is                                 2011
                          Enough
                          Description: Key approach for Trade-off between efficiency and security by giving a little
                          dose of trust to BGP routers.
                          Technology: Central Key Distribution                    Usage : Signature Verification



DO YOU HAVE OWN CONCEPT!!! Come Let’s Discuss at Skiveprojects corporate office.


What is your department!! Now, you can Select project based on your dept at skiveprojects.com


Need BASEPAPER or ABSTRACT ? Send a mail to skiveprojects@gmail.com




                                                                                                     Fabsys Technologies Pvt.Ltd | 16
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects




JAVA IEEE TITLES

                          IEEE TRANSACTION ON : DATAMINING

                                                      Domain: JAVA


 S.NO        CODE                             PROJECT TITLES & DESCRIPTION                                               Published
                                                                                                                           Year
          SJDM01          Authenticated Multistep Nearest Neighbor Search                                                2011
 1.
                          Description: We propose a new technique multi-step NN Algorithm that reduces the size
                          of each false hit. Moreover, we generalize our solution for a distributed setting, where the
                          database is horizontally partitioned over several servers.

                          Technology: Query Authentication                  Usage : Reduces Size Of False Hit

 2.       SJDM02          A Machine Learning Approach for Identifying Disease-Treatment 2011
                          Relations in Short Texts
                          Description: In this we Describes a ML-based Technology for identifying and
                          disseminating healthcare information. It extracts sentences from published medical papers
                          that mention diseases and treatments in short text format.
                          Technology: ML-based Technology                      Usage : Integrated Application
 3        SJDM03          Automatic Discovery of Personal Name Aliases from the Web                                      2011
                          Description: We describes the method numerous baselines and previously proposed
                          name alias extraction methods, achieving a statistically significant mean reciprocal rank
                          (MRR) of 0.67.
                          Technology: Mean Reciprocal Rank                      Usage: Information Retrieval
 4        SJDM04          Design and Implementation of Enterprise Financing Decision Model 2011
                          Based on Data Mining
                          Description: In proposed system we have response policy such as Conservative,
                          Aggressive, and Fine grant and here we are going to implement hashed messaged
                          authentication (HMAC) for secure process.

                          Technology: Financing decision              Usage: Heterogeneous data integration


                                                                                                   Fabsys Technologies Pvt.Ltd | 17
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 5        SJDM05          Enhancing the k-means clustering algorithm by using a O(n 2011
                          logn)heuristic method for finding better initial centroids.
                          Description: This project proposes an improvement on the classic k-means algorithm to
                          produce more accurate clusters. For that we comprises of a O(n logn) heuristic method,
                          based on sorting and partitioning the input data, for finding the centroids .

                          Technology: Enhanced k-meansAlgorithm                Usage : Accurate Clusters

 6        SJDM06          Clustering with Multi-Viewpoint based Similarity Measure                                    2011
                          Description: Two criterion functions for document clustering are proposed based on this
                          new measure. We compare them with several well-known similarity and dissimilarity with
                          dataset from this we are Getting accurate cluster.

                          Technology: Text mining                              Usage : Informative Assessment

 7        SJDM07          Publishing Search Logs – A Comparative Study of Privacy Guarantees                          2011
                          Description: We propose a k-anonymity in search log publishing. comparable utility to
                          k−anonymity while at the same time it achieving much stronger privacy guarantee

                          Technology: Security, integrity, and protection      Usage : Probabilistic Privacy

 8        SJDM08          Bin Rank: Scaling Dynamic                     Authority-Based        Search      Using 2011
                          Materialized Sub graphs
                          Description: we shows Dynamic authority-based keyword search algorithms, such as
                          Object Rank and personalized Page Rank, link information to provide high quality, high
                          recall search in databases, and the Web.

                          Technology: Object Rank                    Usage: High Quality Search Results

 9        SJDM09          Asking Generalized Queries to Domain Experts to Improve Learning                            2011
                          Description: we propose a novel active learning algorithm that asks good generalized
                          queries. It improves the knowledge of domain experts.

                          Technology: Generalized query                       Usage: Good Generalized Queries

 10       SJDM10          Constrained Skyline Query Processing against Distributed Data Sites                         2011
                          Description: We first propose a partition algorithm that divides all data sites into
                          incomparable groups. We also implement multi filtering technique to improve the skyline
                          query processes.
                          Technology: Filtering Point             Usage: Parallel Skyline Query Processing

 11       SJDM11          Managing Multidimensional                  Historical      Aggregate        Data        in 2011
                          Unstructured P2P Networks
                          Description: In this project historical multidimensional data aggregates and supported by
                          P2P-based framework which provides efficient and robust query evaluation.

                          Technology: Data compression                         Usage : Extraction of Aggregates


                                                                                                  Fabsys Technologies Pvt.Ltd | 18
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 12       SJDM12          Knowledge-Based Interactive Post mining of Association Rules Using 2011
                          Ontologies
                          Description: This paper proposes a prune and filter discovered rules. And it describes
                          ontologies to improve the integration of user knowledge in the post processing.

                          Technology: Data exploration and discovery          Usage : Prune And Filter Rule

 13       SJDM13          C-Trend : Temporal Cluster Graphs for Identifying and Visualizing                            2011
                          Description: This paper introduces Cluster-based Temporal Representation of Event
                          Data (C-TREND), that system implements dendogram algorithm for sorting. It takes very
                          less time for sorting.

                          Technology: Temporal Data Mining                      Usage : Discover Patterns




                   IEEE TRANSACTION ON : NETWORK SECURITY

                                                    Domain: Dot. Net
 S.NO     CODE                              PROJECT TITLES & DESCRIPTION                                             Published
                                                                                                                     Year
 1        SJNS01          Flexible Robust Group Key Agreement                                                        2011

                          Description: We propose a novel 2-round group key agreement protocol .We show that
                          the new protocol implies a fully-robust group key agreement with logarithmic-sized
                          messages and expected round complexity close to 2 and finding random node faults.
                          Technology: fault-tolerance               Usage: Logarithmic-Sized Messages

 2        SJNS02          Replica Placement for Route Diversity in Tree-Based Routing 2011
                          Distributed Hash Tables
                          Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route
                          diversity for these DHTs. Using this We prove that this placement creates disjoint
                          routes and find the replication degree necessary to produce a desired number of disjoint
                          routes.
                          Technology: Route Diversity                  Usage: Response Time Reduced

 3        SJNS03          Design and Implementation of an Intrusion Response System for 2011
                          Relational Databases
                          Description: we propose Joint Threshold Administration Model that efficiently
                          searches the policy database for policies that match an anomalous request. This is used
                          to overcoming the policy matching problem.
                          Technology: Threshold signatures              Usage: Specify Appropriate Response

                                                                                                    Fabsys Technologies Pvt.Ltd | 19
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 4        SJNS04          A Puzzle-Based Defense Strategy Against Flooding Attacks Using 2010
                          Game Theory
                          Description: It describes the game theory to propose a series of optimal puzzle-based
                          strategies for handling increasingly sophisticated flooding attack.

                          Technology: Client-Puzzle Approach         Usage : Handling Distributed Attacks

 5        SJNS05          Layered Approach Using Conditional Random Fields for Intrusion 2010
                          Detection
                          Description: We propose high attack detection accuracy that can be achieved by
                          using Conditional Random Fields and high efficiency it show that our system is
                          robust and is able to handle noisy data without compromising performance
                          Technology: Decision trees                   Usage: Detect Malicious Activities
 6        SJNS06          An Identity-Based Security System for User Privacy in Vehicular Ad 2010
                          Hoc Networks
                          Description: We propose a privacy-preserving defense technique For network
                          authorities to handle misbehavior in VANET access and it challenge that privacy
                          provides avenue for misbehavior.
                          Technology: Identity-Based Cryptography   Usage: Privacy And Traceability




     IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING

                                                     Domain: JAVA

 S.NO     CODE                              PROJECT TITLES & DESCRIPTION                                           Published
                                                                                                                   Year
 1        SJP01           Joint Optimization of Complexity and Overhead for the Routing in 2011
                          Hierarchical Networks
                          Description: We show that area-based link-vector algorithm (ALVA) which is used to
                          analyze the routing complexity and the routing table size in the hierarchical network.

                          Technology: Area-Based Link-Vector         Usage: Find Best Routing Policy

 2        SJP02           Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems(S)                           2011
                          Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
                          sequential probability ratio test in Unstructured Peer-to-Peer Systems for finding
                          anomaly intruder.
                          Technology: Mutual Anonymity                       Usage: Achieving Anonymity

                                                                                                  Fabsys Technologies Pvt.Ltd | 20
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 3        SJP03           Cooperative Channelization in Wireless Networks with Network 2011
                          Coding

                          Description: We propose cooperative channelization technique, this is used to find
                          which portions of the transmission media are allocated to links which are congested at
                          the point and where network coding cannot efficiently repair loss.
                          Technology: Resource Reservation               Usage: Reduce No of Transmissions
 4        SJP04           Load Balance with Imperfect Information in Structured Peer-to- 2011
                          Peer Systems

                          Description: We propose a novel load balancing algorithm it is used to              estimate
                          the probability distributions of the capacities of peers and the loads of virtual servers.
                          Technology: Virtual Server                     Usage : Probability Distributions




            IEEE TRANSACTION ON: DISTRIBUTED NETWORKING

                                                        Domain: JAVA

 S.NO     CODE                                PROJECT TITLES & DESCRIPTION                                               Published
                                                                                                                         Year
 1        SJNW01          Energy-Efficient Protocol for Cooperative Networks                                             2011

                          Description: We propose a cooperative communication protocol, which is used to
                          controlling traffic, and delay process. And we analyzed the robustness of the protocol
                          to data packet loss.
                          Technology: cooperative communication protocol            Usage : Congestion Control
 2        SJNW02          Parametric Methods for Anomaly Detection in Aggregate Traffic                                  2011

                          Description: We introduce the bi-variate Parametric Detection Mechanism (bPDM),
                          which can detect anomalies and low-rate attacks in a few seconds.
                          Technology: Bi-variate Parametric Detection             Usage: Detect Network Anomalies
 3        SJNW03          Self-Reconfigurable Wireless Mesh Networks                                                     2011

                          Description: This paper presented an autonomous network reconfiguration system
                          (ARS) that enables a multi-radio WMN to autonomously recover from wireless link
                          failures.

                          Technology: Cooperatively reconfiguration        Usage: Preserve Network Performance


                                                                                                        Fabsys Technologies Pvt.Ltd | 21
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 4        SJNW04          Rumor Riding: Anonymzing Unstructured Peer-to-Peer Systems                                  2011
                          Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a
                          sequential probability ratio test for finding anomaly intruder.

                          Technology: Mutual Anonymity                 Usage : To Achieve Anonymity

 5        SJNW05          Joint Optimization of Complexity and Overhead for the Routing in 2011
                          Hierarchical Networks

                          Description: We show that area-based link-vector algorithm (ALVA) which is used is
                          to analyze the routing complexity and     the routing table size in the hierarchical
                          network.

                          Technology: Area-based link-vector           Usage: Find Best Routing Policy

 6        SJNW06          Cooperative Channelization in Wireless Networks with Network 2011
                          Coding

                          Description: We propose cooperative channelization, this is used to find which
                          portions of the transmission media are allocated to links and which are congested at the
                          point and where network coding cannot efficiently repair loss.

                          Technology: Resource Reservation                   Usage : Reduce No of Transmissions

 7        SJNW07          Load Balance with Imperfect Information in Structured Peer-to- 2011
                          Peer Systems
                          Description: We propose a novel load balancing algorithm it is used to estimate the
                          probability distributions of the capacities of peers and the loads of virtual servers
                          Technology: Virtual Server                                       Usage : Load-Balancing
 8        SJNW08          Path Diversity Over Packet Switched Networks: Performance 2010
                          Analysis and Rate Allocation

                          Description: In this paper, Forward Error Correction (FEC) is applied across multiple
                          independent paths to enhance the end-to-end reliability. We prove that the probability of
                          irrecoverable loss (PE) decays exponentially with the number of paths.
                          Technology: Gilbert-Elliot channels                     Usage : End-To-End Reliability
 9        SJNW09          Normalized queuing delay: congestion control jointly utilizing delay 2010
                          and marking

                          Description: In this paper, we consider the design of a congestion control scheme and
                          the concept of normalized queuing delay. Which is used to reduces the bottleneck
                          problem. And controlling traffic congestion
                          Technology: Network Calculus                            Usage : Congestion Measure



                                                                                                     Fabsys Technologies Pvt.Ltd | 22
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 10        SJNW10         Multiple Routing Configurations For Fast IP Network Recovery                               2009

                          Description: we present a new recovery scheme called MRC is based on keeping
                          additional routing information in the routers, and allows packet forwarding to continue
                          on an alter native output link immediately after the detection of a failure.
                          Technology: Hop-by-Hop Forwarding             Usage: Handle Link And Node Failures
 11        SJNW11         Differentiated bandwidth allocation with TCP protection in core 2009
                          routers
                          Description: We present an Active Queue Management (AQM) scheme. which draws
                          a packet at random from the buffer, compares it with the arriving packet, and drops both
                          if they are from the same flow.

                          Technology: Active Queue Management (AQM)            Usage : Flows In Same Priority

 12        SJNW12         Node Isolation Model And Age-Based Neighbor Selection In 2009
                          Unstructured P2p Networks
                          Description: we show that two age-biased neighbor-selection strategies, which
                          dramatically reduces the probability of user isolation and graph partitioning compared
                          with uniform selection of neighbors.

                          Technology: Node isolation model          Usage: Reduce Probability Of User Isolation

 13        SJNW13         A Traffic Engineering Approach For Placement And Selection Of 2009
                          Network Services
                          Description: We propose service placement problem which is used finding the best
                          location for each service gateway, and selecting the best service gateway for each flow.

                          Technology: Service gateway placement                 Usage : Minimize Traffic Flow
 14        SJNW14         Dynamic Routing With Security Consideration                                                2009

                          Description: We proposing a dynamic routing algorithm such as the Routing
                          Information Protocol in wired networks and Destination-Sequenced Distance Vector
                          protocol in wireless networks that could randomize delivery paths for data transmission.

                          Technology: Security-enhanced data transmission        Usage: Defeat Various Threats

 15        SJNW15         Colored Tree                                                                               2009

                          Description: We show through extensive simulations that the average length of the
                          disjoint paths obtained using the SimCT algorithm is lesser compared to the previously
                          known techniques.
                          Technology: SimCT algorithm                        Usage: Minimize Cost Of Routing



       You Can Register project free at skiveprojects.com                Technical Assistance any time @ 9176990090

                                                                                                    Fabsys Technologies Pvt.Ltd | 23
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects

                   IEEE TRANSACTION ON: IMAGE PROCESSING

                                                    Domain: JAVA


 S.NO     CODE                              PROJECT TITLES & DESCRIPTION                                           Published
                                                                                                                   year
 1        SJIP01          Graph Cuts for Curvature Based Image Denoising

                          Description: we will present an efficient minimization algorithm based on graph cuts
                                                                                                                   2011
                          for minimizing the energy in the Euler’s elastic model which is used to minimizing the
                          staircase effects.
                          Technology: Binary MRF models               Usage :Image Denoising
 2.       SJIP02          Image Denoising in Mixed Poisson–Gaussian Noise

                          Description: We propose a general Technology (PURE-LET) to design and optimize a
                                                                                                                   2011
                          wide class of transform domain thresholding algorithms for denoising images corrupted
                          by mixed Poisson-Gaussian noise.
                          Technology: Linear expansion of thresholds          Usage : Image Denoising
 3        SJIP03          Practical Bounds on Image Denoising: From Estimation to
                          Information
                          Description: We show that the, cluster co variances and level of redundancy for          2011
                          patches in the image, can be estimated directly from the noise corrupted image.
                          Technology: Shannon entropy                            Usage : Noise-Free Image
 4        SJIP04          From Tiger to Panda: Animal Head Detection                                               2011

                          Description: we proposed two detection algorithms, namely Brute force detection and
                          Deformable detection for capture the shape and texture features on animal head.

                          Technology: Fusion                         Usage: Animal Head Detection

 5        SJIP05          On High-Order Denoising Models and Fast Algorithms for Vector-
                          Valued Images
                          Description: we introduce three high-order and curvature-based model and a fast multi
                                                                                                                   2010
                          grid algorithm which proves image denosing calculation. And removes staircase effects.
                          Technology: partial differential equations(PDEs)    Usage :Vector Denoising
 6        SJIP06          A Perceptually Relevant Approach to Ringing Region Detection

                          Description: The proposed ringing regions detection method which is used to show
                                                                                                                   2010
                          the ringing regions resulting images in psycho visual experiment
                          Technology: Luminance masking                        Usage : Automatic Detection


                                                                                                  Fabsys Technologies Pvt.Ltd | 24
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects

        NETWORK SIMULATOR (NS2) TITLES
           IEEE TRANSACTION ON: NS2 - NETWORK SIMULATOR

                                                    Domain: NS2

 S.NO       CODE                                      PROJECT TITLES                                        Published
                                                                                                               year
   1.      S11NS01        Secure Trust Management Model for Peer-to-Peer File Sharing System                   2011

   2.      S11NS02        Channel-Aware Routing in MANETs With Route Handoff                                   2011

   3.      S11NS03        Catching Packet Droppers and Modifiers in Wireless Sensor Networks                   2011

   4.      S11NS04        ConverSS:    A    Hybrid     MAC/Routing        Solution    for   Small-Scale,       2011
                          Convergecast Wireless Networks

   5.      S11NS05        Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks                2011
                          Using SVM and FDA

   6.      S11NS06        Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc                    2011
                          Networks

   7.      S11NS07        Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc                    2010
                          Networks

   8.      S11NS08        Trust Management in Mobile Ad Hoc Networks Using a Scalable                          2010
                          Maturity-Based Model

   9.      S11NS09        Channel Assignment for Multihop Cellular Networks: Minimum Delay                     2010



      Training provided by experienced IT Professionals.

      Own Concepts can be developed in NS2


                                                                                              Fabsys Technologies Pvt.Ltd | 25
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects

 APPLICATION PROJECT TITLES
 Web and Windows Application: DOT NET

                            REALTIME APPLICATION PROJECT TITLES
 S.No       CODE                                    PROJECT TITLES                                        LANGUAGE

 1        SDAP01          An Intelligent tutoring system with web enhanced training Dotnet
                          assessments

 2        SDAP02          Role Engineering via role based access control                                 Dotnet

 3        SDAP03          A Relation-Based Page Ranking in Web Search Engines                            Dotnet

 4        SDAP04          Database Enterprise Manager                                                    Dotnet

 5        SDAP05          Online Bug tracking System                                                     Dotnet

 6        SDAP06          Trace back of DoS Attacks using Entropy Variations                             Dotnet

 7        SDAP07          A new steganographic method based on information sharing via Dotnet
                          PNG images

 8        SDAP08          Step Construction of Visual Cryptography Schemes (VCS)                         Dotnet

 9        SDAP09          Efficient Compression of Encrypted Grayscale Images                            Dotnet

 10       SDAP10          Latent Fingerprint Matching                                                    Dotnet

 11       SDAP11          Online Data leakage detection                                                  Dotnet

 12       SDAP12          Online Buying and Selling System.                                              Dotnet

 13       SDAP13          Secure Mobile health care for rural with electronic alerts                     Dotnet

 14       SDAP14          Southern Railway Recruitment Portal                                            Dotnet

 15       SDAP15          Web-based Recruitment Process System for the HR group for a Dotnet
                          company

 16       SDAP16          Fast firewall implementations for software and hardware-based Dotnet
                          routers


                                                                                              Fabsys Technologies Pvt.Ltd | 26
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 17       SDAP17          File Replication Detection Algorithm in P2P File Sharing Systems               Dotnet

 18       SDAP18          Dynamic Routing Topology with Security Consideration                           Dotnet/Java

 19       SDAP19          Incentive-Based Scheduling for Market-Like Computational Grids                 Dotnet

 20       SDAP20          Approximate query processing in peer to peer networks                          Dotnet

 21       SDAP21          XML Based Ranking and Keyword Search                                           Dotnet

 22       SDAP22          Secured Data Object Replication in data grid                                   Dotnet

 23       SDAP23          Medical Anonymity Processing And Publishing                                    Dotnet

 24       SDAP24          Object Tracking System                                                         Dotnet

 25       SDAP25          Secure Data Transformation System                                              Dotnet

 26       SDAP26          Effective blogger with XML interchange                                         Dotnet

 27       SDAP27          Alert based monitoring and scheduling on Proportional shares                   Dotnet

 28       SDAP28          Exact Knowledge hiding for automobiles industry                                Dotnet

 29       SDAP29          Efficient Property Interpreter                                                 Dotnet

 30       SDAP30          Blind Banking Transformation System                                            Dotnet

 31       SDAP31          Security and Privacy for Social Networks.                                      Dotnet

 32       SDAP32          Still to animation movie creation                                              Dotnet

 33       SDAP33          Medical anonymity processing and publishing                                    Dotnet

 34       SDAP34          Global roaming and target tracking in mobile sensor network                    Dotnet

 35       SDAP35          Development Of A Campaign Information System                                   Dotnet

 36       SDAP36          Perspective Access Management                                                  Dotnet

 37       SDAP37          Email Proxy Server with Secure Service                                         Dotnet

 38      SDAP38           Online Bus Ticket Booking                                                      Dotnet

 39       SDAP39                                                                                         Dotnet
                          Customer Relationship Management



                                                                                              Fabsys Technologies Pvt.Ltd | 27
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects

APPLICATION PROJECT TITLES
Web and Windows Application: JAVA




                       REALTIME APPLICATION PROJECT TITLES

                                                  DOMAIN: JAVA

 S.NO       CODE                                    PROJECT TITLES                                          DOMAIN

 1        SJAP            Normalized queuing delay: congestion control jointly utilizing Java
                          delay and marking

 2        SJAP            Distributed Algorithm for Minimum path                                         Java

 3        SJAP            Path Diversity for packets                                                     Java

 4        SJAP            Node isolation model and age-based neighbor selection in Java
                          unstructured p2p networks

 5        SJAP            An Identity-Based Security System for User Privacy in Vehicular Java
                          Ad Hoc Networks

 6        SJAP            Layered Approach Using Conditional Random Fields for Intrusion Java
                          Detection.

 7        SJAP            A Puzzle based defense strategy against flooding attacks using Java
                          game theory

 8        SJAP            Adaptive Join Operators for Result Rate Optimization on Java
                          Streaming Inputs

 9        SJAP            Bin Rank: Scaling Dynamic Authority-Based Search Using Java
                          Materialized Sub graphs

                                                                                              Fabsys Technologies Pvt.Ltd | 28
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
Skiveprojects
 10       SJAP            NNexus: An automatic linker for collaborative web based corpora                Java

 11       SJAP            SSUM: Smart Server Update Mechanism for Maintaining Cache Java
                          Consistency in Mobile Environments

 12       SJAP            CAR: context aware adaptive routing for delay tolerant mobile Java
                          networks

 13       SJAP            Generic Loss Less Watermarking                                                 Java

 14       SJAP            Unseen Visible Water Marking                                                   Java

 15       SJAP            Colored tree                                                                   Java

 16       SJAP            QKDP: Provably secured third party authenticated quantum key Java
                          distribution protocol

 17       SJAP            Controlling IP spoofing through inter-domain packet filters                    Java

 18       SJAP            A service centric multicast architecture and routing protocol                  Java

 19       SJAP            Enhancing search performance in unstructured p2p networks Java
                          based on users’ common interest

 20       SJAP            Two Techniques for Fast computation of constrained shortest path               Java



For Application Project Description, visit Skiveprojects.com!!


Get free Project Explanation @ 9176990090, 044-42712737




                                                                                              Fabsys Technologies Pvt.Ltd | 29
Training Office:
#34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737
E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com
IEEE Projects –Software
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]

Mais conteúdo relacionado

Semelhante a 2011 updated titles [ skiveprojects ]

Rise of Network Virtualization
Rise of Network VirtualizationRise of Network Virtualization
Rise of Network VirtualizationArinto Murdopo
 
Emerging Computing Architectures
Emerging Computing ArchitecturesEmerging Computing Architectures
Emerging Computing ArchitecturesDaniel Holmberg
 
Model Driven Architecture (MDA): Motivations, Status & Future
Model Driven Architecture (MDA): Motivations, Status & FutureModel Driven Architecture (MDA): Motivations, Status & Future
Model Driven Architecture (MDA): Motivations, Status & Futureelliando dias
 
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...
Im 2021 tutorial   next-generation closed-loop automation - an inside view - ...Im 2021 tutorial   next-generation closed-loop automation - an inside view - ...
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...Ishan Vaishnavi
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewLaurent Ciavaglia
 
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside view
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside viewIEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside view
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside viewPedro Henrique Gomes
 
Acceleo Day - Orange
Acceleo Day - OrangeAcceleo Day - Orange
Acceleo Day - Orangesliard
 
Semantic Web Services for Computational Mechanics : A Literature Survey and R...
Semantic Web Services for Computational Mechanics : A Literature Survey and R...Semantic Web Services for Computational Mechanics : A Literature Survey and R...
Semantic Web Services for Computational Mechanics : A Literature Survey and R...Dr. Thiti Vacharasintopchai, ATSI-DX, CISA
 
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012Arun Gupta
 
Challenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future InternetChallenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future InternetSOFIProject
 
Silibus stij3053 - Network Design
Silibus stij3053 - Network DesignSilibus stij3053 - Network Design
Silibus stij3053 - Network Designnakomuri
 
Model2Roo - ACME
Model2Roo - ACMEModel2Roo - ACME
Model2Roo - ACMEjccastrejon
 
e-Clouds: a SaaS Marketplace for Scientific Computing
e-Clouds: a SaaS Marketplace for Scientific Computinge-Clouds: a SaaS Marketplace for Scientific Computing
e-Clouds: a SaaS Marketplace for Scientific ComputingMario Jose Villamizar Cano
 
PATHS Final prototype interface design v1.0
PATHS Final prototype interface design v1.0PATHS Final prototype interface design v1.0
PATHS Final prototype interface design v1.0pathsproject
 
Shin J2 Ee Programming Half Day
Shin J2 Ee Programming Half DayShin J2 Ee Programming Half Day
Shin J2 Ee Programming Half Daylokendralodha
 
Exploring MERN Stack and Tech Stacks: A Comparative Analysis
Exploring MERN Stack and Tech Stacks: A Comparative AnalysisExploring MERN Stack and Tech Stacks: A Comparative Analysis
Exploring MERN Stack and Tech Stacks: A Comparative AnalysisIRJET Journal
 
RitZBox-A file Sharing system
RitZBox-A file Sharing systemRitZBox-A file Sharing system
RitZBox-A file Sharing systemSubham Sahu
 
Getting Started Developing with Platform as a Service
Getting Started Developing with Platform as a ServiceGetting Started Developing with Platform as a Service
Getting Started Developing with Platform as a ServiceCloudBees
 

Semelhante a 2011 updated titles [ skiveprojects ] (20)

Phaniendra_document_ece
Phaniendra_document_ecePhaniendra_document_ece
Phaniendra_document_ece
 
Rise of Network Virtualization
Rise of Network VirtualizationRise of Network Virtualization
Rise of Network Virtualization
 
Emerging Computing Architectures
Emerging Computing ArchitecturesEmerging Computing Architectures
Emerging Computing Architectures
 
Model Driven Architecture (MDA): Motivations, Status & Future
Model Driven Architecture (MDA): Motivations, Status & FutureModel Driven Architecture (MDA): Motivations, Status & Future
Model Driven Architecture (MDA): Motivations, Status & Future
 
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...
Im 2021 tutorial   next-generation closed-loop automation - an inside view - ...Im 2021 tutorial   next-generation closed-loop automation - an inside view - ...
Im 2021 tutorial next-generation closed-loop automation - an inside view - ...
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside View
 
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside view
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside viewIEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside view
IEEE IM 2021 Tutorial - Next-generation closed-loop automation - an inside view
 
Acceleo Day - Orange
Acceleo Day - OrangeAcceleo Day - Orange
Acceleo Day - Orange
 
Semantic Web Services for Computational Mechanics : A Literature Survey and R...
Semantic Web Services for Computational Mechanics : A Literature Survey and R...Semantic Web Services for Computational Mechanics : A Literature Survey and R...
Semantic Web Services for Computational Mechanics : A Literature Survey and R...
 
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
 
Challenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future InternetChallenges and solutions in Cloud computing for the Future Internet
Challenges and solutions in Cloud computing for the Future Internet
 
Billmresume3-2015
Billmresume3-2015Billmresume3-2015
Billmresume3-2015
 
Silibus stij3053 - Network Design
Silibus stij3053 - Network DesignSilibus stij3053 - Network Design
Silibus stij3053 - Network Design
 
Model2Roo - ACME
Model2Roo - ACMEModel2Roo - ACME
Model2Roo - ACME
 
e-Clouds: a SaaS Marketplace for Scientific Computing
e-Clouds: a SaaS Marketplace for Scientific Computinge-Clouds: a SaaS Marketplace for Scientific Computing
e-Clouds: a SaaS Marketplace for Scientific Computing
 
PATHS Final prototype interface design v1.0
PATHS Final prototype interface design v1.0PATHS Final prototype interface design v1.0
PATHS Final prototype interface design v1.0
 
Shin J2 Ee Programming Half Day
Shin J2 Ee Programming Half DayShin J2 Ee Programming Half Day
Shin J2 Ee Programming Half Day
 
Exploring MERN Stack and Tech Stacks: A Comparative Analysis
Exploring MERN Stack and Tech Stacks: A Comparative AnalysisExploring MERN Stack and Tech Stacks: A Comparative Analysis
Exploring MERN Stack and Tech Stacks: A Comparative Analysis
 
RitZBox-A file Sharing system
RitZBox-A file Sharing systemRitZBox-A file Sharing system
RitZBox-A file Sharing system
 
Getting Started Developing with Platform as a Service
Getting Started Developing with Platform as a ServiceGetting Started Developing with Platform as a Service
Getting Started Developing with Platform as a Service
 

Último

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Último (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

2011 updated titles [ skiveprojects ]

  • 1. Skiveprojects TABLE OF CONTENTS S. No PROJECT TITLES PAGE.NO 1 DOT NET IEEE TITLES 3 1.1  Cloud Computing 3 1.2  Mobile Computing 4 1.3  Network Security 5 1.4  Data Mining 8 1.5  Image Processing 11 1.6  Distributed Networking 12 1.7  Parallel & Distributed Computing 15 17 2 JAVA IEEE TITLES 2.1  Data Mining 17 2.2  Network Security 19 2.3  Parallel and Distributed Computing 20 2.4  Distributed Networking 21 2.5  Image Processing 23 3 NETWORK SIMULATOR(NS2) TITLES 25 4 APPLICATION PROJECT TITLES 26 4.1  DOT NET APPLICATION TITLES 26 4.2  JAVA APPLICATION TITLES 28 5 FLASH AND ANIMATION TITLES 29 6 EMBEDDED SYSTEM IEEE TITLES 30 7 EMBEDDED SYSTEM NON IEEE TITLES 33 8 MATLAB IEEE TITLES 35 8.1  Communication 35 8.2  Image Processing 36 9 VLSI IEEE TITLES 36 Fabsys Technologies Pvt.Ltd | 1 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 2. Skiveprojects About Skiveprojects Skiveprojects.com is a division of Fabsys Technologies (P) Ltd. It is specially organized for students’ guidance in their project work as well as in career development. As a team, we provide technical assistance in various technologies and domains. By efficient training methodologies, we train students in their desired field. We focus on needs of the students. To make students career brighter in desired field, we are functioning as a bridge for students. We provide  Project Guidance for all departments(UG & PG)  In plant training for IT, CSE, ECE departments respectively  Career Development programs  Seminars in various Domain & Technology every day!!  Internship Training & Certification What is the real use of doing IEEE Project in final year? Well, it is simple. Doing Project in final year will help you  To make an entry in Real time working environment  In most of the technical interview, Companies will ask questions around your final year projects  Exposure in latest technology in the field  Backbone for placement  Real time Training in an organization Bring Own Concepts!! You can bring your own concepts to us. We will develop projects according your requirement.  Project Guidance with Short Term Course.  Online Training for out-station students Fabsys Technologies Pvt.Ltd | 2 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 3. Skiveprojects DOT NET IEEE TITLES IEEE TRANSACTION ON: CLOUD COMPUTING Domain: Dot. Net S.NO CODE PROJECT TITLE & DESCRIPTION Published Year 1. SDCC01 EduCloud: PaaS Versus IaaS Cloud Usage for an Advanced 2011 Computer Science Course. Description: Platform clouds are valued by both students and professors to achieve the course objectives and that clouds offer a significant improvement over the previous situation in labs. Technology: Paas Cloud Usage : Cloud In Education 2. SDCC02 CloudTPS: Scalable Transactions for Web Applications in the Cloud. 2011 Description: CloudTPS (scalable transaction manager) guarantees full ACID properties for multi-item transactions issued by Web applications, even in the presence of server failures and network partitions. Technology: Local Transaction Manager Usage: Acid Properties To Nosql 3. SDCC03 A Privacy-Preserving Remote Data Integrity Checking Protocol with 2011 Data Dynamics and Public Verifiability. Description: Proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Technology: Public Verifiability Usage : Integrity In Cloud 4. SDCC04 Enabling Public Auditability and Data Dynamics for Storage Security 2011 in Cloud Computing. Description: Identifying the difficulties & potential security problems of direct extensions with fully dynamic data updates from prior works and then construct an elegant verification scheme for the seamless integration. Technology: Third Party auditor Usage : Data Security in Cloud 5. SDCC05 Optimal Service Pricing for a Cloud Cache. 2011 Description: A novel SOA-aware approach with a special focus on the data flow. The tight interaction of new cloud technologies with SOA technologies enables us to optimize the execution of data-intensive service. Technology: Framework For Dynamic Pricing Usage : Cloud Profit Fabsys Technologies Pvt.Ltd | 3 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 4. Skiveprojects 6. SDCC06 Failure Avoidance through Fault Prediction Based on Synthetic 2011 Transactions. Description: Enhancing an online service’s reliability, availability and performance. Synthetic transactions in pre-production environments, and combined with data-mining on compact, specialized logs. Technology: Synthetic Transactions Usage : Eliminate Failure 7. SDCC07 Multi-level Intrusion Detection system and Log Management in 2011 Cloud Computing. Description: A method that enables cloud computing systems both effectiveness of using system resource and system strength of security. Technology: Levels of IDS Usage: Security with high Accessibility 8. SDCC08 Using Cloud Technologies to Optimize Data-Intensive Service 2010 Applications Description: The tight interaction of new cloud technologies with SOA technologies enables us to optimize the execution of data-intensive service applications by reducing the data exchange tasks to a minimum. Technology: Cloud SOA Usage : Eliminate Unwanted Data IEEE TRANSACTION ON: MOBILE COMPUTING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1. SDMC01 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011 Networks. Description: Efficient Geographic Multicast Protocol -uses a virtual-zone-based structure to implement scalable and efficient group membership management. Technology: Virtual Zone Usage: Reliable Packet Transmissions 2. SDMC02 Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh 2010 Networks. Description: A specialization that accounts for peculiar features of wireless mesh networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast nature of wireless communication. Technology: 1-Hop Broadcast Usage :Information retrieval efficiency 3. SDMC03 A Distributed and Scalable Time Slot Allocation Protocol for Wireless 2011 Sensor Networks. Description: A distributed and scalable scheduling access scheme that mitigates high data loss in data-intensive sensor networks and can also handle some mobility. Technology: Latin Squares Usage: Eliminate Collision Fabsys Technologies Pvt.Ltd | 4 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 5. Skiveprojects 4. SDMC04 Secure High-Throughput Multicast Routing in Wireless Mesh 2011 Networks. Description: Identifying novel attacks against high throughput multicast protocols in wireless mesh networks. Technology: Defense Mechanisms Usage: Prevent from identified attacks 5. SDMC05 Message Authentication in Computationally Constrained 2010 Environments. Description: An approach to implement a compact HMAC by the use of stream ciphering is presented in this paper. Technology: Stream Cipher Usage: Authentication, Integrity 6. SDMC06 Efficient Broadcasting in Mobile AD-Hoc Network. 2010 Description: New broadcasting algorithm that constructs a CDS "on the fly" and can guarantee both full delivery and a constant approximation ratio to the optimal solution. Technology: Broadcasting Algorithms Usage: Reliable Transmission 7. SDMC07 Multicasting with Localized Control in Wireless AD-Hoc Network 2010 Description: The proposed scheme combines the layered multicast concept with the routing-based congestion avoidance idea to reduce the aggregated rate of multicast flows. Technology: cross-layer approach Usage: Congestion Avoidance IEEE TRANSACTION ON : NETWORK SECURITY Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1. SDNS01 SAT: A Security Architecture Achieving Anonymity and 2011 Traceability in Wireless. Description: Ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. Technology: Anonymity And Traceability Usage : Identify Users 2. SDNS02 Replica Placement for Route Diversity in Tree-based Routing 2011 Distributed Hash Tables Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route diversity for these DHTs. Technology: Route Diversity Usage : Response Time Reduced 3. SDNS03 Privacy-Preserving Updates to Anonymous and Confidential 2011 Databases Description: Protocols solving suppression-based and generalization-based k- anonymous and confidential databases. And it will rely on well-known cryptographic assumptions. Technology: Secure Computation Usage : Privacy-Preserving Fabsys Technologies Pvt.Ltd | 5 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 6. Skiveprojects 4. SDNS04 Revisiting Defenses Against Large-Scale Online Password Guessing 2011 Attacks Description: A new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks. Technology: Automated Turing Tests Usage : Identify Malicious Login 5. SDNS05 Balancing Revocation and Storage Trade-Offs in Secure Group 2011 Communication Description: Hybrid key management algorithm. Trade-offs between storage cost and rekeying cost for secure multicast. Technology: A Family Of Algorithms Usage : Reduce Cost Of Rekeying 6. SDNS06 Nymble: Blocking Misbehaving Users in Anonymizing Networks 2011 Description: Servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Nymble Tickets and Credentials, Blacklist. Technology: A Secure System Usage : Block Misbehaving Users 7. SDNS07 Blind Authentication: A Secure Crypto-Biometric Verification 2010 Protocol Description: A Provably secure and blind biometric authentication protocol, which addresses the concerns of user’s privacy, template protection, and trust issues. Technology: Biometric Authentication Usage : Nonrepudiable identity 8. SDNS08 An Architectural Approach to Preventing Code Injection Attacks 2010 Description: The memory architecture of modern processors that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory. Technology: Memory Architecture Usage : Improved Protection 9. SDNS09 Authenticated Group Key Transfer Protocol Based on Secret 2010 Sharing Description: An authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once. Technology: Trusted Key Generation Center Usage : Secret Sharing 10. SDNS10 Beyond Output Voting: Detecting Compromised Replicas Using 2009 HMM-Based Behavioral Distance Description: A novel approach to behavioral distance measurement using a new type of Hidden Markov Model, and present an architecture realizing this new approach. Technology: Hidden Markov Model Usage : Detect Mimicry Attacks 11. SDNS11 Flexible and Rollback recovery for grid environment 2009 Description: Two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. Technology: Theft-Induced Check Usage : Controlling The Overhead 12. SDNS12 Accurately Measuring Denial of Service in Simulation and Testbed 2009 Experiments Description: Several DoS impact metrics that measure the quality of service experienced by users during an attack. Our metrics are quantitative Technology: Denial of Service Metrics Usage :Measure service quality Fabsys Technologies Pvt.Ltd | 6 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 7. Skiveprojects 13. SDNS13 Credit card fraud detection using hidden Markov model 2009 Description: An HMM is initially trained with the normal behavior of a cardholder. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability. Technology: Hidden Markov Model Usage :Most accurate detection 14. SDNS14 In-depth packet inspection using a hierarchical pattern matching 2010 algorithm. Description: EHMA is a two-tier and cluster-wise matching algorithm, which significantly reduces the amount of external memory accesses and the capacity of memory. Technology: Cluster-Wise Matching Usage : Fast scanning process 15. SDNS15 Practical Management And Standard Administrative System 2010 Description: To reduce the manual workload of the administrative activities, organizations began to electronically automate many of these processes. Technology: Electronic Automation Usage : increasing scalability 16. SDNS16 Predictive Network Anomaly Detection And Visualization 2010 Description: An approach that uses short-term observations of network features and their respective time averaged entropies. Acute changes are localized in network feature space using adaptive Wiener filtering. Technology: Fisher linear discriminant Usage : Identifying Anomalies 17. Network Traffic Monitor 2010 SDNS17 Description: UniMon (Universal Network Traffic Monitor) is an external and passive network traffic monitor designed to adapt any type of network and protocols. Technology: Entropy of Network Traffic Usage: Monitor User Activity 18. Steward : Scaling Byzantine Fault-Tolerant Replication To Wide 2010 SDNS18 Area Networks Description: The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide-area communication. Technology: Fault-Tolerant Replication Usage :Secure Transmission Do you need more Explanation for any Project? Contact Skiveprojects @ 9176990090 Fabsys Technologies Pvt.Ltd | 7 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 8. Skiveprojects IEEE TRANSACTION ON : DATAMINING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1. SDDM01 Mining Group Movement Patterns For Tracking Moving Objects Efficiently. Description: A local mining phase & cluster ensembling phase to find movement 2011 patterns based on local trajectories and computing the similarity of moving objects & identify the local group relationships. Technology: Distributed clustering Usage : Track Moving Objects 2. SDDM02 Efficient Periodicity Mining In Time Series Databases Using Suffix Trees. Description: The algorithm uses suffix tree as the underlying data structure. Detect 2011 symbol, sequence (partial), and segment (full cycle) periodicity in time series. Technology: Suffix Tree Usage : Time Efficient 3. SDDM03 Automatic Discovery of Personal Name Aliases From the Web Description: Automatically extracted lexical pattern-based approach to efficiently extract a large set of candidate aliases from snippets retrieved from a web search engine. 2011 Technology: Lexical Pattern Approach Usage : Information Retrieval 4. SDDM04 Experience Transfer for the Configuration Tuning in Large-Scale 2011 Computing Systems Description: The utilization of management experiences in one system to benefit the same management task in other systems (or current systems). Bayesian network to model configuration dependencies. Technology: Configuration Tuning Usage : Configuration Tuning 5. SDDM05 A Web Search Engine-Based Approach to Measure Semantic 2011 Similarity between Words. Description: An empirical method to estimate semantic similarity using page counts and text snippets retrieved from a web search engine for two words. Technology: Empirical Method Usage : Improves The Accuracy 6. SDDM06 Data Leakage Detection. 2011 Description: Data allocation strategies that improve the probability of identifying leakages and develop a model for assessing the “guilt” of agents. That improves chances of identifying the guilty agents. Technology: Data Allocation Strategies Usage : Identifying Guilty Party 7. SDDM07 A Machine Learning Approach for Identifying Disease-Treatment 2011 Relations in Short Texts. Description: A ML-based methodology for building an application that is capable of identifying and disseminating healthcare information Identifies semantic relations that exist between diseases and treatments. Technology: ML-based methodology Usage : Integrated Application Fabsys Technologies Pvt.Ltd | 8 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 9. Skiveprojects 8. SDDM08 Authenticated Multistep Nearest Neighbor Search 2011 Description: The multistep NN algorithm incurs prohibitive network overhead due to the transmission of false hits, but are nevertheless necessary for its verification. Technology: Query Authentication Usage : Reduces Size Of False Hit 9. SDDM09 Optimizing Resource Conflicts in Workflow Management Systems 2011 Description: Resource Conflicts Joint Optimization (Re.Co.Jo.Op.) minimizes resource conflicts subject to temporal constraints and simultaneously optimizes throughput. Technology: Eigen-value Analysis Usage :Minimize Resource Conflicts 10. SDDM10 Closeness: A New Privacy Measure for Data Publishing 2010 Description: A new notion of privacy called "closeness." It present the base model - closeness, which requires that the distribution of a sensitive attribute Technology: Closeness Usage : Offers Higher Utility 11. SDDM11 Record Matching over Query Results from Multiple Web Databases. 2010 Description: An unsupervised, online record matching method, UDD, where a given query, can effectively identify duplicates from the query result records of multiple Web databases. Technology: Data Deduplication Usage : Get accurate results 12. SDDM12 Towards an Effective XML Keyword Search. 2010 Description: A novel formulae to identify the search for nodes and search via nodes of a query, and present a novel XML TF*IDF ranking strategy to rank the individual matches of all possible search intentions. Technology: Relevance Ranking Usage : Rank the individual matches 13. SDDM13 Bridging Domains Using World Wide Knowledge for Transfer 2010 Learning Description: A novel transfer learning approach, called BIG to effectively extract useful knowledge in a worldwide knowledge base, which is then used to link the source and target domains. Technology: Cross-Domain Usage: Cross-domain text classification 14. SDDM14 Personalizing web directories with the aid of web usage data 2010 Description: A novel methodology that combines the users' browsing behavior with thematic information from the Web directories. Technology: Personalization Methodology Usage : Web Directories 15. SDDM15 Filter-Based Data Partitioning for Training Multiple Classifier 2010 Systems Description: To assess the effectiveness of different types of training partitions, It generated a large number of disjoint training partitions with distinctive distributions. Technology: Clustering and Selection Usage : Classifier Systems Fabsys Technologies Pvt.Ltd | 9 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 10. Skiveprojects 16. SDDM16 FiVaTech: Page-Level Web Data Extraction from Template Pages 2010 Description: An unsupervised, page-level data extraction approach to deduce the schema and templates for each individual Deep Website, which contains either singleton or multiple data records in one Webpage. Technology: Multiple Trees Merging Usage : Web Data Extraction 17. SDDM17 Histogram-Based Global Load Balancing in Structured Peer-to-Peer 2009 Systems Description: A general framework, HiGLOB, for global load balancing in structured P2P systems. Each node with 1) a histogram manager, and 2) a load-balancing manager. Technology: Histogram Buckets Usage : Load-Balancing 18. SDDM18 Interactive Correction and Recommendation for Computer 2009 Language Learning and Training Description: An automated learning and skills training system for a database programming environment that promotes procedural knowledge acquisition and skills training. Technology: Error Classification Usage : Personalized Guidance 19. SDDM19 Optimal Lot Sizing Policies for Sequential Online Auctions 2009 Description: A goal programming approach for estimating the bid distribution for the bidder population from the observed bids, readily available in these auctions. Technology: Closed-Form Solution Usage : Increases users holding costs 20. SDDM20 Intrusion Detection System based on Data Mining 2009 Description: The system that performs anomaly detection can detect intrusions known and unknown, reduce omissions and misstatements, improve accuracy and speed of intrusion detection. Technology: Hidden Honey pot Usage : Solicit possible attacks 21. SDDM21 Fast Query Point Movement Techniques for Large CBIR Systems 2009 Description: A new index structure and query processing technique to improve retrieval effectiveness and efficiency. Technology: Relevance Feedback Usage : Retrieval Performance 22. SDDM22 Exact Knowledge Hiding Through Database Extension 2009 Description: A novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent item. Technology: Exact Border Approach Usage : Hiding The Sensitive Item 23. SDDM23 Hierarchical distribute p2p document clustering and clustering 2009 summarization Description: A Hierarchically distributed Peer-to-Peer (HP2PC) architecture and clustering algorithm. The architecture is based on a multilayer overlay network of peer neighborhoods. Technology: distributed key phrase extraction Usage : Global Clustering Fabsys Technologies Pvt.Ltd | 10 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 11. Skiveprojects 24. SDDM24 Vide: A Vision-Based Approach For Deep Web Data Extraction 2010 Description: A novel technique is proposed for data extraction from deep Web pages using primarily visual features. A new performance measure, revision, is proposed to evaluate Web data extraction tools. Technology: Visual Features Of Web Pages Usage : Web data extraction 25. Multidimensional Suppressions For K-Anonymity 2010 SDDM25 Description: A new method for achieving k-anonymity named K-anonymity of Classification Trees Using Suppression (kACTUS). Technology: De-Indentified Data Usage : Multidimensional Suppression 26. Voting Systems With Trust Mechanisms In Cyberspace: 2010 SDDM26 Vulnerabilities And Defenses Description: Proposing two defense schemes 1. Hide correlation knowledge from attackers 2. Introduce robustness-of-evidence, a new metric, in trust calculation Technology: RepTrap Usage : Reduce rate of attacks IEEE TRANSACTION ON: IMAGE PROCESSING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published year 1. SDIP01 1-D Transforms for the Motion Compensation Residual 2011 Description: An adaptive auto-covariance characterization for the MC-residual that shows some statistical differences between the MC-residual and the image. Technology:1D directional transform Usage: Conventional Transforms 2. SDIP02 A Stochastic Approach to Image Retrieval Using Relevance 2011 Feedback and Particle Swarm Optimization Description: An innovative approach is proposed with combination of relevance feedback (RF) approach & evolutionary stochastic algorithm, called particle swarm optimizer (PSO). Technology: Particle Swarm Optimizer Usage : Visual Query 3. SDIP03 Contourlet-Based Image Watermarking Using Optimum Detector in 2010 a Noisy Environment Description: A new Watermarking technique for eliminating the noises in the environment by using the optimum detector. Technology: General Gaussian Distribution Usage : Watermarking Fabsys Technologies Pvt.Ltd | 11 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 12. Skiveprojects 4. SDIP04 Latent Finger print matching 2010 Description: A system for matching latent fingerprints found at crime scenes to rolled fingerprints enrolled in law enforcement databases with extended features. Technology: Matching Fingerprints Usage : fingerprint quality measure 5. SDIP05 Reversible Image Watermarking Using Interpolation Technique 2010 Description: A novel reversible watermarking scheme using an interpolation technique, which can embed a large amount of covert data into images with imperceptible modification. Technology: Interpolation Technique Usage :Higher Image Fidelity 6. SDIP06 Generic Lossless visible Watermarking 2010 Description: The new watermarking methosd is based on the use of deterministic one- to-one compound mappings of image pixel values. Technology:1-To-1 Compound Mappings Usage : Recover Image 7. SDIP07 Bridging The Semantic Gap Between Image Contents And Tags 2010 Description: A unified framework which stems from a two-level data fusions between the image contents and tags: 1) A unified graph is built and; 2) A novel random walk model is then proposed. Technology: Random Walk Model Usage : Image Annotation IEEE TRANSACTION ON: DISTRIBUTED NETWORKING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published year 1. SDNW01 An Authentication Code Against Pollution Attacks in Network 2011 Coding Description: Unconditionally secure authentication code for multicast network coding, where the trusted authority gives the key rights to the destinations and intermediate nodes. Technology: Secure Authentication Code Usage :Pollution Is Canceled 2. SDNW02 Network-Coding Multicast Networks With QoS Guarantees 2011 Description: Proposing a System where Each edge node admits not more than a specified amount of traffic; the network will never experience link congestion. Technology: Network Coding Usage : Multicast Network Fabsys Technologies Pvt.Ltd | 12 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 13. Skiveprojects 3. SDNW03 A Practical Adaptive Pacing Scheme for TCP in Multihop Wireless 2011 Networks Description: TCP with Adaptive Pacing (TCP-AP), implements rate-based scheduling of transmissions within the TCP Congestion window. Technology: Rate-Based Scheduling Usage :Overcome deficiencies 4. SDNW04 On the Fair Coexistence of Loss-and Delay-Based TCP 2011 Description: A novel delay-based additive increase, multiplicative decrease (AIMD) congestion control algorithm which depends on a nonzero average queuing delay. Technology: Congestion Control Usage : Fair Coexistence Possible 5. SDNW05 Energy-Efficient Protocol for Cooperative Networks 2011 Description: Derive the upper bound of the capacity of the protocol, and it analyze the end-to-end robustness of the protocol to data-packet loss, along with the tradeoff between energy consumption and error rate. Technology: Cooperative Communication Usage : Congestion Control 6. SDNW06 DTRAB: Combating Against Attacks on Encrypted Protocols 2010 Through Traffic-Feature Analysis Description: An anomaly-based detection system by using strategically distributed monitoring stubs (MSs). The MSs, by sniffing the encrypted traffic, extract features for detecting these attacks. Technology: Anomaly-Based Detection Usage : Avoid False Alarms 7. SDNW07 Efficient and Dynamic Routing Topology Inference From End-to- 2010 End Measurements Description: A framework for designing topology inference algorithms based on additive metrics. The framework can flexibly fuse information from multiple measurements to achieve better estimation accuracy. Technology: Topology Inference Usage : Faster Convergence Rate 8. SDNW08 A Queuing Model for Evaluating the Transfer Latency of Peer-to- 2010 Peer Systems Description: A new Modeling Framework for the peers that accounts for the file size distribution, the search time, load distribution at peers, and number of concurrent downloads allowed by a peer. Technology: Framework For Peers Usage : Reduces Probing Overhead Fabsys Technologies Pvt.Ltd | 13 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 14. Skiveprojects 9. SDNW09 An Efficient and Adaptive Decentralized File Replication Algorithm 2010 in P2P File Sharing Systems Description: This paper presents an Efficient and adaptive decentralized file replication algorithm (EAD) that achieves high query efficiency and high replica utilization at a significantly low cost. Technology: EAD file replication Usage : Overloaded node reduction 10. SDNW10 Traceback of DDoS Attacks Using Entropy Variations 2010 Description: A novel trace back method for DDoS attacks during the process. The proposed strategy is memory non-intensive, efficiently scalable, robust against packet pollution. Technology: Entropy Variations Usage : Memory Non-Intensive 11. SDNW11 POPI: A User-Level Tool for Inferring Router Packet Forwarding 2010 Priority Description: An end-to-end approach for PFP inference and its associated tool, POPI. It enables users to discover such network policies through measurements of packet losses of different packet types. Technology: End-To-End Approach Usage : Packet forwarding priority 12. SDNW12 A Directory Service for Perspective Access Networks 2010 Description: A perspective access network (PAN) is a peer-to-peer overlay network that incorporates routing and directory services that allow network perspective-sharing and nonhierarchical organization. Technology: Directory Service For Networks Usage : Network Sharing 13. SDNW13 Web User-Session Inference by Means of Clustering Techniques 2010 Description: A novel methodology with clustering techniques to identify Web user- sessions without requiring an a priori definition of threshold values. Technology: Web Usage Mining Techniques Usage : User-Sessions 14. SDNW14 Mitigating Attacks on Open Functionality in SMS-Capable Cellular 2010 Networks Description: A combination of modeling and simulation to demonstrate the feasibility of targeted text messaging attacks. Technology: Queue Management Usage: Mitigating messaging attacks. 15. SDNW15 Plexus-A scalable p2p Protocol enabling efficient subset search 2009 Description: Plexus, a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit-sequence (pattern) & discovering it using any subset of its 1-bits. Technology: Peer-To-Peer Search Usage : Discovery Of Information Fabsys Technologies Pvt.Ltd | 14 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 15. Skiveprojects 16. SDNW16 Incentive-Based Scheduling for Market-Like Computational Grids 2009 Description: An incentive-based scheduling scheme, which utilizes a peer-to-peer decentralized scheduling framework, a set of local heuristic algorithms, and three market instruments of job announcement, price, and competition degree. Technology: Heuristic Algorithms Usage : Fair Profit Allocation 17. SDNW17 Multiple Routing Configurations for Fast IP Network Recovery 2009 Description: MRC is strictly connectionless, and assumes only destination based hop- by-hop forwarding, keeps additional routing information in the routers, and allows packet forwarding to continue. Technology: Hop-By-Hop Forwarding Usage : Load Distribution 18. SDNW18 Distributed Computing For E-Learning 2010 Description: Applying Distributed Computing strategy in E-Learning Environment to make the learning process more interactive. Technology: Semantic Applications Usage: Centralized E-Learning IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SDP01 A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad 2011 hoc Networks Description: Cooperative Diversity MAC, which exploits the cooperative communication capability of the physical layer to improve robustness in wireless ad hoc networks. Technology: Partner Selection Usage : Mitigates Interference 2 SDP02 Collective Receiver-Initiated Multicast for Grid Applications 2011 Description: Present Robber, a collective, receiver-initiated, high-throughput multicast approach inspired by the Bit Torrent protocol to maximize the throughput between multiple cluster computers. Technology: High-Throughput Multicast Usage: Static Load Balancing 3 SDP03 Compressing Network Access Control Lists 2011 Description: ACL Compressor, a framework that can significantly reduce the number of rules in an access control list while maintaining the same semantics. Technology: Dynamic Programming Usage : Access Control Lists Fabsys Technologies Pvt.Ltd | 15 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 16. Skiveprojects 4 SDP04 A Distributed Algorithm for the Replica Placement Problem 2011 Description: A new Distributed Algorithm to Improve the efficiency of object replication within a given distributed replication group. Technology: Distributed Approximation Usage : Object Replication 5 SDP05 A Generic Framework for Three-Factor Authentication: Preserving 2011 Security and Privacy in Distributed Systems Description: A systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. Technology: 3-Factor Authentication Usage: Identity Of Remote Client 6 SDP06 TASA: Tag-Free Activity Sensing using RFID Tag Arrays 2011 Description: TASA For location sensing and frequent route detection. TASA can locate objects more accurately. Technology: Frequent Route Detection Usage : Location Sensing 7 SDP07 Flexible Robust Group key Agreement 2011 Description: A new robust group key agreement protocol (GKA) allows a set of players to establish a shared secret key, regardless of network/node failures. Technology: Group Key Agreement Usage: logarithmic-sized message 8 SDP08 Symmetric Key Approaches to Securing BGP-A Little Bit Trust is 2011 Enough Description: Key approach for Trade-off between efficiency and security by giving a little dose of trust to BGP routers. Technology: Central Key Distribution Usage : Signature Verification DO YOU HAVE OWN CONCEPT!!! Come Let’s Discuss at Skiveprojects corporate office. What is your department!! Now, you can Select project based on your dept at skiveprojects.com Need BASEPAPER or ABSTRACT ? Send a mail to skiveprojects@gmail.com Fabsys Technologies Pvt.Ltd | 16 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 17. Skiveprojects JAVA IEEE TITLES IEEE TRANSACTION ON : DATAMINING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published Year SJDM01 Authenticated Multistep Nearest Neighbor Search 2011 1. Description: We propose a new technique multi-step NN Algorithm that reduces the size of each false hit. Moreover, we generalize our solution for a distributed setting, where the database is horizontally partitioned over several servers. Technology: Query Authentication Usage : Reduces Size Of False Hit 2. SJDM02 A Machine Learning Approach for Identifying Disease-Treatment 2011 Relations in Short Texts Description: In this we Describes a ML-based Technology for identifying and disseminating healthcare information. It extracts sentences from published medical papers that mention diseases and treatments in short text format. Technology: ML-based Technology Usage : Integrated Application 3 SJDM03 Automatic Discovery of Personal Name Aliases from the Web 2011 Description: We describes the method numerous baselines and previously proposed name alias extraction methods, achieving a statistically significant mean reciprocal rank (MRR) of 0.67. Technology: Mean Reciprocal Rank Usage: Information Retrieval 4 SJDM04 Design and Implementation of Enterprise Financing Decision Model 2011 Based on Data Mining Description: In proposed system we have response policy such as Conservative, Aggressive, and Fine grant and here we are going to implement hashed messaged authentication (HMAC) for secure process. Technology: Financing decision Usage: Heterogeneous data integration Fabsys Technologies Pvt.Ltd | 17 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 18. Skiveprojects 5 SJDM05 Enhancing the k-means clustering algorithm by using a O(n 2011 logn)heuristic method for finding better initial centroids. Description: This project proposes an improvement on the classic k-means algorithm to produce more accurate clusters. For that we comprises of a O(n logn) heuristic method, based on sorting and partitioning the input data, for finding the centroids . Technology: Enhanced k-meansAlgorithm Usage : Accurate Clusters 6 SJDM06 Clustering with Multi-Viewpoint based Similarity Measure 2011 Description: Two criterion functions for document clustering are proposed based on this new measure. We compare them with several well-known similarity and dissimilarity with dataset from this we are Getting accurate cluster. Technology: Text mining Usage : Informative Assessment 7 SJDM07 Publishing Search Logs – A Comparative Study of Privacy Guarantees 2011 Description: We propose a k-anonymity in search log publishing. comparable utility to k−anonymity while at the same time it achieving much stronger privacy guarantee Technology: Security, integrity, and protection Usage : Probabilistic Privacy 8 SJDM08 Bin Rank: Scaling Dynamic Authority-Based Search Using 2011 Materialized Sub graphs Description: we shows Dynamic authority-based keyword search algorithms, such as Object Rank and personalized Page Rank, link information to provide high quality, high recall search in databases, and the Web. Technology: Object Rank Usage: High Quality Search Results 9 SJDM09 Asking Generalized Queries to Domain Experts to Improve Learning 2011 Description: we propose a novel active learning algorithm that asks good generalized queries. It improves the knowledge of domain experts. Technology: Generalized query Usage: Good Generalized Queries 10 SJDM10 Constrained Skyline Query Processing against Distributed Data Sites 2011 Description: We first propose a partition algorithm that divides all data sites into incomparable groups. We also implement multi filtering technique to improve the skyline query processes. Technology: Filtering Point Usage: Parallel Skyline Query Processing 11 SJDM11 Managing Multidimensional Historical Aggregate Data in 2011 Unstructured P2P Networks Description: In this project historical multidimensional data aggregates and supported by P2P-based framework which provides efficient and robust query evaluation. Technology: Data compression Usage : Extraction of Aggregates Fabsys Technologies Pvt.Ltd | 18 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 19. Skiveprojects 12 SJDM12 Knowledge-Based Interactive Post mining of Association Rules Using 2011 Ontologies Description: This paper proposes a prune and filter discovered rules. And it describes ontologies to improve the integration of user knowledge in the post processing. Technology: Data exploration and discovery Usage : Prune And Filter Rule 13 SJDM13 C-Trend : Temporal Cluster Graphs for Identifying and Visualizing 2011 Description: This paper introduces Cluster-based Temporal Representation of Event Data (C-TREND), that system implements dendogram algorithm for sorting. It takes very less time for sorting. Technology: Temporal Data Mining Usage : Discover Patterns IEEE TRANSACTION ON : NETWORK SECURITY Domain: Dot. Net S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SJNS01 Flexible Robust Group Key Agreement 2011 Description: We propose a novel 2-round group key agreement protocol .We show that the new protocol implies a fully-robust group key agreement with logarithmic-sized messages and expected round complexity close to 2 and finding random node faults. Technology: fault-tolerance Usage: Logarithmic-Sized Messages 2 SJNS02 Replica Placement for Route Diversity in Tree-Based Routing 2011 Distributed Hash Tables Description: Tree-based routing DHTs and define MAXDISJOINT, that creates route diversity for these DHTs. Using this We prove that this placement creates disjoint routes and find the replication degree necessary to produce a desired number of disjoint routes. Technology: Route Diversity Usage: Response Time Reduced 3 SJNS03 Design and Implementation of an Intrusion Response System for 2011 Relational Databases Description: we propose Joint Threshold Administration Model that efficiently searches the policy database for policies that match an anomalous request. This is used to overcoming the policy matching problem. Technology: Threshold signatures Usage: Specify Appropriate Response Fabsys Technologies Pvt.Ltd | 19 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 20. Skiveprojects 4 SJNS04 A Puzzle-Based Defense Strategy Against Flooding Attacks Using 2010 Game Theory Description: It describes the game theory to propose a series of optimal puzzle-based strategies for handling increasingly sophisticated flooding attack. Technology: Client-Puzzle Approach Usage : Handling Distributed Attacks 5 SJNS05 Layered Approach Using Conditional Random Fields for Intrusion 2010 Detection Description: We propose high attack detection accuracy that can be achieved by using Conditional Random Fields and high efficiency it show that our system is robust and is able to handle noisy data without compromising performance Technology: Decision trees Usage: Detect Malicious Activities 6 SJNS06 An Identity-Based Security System for User Privacy in Vehicular Ad 2010 Hoc Networks Description: We propose a privacy-preserving defense technique For network authorities to handle misbehavior in VANET access and it challenge that privacy provides avenue for misbehavior. Technology: Identity-Based Cryptography Usage: Privacy And Traceability IEEE TRANSACTION ON PARALLEL & DISTRIBUTED COMPUTING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SJP01 Joint Optimization of Complexity and Overhead for the Routing in 2011 Hierarchical Networks Description: We show that area-based link-vector algorithm (ALVA) which is used to analyze the routing complexity and the routing table size in the hierarchical network. Technology: Area-Based Link-Vector Usage: Find Best Routing Policy 2 SJP02 Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems(S) 2011 Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a sequential probability ratio test in Unstructured Peer-to-Peer Systems for finding anomaly intruder. Technology: Mutual Anonymity Usage: Achieving Anonymity Fabsys Technologies Pvt.Ltd | 20 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 21. Skiveprojects 3 SJP03 Cooperative Channelization in Wireless Networks with Network 2011 Coding Description: We propose cooperative channelization technique, this is used to find which portions of the transmission media are allocated to links which are congested at the point and where network coding cannot efficiently repair loss. Technology: Resource Reservation Usage: Reduce No of Transmissions 4 SJP04 Load Balance with Imperfect Information in Structured Peer-to- 2011 Peer Systems Description: We propose a novel load balancing algorithm it is used to estimate the probability distributions of the capacities of peers and the loads of virtual servers. Technology: Virtual Server Usage : Probability Distributions IEEE TRANSACTION ON: DISTRIBUTED NETWORKING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published Year 1 SJNW01 Energy-Efficient Protocol for Cooperative Networks 2011 Description: We propose a cooperative communication protocol, which is used to controlling traffic, and delay process. And we analyzed the robustness of the protocol to data packet loss. Technology: cooperative communication protocol Usage : Congestion Control 2 SJNW02 Parametric Methods for Anomaly Detection in Aggregate Traffic 2011 Description: We introduce the bi-variate Parametric Detection Mechanism (bPDM), which can detect anomalies and low-rate attacks in a few seconds. Technology: Bi-variate Parametric Detection Usage: Detect Network Anomalies 3 SJNW03 Self-Reconfigurable Wireless Mesh Networks 2011 Description: This paper presented an autonomous network reconfiguration system (ARS) that enables a multi-radio WMN to autonomously recover from wireless link failures. Technology: Cooperatively reconfiguration Usage: Preserve Network Performance Fabsys Technologies Pvt.Ltd | 21 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 22. Skiveprojects 4 SJNW04 Rumor Riding: Anonymzing Unstructured Peer-to-Peer Systems 2011 Description: The proposed bi variate Parametric Detection Mechanism (bPDM) uses a sequential probability ratio test for finding anomaly intruder. Technology: Mutual Anonymity Usage : To Achieve Anonymity 5 SJNW05 Joint Optimization of Complexity and Overhead for the Routing in 2011 Hierarchical Networks Description: We show that area-based link-vector algorithm (ALVA) which is used is to analyze the routing complexity and the routing table size in the hierarchical network. Technology: Area-based link-vector Usage: Find Best Routing Policy 6 SJNW06 Cooperative Channelization in Wireless Networks with Network 2011 Coding Description: We propose cooperative channelization, this is used to find which portions of the transmission media are allocated to links and which are congested at the point and where network coding cannot efficiently repair loss. Technology: Resource Reservation Usage : Reduce No of Transmissions 7 SJNW07 Load Balance with Imperfect Information in Structured Peer-to- 2011 Peer Systems Description: We propose a novel load balancing algorithm it is used to estimate the probability distributions of the capacities of peers and the loads of virtual servers Technology: Virtual Server Usage : Load-Balancing 8 SJNW08 Path Diversity Over Packet Switched Networks: Performance 2010 Analysis and Rate Allocation Description: In this paper, Forward Error Correction (FEC) is applied across multiple independent paths to enhance the end-to-end reliability. We prove that the probability of irrecoverable loss (PE) decays exponentially with the number of paths. Technology: Gilbert-Elliot channels Usage : End-To-End Reliability 9 SJNW09 Normalized queuing delay: congestion control jointly utilizing delay 2010 and marking Description: In this paper, we consider the design of a congestion control scheme and the concept of normalized queuing delay. Which is used to reduces the bottleneck problem. And controlling traffic congestion Technology: Network Calculus Usage : Congestion Measure Fabsys Technologies Pvt.Ltd | 22 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 23. Skiveprojects 10 SJNW10 Multiple Routing Configurations For Fast IP Network Recovery 2009 Description: we present a new recovery scheme called MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alter native output link immediately after the detection of a failure. Technology: Hop-by-Hop Forwarding Usage: Handle Link And Node Failures 11 SJNW11 Differentiated bandwidth allocation with TCP protection in core 2009 routers Description: We present an Active Queue Management (AQM) scheme. which draws a packet at random from the buffer, compares it with the arriving packet, and drops both if they are from the same flow. Technology: Active Queue Management (AQM) Usage : Flows In Same Priority 12 SJNW12 Node Isolation Model And Age-Based Neighbor Selection In 2009 Unstructured P2p Networks Description: we show that two age-biased neighbor-selection strategies, which dramatically reduces the probability of user isolation and graph partitioning compared with uniform selection of neighbors. Technology: Node isolation model Usage: Reduce Probability Of User Isolation 13 SJNW13 A Traffic Engineering Approach For Placement And Selection Of 2009 Network Services Description: We propose service placement problem which is used finding the best location for each service gateway, and selecting the best service gateway for each flow. Technology: Service gateway placement Usage : Minimize Traffic Flow 14 SJNW14 Dynamic Routing With Security Consideration 2009 Description: We proposing a dynamic routing algorithm such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks that could randomize delivery paths for data transmission. Technology: Security-enhanced data transmission Usage: Defeat Various Threats 15 SJNW15 Colored Tree 2009 Description: We show through extensive simulations that the average length of the disjoint paths obtained using the SimCT algorithm is lesser compared to the previously known techniques. Technology: SimCT algorithm Usage: Minimize Cost Of Routing  You Can Register project free at skiveprojects.com Technical Assistance any time @ 9176990090 Fabsys Technologies Pvt.Ltd | 23 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 24. Skiveprojects IEEE TRANSACTION ON: IMAGE PROCESSING Domain: JAVA S.NO CODE PROJECT TITLES & DESCRIPTION Published year 1 SJIP01 Graph Cuts for Curvature Based Image Denoising Description: we will present an efficient minimization algorithm based on graph cuts 2011 for minimizing the energy in the Euler’s elastic model which is used to minimizing the staircase effects. Technology: Binary MRF models Usage :Image Denoising 2. SJIP02 Image Denoising in Mixed Poisson–Gaussian Noise Description: We propose a general Technology (PURE-LET) to design and optimize a 2011 wide class of transform domain thresholding algorithms for denoising images corrupted by mixed Poisson-Gaussian noise. Technology: Linear expansion of thresholds Usage : Image Denoising 3 SJIP03 Practical Bounds on Image Denoising: From Estimation to Information Description: We show that the, cluster co variances and level of redundancy for 2011 patches in the image, can be estimated directly from the noise corrupted image. Technology: Shannon entropy Usage : Noise-Free Image 4 SJIP04 From Tiger to Panda: Animal Head Detection 2011 Description: we proposed two detection algorithms, namely Brute force detection and Deformable detection for capture the shape and texture features on animal head. Technology: Fusion Usage: Animal Head Detection 5 SJIP05 On High-Order Denoising Models and Fast Algorithms for Vector- Valued Images Description: we introduce three high-order and curvature-based model and a fast multi 2010 grid algorithm which proves image denosing calculation. And removes staircase effects. Technology: partial differential equations(PDEs) Usage :Vector Denoising 6 SJIP06 A Perceptually Relevant Approach to Ringing Region Detection Description: The proposed ringing regions detection method which is used to show 2010 the ringing regions resulting images in psycho visual experiment Technology: Luminance masking Usage : Automatic Detection Fabsys Technologies Pvt.Ltd | 24 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 25. Skiveprojects NETWORK SIMULATOR (NS2) TITLES IEEE TRANSACTION ON: NS2 - NETWORK SIMULATOR Domain: NS2 S.NO CODE PROJECT TITLES Published year 1. S11NS01 Secure Trust Management Model for Peer-to-Peer File Sharing System 2011 2. S11NS02 Channel-Aware Routing in MANETs With Route Handoff 2011 3. S11NS03 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2011 4. S11NS04 ConverSS: A Hybrid MAC/Routing Solution for Small-Scale, 2011 Convergecast Wireless Networks 5. S11NS05 Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks 2011 Using SVM and FDA 6. S11NS06 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2011 Networks 7. S11NS07 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc 2010 Networks 8. S11NS08 Trust Management in Mobile Ad Hoc Networks Using a Scalable 2010 Maturity-Based Model 9. S11NS09 Channel Assignment for Multihop Cellular Networks: Minimum Delay 2010  Training provided by experienced IT Professionals.  Own Concepts can be developed in NS2 Fabsys Technologies Pvt.Ltd | 25 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 26. Skiveprojects APPLICATION PROJECT TITLES Web and Windows Application: DOT NET REALTIME APPLICATION PROJECT TITLES S.No CODE PROJECT TITLES LANGUAGE 1 SDAP01 An Intelligent tutoring system with web enhanced training Dotnet assessments 2 SDAP02 Role Engineering via role based access control Dotnet 3 SDAP03 A Relation-Based Page Ranking in Web Search Engines Dotnet 4 SDAP04 Database Enterprise Manager Dotnet 5 SDAP05 Online Bug tracking System Dotnet 6 SDAP06 Trace back of DoS Attacks using Entropy Variations Dotnet 7 SDAP07 A new steganographic method based on information sharing via Dotnet PNG images 8 SDAP08 Step Construction of Visual Cryptography Schemes (VCS) Dotnet 9 SDAP09 Efficient Compression of Encrypted Grayscale Images Dotnet 10 SDAP10 Latent Fingerprint Matching Dotnet 11 SDAP11 Online Data leakage detection Dotnet 12 SDAP12 Online Buying and Selling System. Dotnet 13 SDAP13 Secure Mobile health care for rural with electronic alerts Dotnet 14 SDAP14 Southern Railway Recruitment Portal Dotnet 15 SDAP15 Web-based Recruitment Process System for the HR group for a Dotnet company 16 SDAP16 Fast firewall implementations for software and hardware-based Dotnet routers Fabsys Technologies Pvt.Ltd | 26 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 27. Skiveprojects 17 SDAP17 File Replication Detection Algorithm in P2P File Sharing Systems Dotnet 18 SDAP18 Dynamic Routing Topology with Security Consideration Dotnet/Java 19 SDAP19 Incentive-Based Scheduling for Market-Like Computational Grids Dotnet 20 SDAP20 Approximate query processing in peer to peer networks Dotnet 21 SDAP21 XML Based Ranking and Keyword Search Dotnet 22 SDAP22 Secured Data Object Replication in data grid Dotnet 23 SDAP23 Medical Anonymity Processing And Publishing Dotnet 24 SDAP24 Object Tracking System Dotnet 25 SDAP25 Secure Data Transformation System Dotnet 26 SDAP26 Effective blogger with XML interchange Dotnet 27 SDAP27 Alert based monitoring and scheduling on Proportional shares Dotnet 28 SDAP28 Exact Knowledge hiding for automobiles industry Dotnet 29 SDAP29 Efficient Property Interpreter Dotnet 30 SDAP30 Blind Banking Transformation System Dotnet 31 SDAP31 Security and Privacy for Social Networks. Dotnet 32 SDAP32 Still to animation movie creation Dotnet 33 SDAP33 Medical anonymity processing and publishing Dotnet 34 SDAP34 Global roaming and target tracking in mobile sensor network Dotnet 35 SDAP35 Development Of A Campaign Information System Dotnet 36 SDAP36 Perspective Access Management Dotnet 37 SDAP37 Email Proxy Server with Secure Service Dotnet 38 SDAP38 Online Bus Ticket Booking Dotnet 39 SDAP39 Dotnet Customer Relationship Management Fabsys Technologies Pvt.Ltd | 27 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 28. Skiveprojects APPLICATION PROJECT TITLES Web and Windows Application: JAVA REALTIME APPLICATION PROJECT TITLES DOMAIN: JAVA S.NO CODE PROJECT TITLES DOMAIN 1 SJAP Normalized queuing delay: congestion control jointly utilizing Java delay and marking 2 SJAP Distributed Algorithm for Minimum path Java 3 SJAP Path Diversity for packets Java 4 SJAP Node isolation model and age-based neighbor selection in Java unstructured p2p networks 5 SJAP An Identity-Based Security System for User Privacy in Vehicular Java Ad Hoc Networks 6 SJAP Layered Approach Using Conditional Random Fields for Intrusion Java Detection. 7 SJAP A Puzzle based defense strategy against flooding attacks using Java game theory 8 SJAP Adaptive Join Operators for Result Rate Optimization on Java Streaming Inputs 9 SJAP Bin Rank: Scaling Dynamic Authority-Based Search Using Java Materialized Sub graphs Fabsys Technologies Pvt.Ltd | 28 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software
  • 29. Skiveprojects 10 SJAP NNexus: An automatic linker for collaborative web based corpora Java 11 SJAP SSUM: Smart Server Update Mechanism for Maintaining Cache Java Consistency in Mobile Environments 12 SJAP CAR: context aware adaptive routing for delay tolerant mobile Java networks 13 SJAP Generic Loss Less Watermarking Java 14 SJAP Unseen Visible Water Marking Java 15 SJAP Colored tree Java 16 SJAP QKDP: Provably secured third party authenticated quantum key Java distribution protocol 17 SJAP Controlling IP spoofing through inter-domain packet filters Java 18 SJAP A service centric multicast architecture and routing protocol Java 19 SJAP Enhancing search performance in unstructured p2p networks Java based on users’ common interest 20 SJAP Two Techniques for Fast computation of constrained shortest path Java For Application Project Description, visit Skiveprojects.com!! Get free Project Explanation @ 9176990090, 044-42712737 Fabsys Technologies Pvt.Ltd | 29 Training Office: #34/6, Avvaiyar Street, Ambalnagar, Ekkaduthangal, Guindy, Chennai-32.Ph:9176990090, 044-42712737 E-Mail: skiverojects@gmail.com, For more title and abstracts visit www.skiveprojects.com IEEE Projects –Software