You are on page 1of 4

IEEE/NON- IEEE 2012-2013 FINAL YEAR ACADEMIC PROJECT TITLES Sno Project Title Tech Java Java Java

Java Java Java Java Java Java

MOBILE COMPUTING
1 OMAN: A Mobile Ad Hoc Network Design System Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over 2 Wireless Networks 3 Approximation Algorithms for Data Broadcast in Wireless Networks 4 Stateless Multicast Protocol for Ad Hoc Networks 5 Converge-Cast On the Capacity and Delay Tradeoffs 6 Positional Accuracy Measurement and Error Modeling for Mobile Tracking 7 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip 8 Lines 9 Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks

10 SenseLess: A Database-Driven White Spaces Network Java 11 MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet Java 12 Shaping Throughput Profiles in Multihop Wireless Networks: A Resource Biasing Approach Java 13 Stateless Multicast Protocol for Ad Hoc Networks Java 14 Towards Privacy Preserving and Collusion Resistance in Location Proof Updating System Java Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in 15 Java Vehicular Ad Hoc Networks Characterizing the Security Implications of Third-Party Emergency Alert Systems over 16 Java Cellular Text Messaging Services A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random 17 Java Access 18 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation Java 19 Scalable Activity-Travel Pattern Monitoring Framework for Large-Scale City Environment Java 20 Network Coding in Cooperative Communications: Friend or Foe? Java 21 Local Greedy Approximation for Scheduling in Multi-hop Wireless Networks Java

KNOWLEDGE AND DATA ENGINEERING Java with Multi-Viewpoint based Similarity Measure 2 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Java 3 A Look-Ahead Approach to Secure Multiparty Protocols Java 4 Effective Pattern Discovery for Text Mining Java Efficient Computation of Range Aggregates against Uncertain Location-Based 5 Java Queries 6 Continuous Detour Queries in Spatial Networks Java 7 Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks Java 8 Topic Mining over Asynchronous Text Sequences Java 9 Answering General Time-Sensitive Queries Java 10 On the Spectral Characterization and Scalable Mining of Network Communities Java 11 Outsourced Similarity Search on Metric Data Assets Java 12 A Probabilistic Scheme for Keyword-Based Incremental Query Construction Java 13 Measuring the Sky On Computing Data Cubes via Skylining the Measures Java
1 Clustering #227, II Floor, Kutchery Road, Mylapore, Chennai-600 004, INDIA (Landmark: Next to Dinakaran Newspaper Office and Above Menaka Cards). Ph:044-24612144, +91-9884715673, Email: admn.bliss@gmail.com, projects@eblisstechnologies.in Website: www.eblisstechnologies.in

14 Publishing

Search LogsA Comparative Study of Privacy Guarantees 15 Resilient Identity Crime Detection 16 Slicing A New Approach for Privacy Preserving Data Publishing Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain 18 Scalable Learning of Collective Behavior 19 Scalable Scheduling of Updates in Streaming Data Warehouses 20 Visual Role Mining: A Picture Is Worth a Thousand Roles 21 Weakly Supervised Joint Sentiment-Topic Detection from Text 22 The Move-Split-Merge Metric for Time Series 23 Distributed Strategies for Mining Outliers in Large Data Sets 24 On Similarity Preserving Feature Selection NETWORKING
17 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2 Resource-aware Video Multicasting via Access Gateways in Wireless Mesh Networks 3 Optimal Source-Based Filtering of Malicious Traffic 4 Efficient Error Estimating Coding: Feasibility and Applications 5 Latency Equalization as a New Network Service Primitive 6 Generic and Automatic Address Configuration for Data Center Networks 7 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks 8 Distributed Beamforming for Multi-group Multicasting Relay Networks 9 Throughput and Energy Efficiency in Wireless Ad Hoc Networks with Gaussian Channels 10 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 11 SLAW: Self-Similar Least-Action Human Walk 12 A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks

Java Java Java Java Java Java Java Java Java Java

Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java

INFORMATION FORENSICS AND SECURITY 1 Mitigating Routing Misbehavior in Disruption Tolerant Networks 2 Ensemble Classifiers for Steganalysis of Digital Media HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access 3 Control in Cloud Computing 4 Feature Band Selection for Multispectral Palmprint Recognition 5 Secure Data Aggregation in Wireless Sensor Networks 6 Dictionary-Based Face Recognition Under Variable Lighting and Pose 7 Detecting Software Theft in Embedded Systems: A Side-Channel Approach 8 Learning for Metar Rcognition 9 Indirect Reciprocity Security Game for Large-Scale Wireless Networks
10 11

IMAGE PROCESSING
1 Learn to Personalized Image Search from the Photo Sharing Websites 2 Reduced-Reference Image Quality Assessment by Structural Similarity Estimation 3 Modeling the Performance of Image Restoration From Motion Blur #227, II Floor, Kutchery Road, Mylapore, Chennai-600 004, INDIA (Landmark: Next to Dinakaran Newspaper Office and Above Menaka Cards). Ph:044-24612144, +91-9884715673, Email: admn.bliss@gmail.com, projects@eblisstechnologies.in Website: www.eblisstechnologies.in Java Java Java

4 Feature

Band Selection for Multispectral Palmprint Recognition 5 Secure Data Aggregation in Wireless Sensor Networks 6 Dictionary-Based Face Recognition Under Variable Lighting and Pose 7 Detecting Software Theft in Embedded Systems: A Side-Channel Approach 8 Learning for Metar Rcognition 9 Indirect Reciprocity Security Game for Large-Scale Wireless Networks
10 Variable Length Open Contour Tracking Using a Deformable Trellis

Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java Java

DEPENDABLE AND SECURE COMPUTING


1 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 2 ELMO: Energy Aware Local Monitoring in Sensor Networks 3 Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition 4 Packet-Hiding Methods for Preventing Selective Jamming Attacks

Defenses against Large-Scale Online Password Guessing Attacks 6 Automatic Reconfiguration for Large-Scale Reliable Storage Systems 7 Data-Provenance Verification For Secure Hosts Persuasive Cued Click-Points: Design, implementation, and evaluation of a 8 knowledge-based authentication mechanism 9 Risk-Aware Mitigation for MANET Routing Attacks Secured Trust: A Dynamic Trust Computation Model for Secured Communication 10 in Multiagent Systems 11 Detecting and Resolving Firewall Policy Anomalies 12 M-Score: A Misuseability Weight Measure On the Security of a Ticket-Based Anonymity System with Traceability Property in 13 Wireless Mesh Networks 14 Incentive Compatible Privacy-Preserving Distributed Classification PARALLEL AND DISTRIBUTED SYSTEMS 1 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs 2 Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks 3 Privacy in VoIP Networks: Flow Analysis Attacks and Defense Fingerprinting Mobile User Positions in Sensor Networks: Attacks and 4 Countermeasures 5 Distributed Privacy-Preserving Access Control in Sensor Networks Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud 6 Data 7 Capacity of Data Collection in Arbitrary Wireless Sensor Networks 8 An Efficient Prediction-Based Routing in Disruption-Tolerant Networks BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering 9 Injected False Data in Wireless Sensor Networks 10 Payments for Outsourced Computations 11 User-Level Implementations of Read-Copy Update
#227, II Floor, Kutchery Road, Mylapore, Chennai-600 004, INDIA (Landmark: Next to Dinakaran Newspaper Office and Above Menaka Cards). Ph:044-24612144, +91-9884715673, Email: admn.bliss@gmail.com, projects@eblisstechnologies.in Website: www.eblisstechnologies.in

5 Revisiting

Java Java Java Java Java Java Java Java Java Java Java

MULTIMEDIA
1 Optimal Bandwidth Assignment for Multiple-Description-Coded Video 2 Optimizing Multi-rate Peer-to-Peer Video Conferencing Applications Java Java

NON-IEEE/REAL TIME APPLICATIONS 2012


Note: All the projects below will have a best solution to the recent industry related problems 1 An enhanced Social Community Website 2 An innovated Virtual Keyboard for Physically Disabled Person 3 An Web based application for skills recommendation 4 On Selfish Routing 5 An Effective CRM Application for Manufacturing Companies 6 Generating User Browsing History for Future Use 7 Expert Recommendation 8 A system for prioritizing use cases and activity diagrams 9 Solution for Web Confidential Data 10 An innovative Athelete Recommendation System 11 Detecting Website Duplication 12 A Bit-Plane Stegnography 13 An effective Job Allocation System J2EE Java J2EE Java J2EE Java Java Java J2EE Java Java Java Java

#227, II Floor, Kutchery Road, Mylapore, Chennai-600 004, INDIA (Landmark: Next to Dinakaran Newspaper Office and Above Menaka Cards). Ph:044-24612144, +91-9884715673, Email: admn.bliss@gmail.com, projects@eblisstechnologies.in Website: www.eblisstechnologies.in

You might also like