You are on page 1of 18

www.edujobnew s.

com
B.TECH PROJECTS LIST 2013
Knowledge and Data Engineering
Sl.No 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Project Title Anonymous Qury Processing in Road Networks Closing the Loop in Webpage Understanding Closeness: A New Privacy Measure for Data Publishing Deriving Concept-Based User Profiles from Search Engine Logs False Negative Problem of Counting Bloom Filter Filtering Data Streams for Entity-Based Continuous Queries Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks Incremental and General Evaluation of Reverse Nearest Neighbors Incremental Evaluation of Visible Nearest Neighbor Queries Logic-Based Pattern Discovery Learning with Positive and Unlabeled Examples Using Topic-Sensitive PLSA LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Projective Distribution of XQuery with Updates Ranked Query Processing in Uncertain Databases Record Matching over Query Results from Multiple Web Databases The Dynamic Bloom Filters The Tiled Bitmap Forensic Analysis Algorithm Towards an Effective XML Keyword Search ViDE: A Vision-Based Approach for Deep Web Data Extraction
1

Year 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
21. 22. 23. 24. 25. 26. 27. 28. 29. 30. XCDSearch: An XML Context-Driven Search Engine Interactive Correction And Recommendation For Computer Language Learning And Training Learning Image-Text Associations A Relation-Based Page Rank Algorithm For Semantic Web Search Engines English To Spanish Translation Of Signboard Images From Mobile Phone Camera GLIP: A Concurrency Control Protocol For Clipping Indexing Histogram-Based Global Load Balancing In Structured Peer-To-Peer Systems A Generic Local Algorithm For Mining Data Streams Predicting Missing Items In Shopping Carts Distributional Features For Text Categorization 2013 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA

www.edujobnew s.com
B.TECH PROJECTS LIST 2013

Mobile Computing
Sl.No 1. 2. Project Title A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks A Multichannel Scheduler for High-Speed Wireless Backhaul Links with Packet Concatenation BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks Distributed Localization Scheme for Mobile Sensor Networks Energy-Efficient Reprogramming of a Swarm of Mobile Sensors Energy-Efficient VoIP over Wireless LANs Efficient Load-Aware Routing Scheme for Wireless Mesh Networks Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
3

Year 2013 2013

3. 4. 5. 6. 7. 8.

2013 2013 2013 2013/.NET 2013 2013

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
9. 10. Fault-Tolerant Relay Node Placement in Heterogeneous WSN Joint Routing, Channel Assignment, and Scheduling for Throughput Maximization in General Interference Models Local Barrier Coverage in Wireless Sensor Networks MABS: Multicast Authentication Based on Batch Signature Maximizing the Lifetime of Wireless Sensor Networks with Mobile Sink in Delay-Tolerant Applications Radio Tomographic Imaging with Wireless Networks Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Message Authentication In Computationally Constrained Environment Biased Random Walks in Uniform Wireless Networks Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period Greedy Routing with Anti-Void Traversal for WSN On the Security of Route Discovery in MANETs Route Stability in MANETs under the Random Direction Mobility Model Multicasting With Localized Control In Wireless Ad Hoc Networks A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice Localized Sensor Area Coverage with Low Communication Overhead Efficient Resource Allocation For Wireless Multicast A Gen2 Based RFID Authentication Protocol for Security and Privacy
4

2013 2013

11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27.

2013 2013/JAVA 2013 2013 2013 2013 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
28. 29. 30. 31. Intrusion Detection In Homogeneous and Heterogeneous WSN PDCS: Security And Privacy Support For Data-Centric Sensor Networks Efficient Broadcasting In Mobile Ad Hoc Networks SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA

Networking

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Sl.No 1. 2. Project Title Always Acyclic Distributed Path Computation Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols Multiple Routing Configurations For Fast IP Network Recovery Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks Aggregation With Fragment Retransmission For Very High-Speed WLANS A Traffic Engineering Approach For Placement And Selection Of Network Services A Distributed and Scalable Routing Table Manager Efficient Routing in Intermittently Connected Mobile Networks The Multiple copy Case Monitoring the Application-Layer DDoS Attacks for Popular Websites Capturing Router Congestion and Delay Multiple Routing Configuration For Fast IP Network Recovery(Networking) Minimizing file downloading time in stochastic peer to peer networks(Networking) Year 2013 2013 3. 4. 5. 2013/.NET 2013/.NET 2013/.NET

6. 7. 8. 9. 10. 11. 12. 13. 14. 15.

2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Dependable and Secure Computing
Sl.No 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Project Title A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis A Survey on the Encryption of Convergecast Traffic with In-Network Processing An Advanced Hybrid Peer-to-Peer Botnet Conformance Testing of Temporal Role-Based Access Control Systems Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services Layered Approach Using Conditional Random Fields for Intrusion Detection On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures On the Thermal Attack in Instruction Caches Opportunities in White-Box Cryptography Secure Data Objects Replication in Data Grid Shifting Inference Control to User Side: Architecture and Protocol SigFree: A Signature-Free Buffer Overflow Attack Blocker
7

Year 2013/.NET 2013 2013/.NET 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
16. 17. 18. 19. 20. Using Web-Referral Architectures to Mitigate Denial-ofService Threat The Effectiveness of Checksums for Embedded Control Networks Credit card fraud detection using hidden Markov model Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing Cryptanalysis Of A Generalized Ring Signature Scheme Security In Open Source Web Content Management Systems 2013 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA

Securit 21. Analysis of the SASI Protocol 22. 23.

www.edujobnew s.com
B.TECH PROJECTS LIST 2013

Software Engineering
Sl.No 1. 2. 3. 4. 5. Project Title A Framework for Programming Robust Context-Aware Applications An Experience in Testing the Security of Real-World Electronic Voting Systems An Attack Surface Metric Better Debugging via Output Tracing and CallstackSensitive Slicing DECOR: A Method for the Specification and Detection of
9

Year 2013 2013 2013 2013 2013/.NET

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Code and Design Smells 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Discovering Services during Service-Based System Design Using UML Exception Handling Patterns for Process Modeling Exception Handling for Repair in Service-Based Processes Learning Communicating Automata from MSCs Program Behavior Discovery and Verification: A Graph Grammar Approach On Event-Based Middleware for Location-Aware Mobile Applications The Effects of Time Constraints on Test Case Prioritization: A Series of Controlled Experiments Vulnerability Discovery with Attack Injection What Makes a Good Bug Report? A Modified Model for Private Data Security Facing Ecommerce Optimized Resource Allocation For Software Release Planning NDT A Model-Driven Approach CHARMY: A Framework for Designing and Verifying Architectural Specifications 2013/JAVA 2013/JAVA 2013 2013 2013 2013 2013 2013 2013 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA

Parallel and Distributed Systems


Sl.No Project Title
10

Year

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. Anchor-Free Localization through Flip-Error-Resistant Map Stitching in Wireless Sensor Network A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation An Analytical Approach to Optimizing Parallel Image Registration/Retrieval Cooperative Secondary Authorization Recycling Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems Improving Reliability for Application-Layer Multicast Overlays Optimal Resource Placement in Structured Peer-to-Peer Networks Predictable High Performance Computing using Feedback Control and Admission Control Robust Load Delegation in Service Grid Environments Secure Synchronization of Periodic Updates in Ad Hoc Networks SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther? pFusion: A P2P Architecture for Internet-Scale ContentBased Search and Retrieval Dynamic routing with security considerations
11

2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013

17. 18.

2013/.NET 2013/JAVA

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
19. 20. 21. 22. 23. FDPM: An IP Trace back system to find the real source of attacks Distributed algorithms for constructing approximate minimum spanning trees in WSN Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures Detecting Malicious Packet Losses Dynamic Search Algorithm In Unstructured Peer-ToPeer Networks 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA

12

www.edujobnew s.com
B.TECH PROJECTS LIST 2013

Pattern Analysis and Machine Intelligence


Sl.No 1. 2. 3. 4. 5. 6. 7. 8. 9. Project Title Local-Learning-Based Feature Selection for HighDimensional Data Analysis Object Detection with Discriminatively Trained PartBased Models Online Empirical Evaluation of Tracking Algorithms Range Flow in Varying Illumination: Algorithms and Comparisons Resolution Enhancement in Multi-Image Stereo Stereo Matching with Mumford-Shah Regularization and Occlusion Handling Survey of Pedestrian Detection for Advanced Driver Assistance Systems Adaptive Multi versioning for Open MP parallelization via machine Learning Medical Data Mining Using BGA & RGA For Weighting Of Features In Fuzzy K-NN Classification
13

Year 2013 2013 2013 2013 2013 2013 2013 2013/.NET 2013/JAVA

www.edujobnew s.com
B.TECH PROJECTS LIST 2013

Computers
Sl.No 1. 2. 3. Project Title A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem A Study of k-Coverage and Measures of Connectivity in 3D WSN Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks Year 2013 2013 2013

14

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
4. 5. 6. 7. 8. Algorithmic Aspects of Hardware/Software Partitioning: 1D Search Algorithms An Interleaving Structure for Guaranteed QoS in RealTime Broadcasting Systems An Optimal Encoding to Represent a Single Set in an ROBDD Authenticated Group Key Transfer Protocol Based on Secret Sharing An Application-Level Data Transparent Authentication Scheme without Communication Overhead Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks Design and Analysis of On-Chip Networks for Large-Scale Cache Systems Efficient Microarchitectural Vulnerabilities Prediction Using Boosted Regression Trees and Patient Rule Inductions Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls PERFECTORY: A Fault-Tolerant Directory Memory Architecture Predictive Temperature-Aware DVFS Secure and Efficient Broadcast Authentication in WSN Trade-Offs between Latency, Complexity, and Load Balancing with Multicast Algorithms 2013 2013 2013 2013 2013

9. 10. 11. 12.

2013 2013 2013 2013

13. 14. 15. 16. 17.

2013 2013 2013 2013 2013

Learning Technologies
Sl.No 1. Project Title Deploying a Wearable Computing Platform for
15

Year 2013

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Computing Education 2. 3. 4. 5. Mobile Learning in School Contexts: Can Teachers Alone Make It Happen? To Flow and Not to Freeze: Applying Flow Experience to Mobile Learning An Enhanced Ant Colony Optimization Applied to Capacitated Vehicle Routing Problem Information System Of Relay Protection For Fault Record Analysis 2013 2013 2013/.NET 2013/JAVA

16

www.edujobnew s.com
B.TECH PROJECTS LIST 2013

Sl.N o 1.

Project Title Network Coding-Based Protection of Many-to-One Wireless Flows Increasing Packet Delivery in Ad Hoc On-Demand Distance Vector Routing Protocol Coding Documents using Alternative Techniques Investigating Accuracies of Rule Evaluation Models on Randomized Labeling Protection of Database Security via Collaborative Inference Detection Applying Data Mining in Prediction and Classification of Urban Traffic A text clustering framework for information retrieval
17

Domain Wireless Communications Wireless Communications

Year 2013/.NET

2.

2013/JAVA

3. 4.

Cryptography Granular Computing Knowledge Discovery and Data Mining Computer Science & Information Engg. Information Assurance and

2013/.NET 2013/.NET

5.

2013/JAVA

6.

2013/JAVA

7.

2013/JAVA

www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Security 8. Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontology End-to-End Service Support for Mashups Information Technology in Biomedicine Services Computing Affective Computing 2013/JAVA 9. 2013 2013

10. Affect Detection: Interdisciplinary Review of Models, Methods, and Their Applications 11. Predictive Network Anomaly Detection and Visualization 12. Providing Witness Anonymity Under Peer-toPeer Settings

Information Forensics and Security Information Forensics and Security

2013

2013

18

You might also like