Professional Documents
Culture Documents
com
B.TECH PROJECTS LIST 2013
Knowledge and Data Engineering
Sl.No 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Project Title Anonymous Qury Processing in Road Networks Closing the Loop in Webpage Understanding Closeness: A New Privacy Measure for Data Publishing Deriving Concept-Based User Profiles from Search Engine Logs False Negative Problem of Counting Bloom Filter Filtering Data Streams for Entity-Based Continuous Queries Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks Incremental and General Evaluation of Reverse Nearest Neighbors Incremental Evaluation of Visible Nearest Neighbor Queries Logic-Based Pattern Discovery Learning with Positive and Unlabeled Examples Using Topic-Sensitive PLSA LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Projective Distribution of XQuery with Updates Ranked Query Processing in Uncertain Databases Record Matching over Query Results from Multiple Web Databases The Dynamic Bloom Filters The Tiled Bitmap Forensic Analysis Algorithm Towards an Effective XML Keyword Search ViDE: A Vision-Based Approach for Deep Web Data Extraction
1
Year 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
21. 22. 23. 24. 25. 26. 27. 28. 29. 30. XCDSearch: An XML Context-Driven Search Engine Interactive Correction And Recommendation For Computer Language Learning And Training Learning Image-Text Associations A Relation-Based Page Rank Algorithm For Semantic Web Search Engines English To Spanish Translation Of Signboard Images From Mobile Phone Camera GLIP: A Concurrency Control Protocol For Clipping Indexing Histogram-Based Global Load Balancing In Structured Peer-To-Peer Systems A Generic Local Algorithm For Mining Data Streams Predicting Missing Items In Shopping Carts Distributional Features For Text Categorization 2013 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Mobile Computing
Sl.No 1. 2. Project Title A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks A Multichannel Scheduler for High-Speed Wireless Backhaul Links with Packet Concatenation BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks Distributed Localization Scheme for Mobile Sensor Networks Energy-Efficient Reprogramming of a Swarm of Mobile Sensors Energy-Efficient VoIP over Wireless LANs Efficient Load-Aware Routing Scheme for Wireless Mesh Networks Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
3
3. 4. 5. 6. 7. 8.
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
9. 10. Fault-Tolerant Relay Node Placement in Heterogeneous WSN Joint Routing, Channel Assignment, and Scheduling for Throughput Maximization in General Interference Models Local Barrier Coverage in Wireless Sensor Networks MABS: Multicast Authentication Based on Batch Signature Maximizing the Lifetime of Wireless Sensor Networks with Mobile Sink in Delay-Tolerant Applications Radio Tomographic Imaging with Wireless Networks Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Message Authentication In Computationally Constrained Environment Biased Random Walks in Uniform Wireless Networks Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period Greedy Routing with Anti-Void Traversal for WSN On the Security of Route Discovery in MANETs Route Stability in MANETs under the Random Direction Mobility Model Multicasting With Localized Control In Wireless Ad Hoc Networks A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice Localized Sensor Area Coverage with Low Communication Overhead Efficient Resource Allocation For Wireless Multicast A Gen2 Based RFID Authentication Protocol for Security and Privacy
4
2013 2013
11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27.
2013 2013/JAVA 2013 2013 2013 2013 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
28. 29. 30. 31. Intrusion Detection In Homogeneous and Heterogeneous WSN PDCS: Security And Privacy Support For Data-Centric Sensor Networks Efficient Broadcasting In Mobile Ad Hoc Networks SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA
Networking
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Sl.No 1. 2. Project Title Always Acyclic Distributed Path Computation Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols Multiple Routing Configurations For Fast IP Network Recovery Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks Aggregation With Fragment Retransmission For Very High-Speed WLANS A Traffic Engineering Approach For Placement And Selection Of Network Services A Distributed and Scalable Routing Table Manager Efficient Routing in Intermittently Connected Mobile Networks The Multiple copy Case Monitoring the Application-Layer DDoS Attacks for Popular Websites Capturing Router Congestion and Delay Multiple Routing Configuration For Fast IP Network Recovery(Networking) Minimizing file downloading time in stochastic peer to peer networks(Networking) Year 2013 2013 3. 4. 5. 2013/.NET 2013/.NET 2013/.NET
2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Dependable and Secure Computing
Sl.No 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Project Title A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory A Rigorous, Compositional, and Extensible Framework for Dynamic Fault Tree Analysis A Survey on the Encryption of Convergecast Traffic with In-Network Processing An Advanced Hybrid Peer-to-Peer Botnet Conformance Testing of Temporal Role-Based Access Control Systems Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services Layered Approach Using Conditional Random Fields for Intrusion Detection On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures On the Thermal Attack in Instruction Caches Opportunities in White-Box Cryptography Secure Data Objects Replication in Data Grid Shifting Inference Control to User Side: Architecture and Protocol SigFree: A Signature-Free Buffer Overflow Attack Blocker
7
Year 2013/.NET 2013 2013/.NET 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
16. 17. 18. 19. 20. Using Web-Referral Architectures to Mitigate Denial-ofService Threat The Effectiveness of Checksums for Embedded Control Networks Credit card fraud detection using hidden Markov model Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing Cryptanalysis Of A Generalized Ring Signature Scheme Security In Open Source Web Content Management Systems 2013 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Software Engineering
Sl.No 1. 2. 3. 4. 5. Project Title A Framework for Programming Robust Context-Aware Applications An Experience in Testing the Security of Real-World Electronic Voting Systems An Attack Surface Metric Better Debugging via Output Tracing and CallstackSensitive Slicing DECOR: A Method for the Specification and Detection of
9
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Code and Design Smells 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Discovering Services during Service-Based System Design Using UML Exception Handling Patterns for Process Modeling Exception Handling for Repair in Service-Based Processes Learning Communicating Automata from MSCs Program Behavior Discovery and Verification: A Graph Grammar Approach On Event-Based Middleware for Location-Aware Mobile Applications The Effects of Time Constraints on Test Case Prioritization: A Series of Controlled Experiments Vulnerability Discovery with Attack Injection What Makes a Good Bug Report? A Modified Model for Private Data Security Facing Ecommerce Optimized Resource Allocation For Software Release Planning NDT A Model-Driven Approach CHARMY: A Framework for Designing and Verifying Architectural Specifications 2013/JAVA 2013/JAVA 2013 2013 2013 2013 2013 2013 2013 2013/.NET 2013/.NET 2013/JAVA 2013/JAVA
Year
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. Anchor-Free Localization through Flip-Error-Resistant Map Stitching in Wireless Sensor Network A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation An Analytical Approach to Optimizing Parallel Image Registration/Retrieval Cooperative Secondary Authorization Recycling Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems Improving Reliability for Application-Layer Multicast Overlays Optimal Resource Placement in Structured Peer-to-Peer Networks Predictable High Performance Computing using Feedback Control and Admission Control Robust Load Delegation in Service Grid Environments Secure Synchronization of Periodic Updates in Ad Hoc Networks SocioNet: A Social-Based Multimedia Access System for Unstructured P2P Networks Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther? pFusion: A P2P Architecture for Internet-Scale ContentBased Search and Retrieval Dynamic routing with security considerations
11
2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013 2013
17. 18.
2013/.NET 2013/JAVA
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
19. 20. 21. 22. 23. FDPM: An IP Trace back system to find the real source of attacks Distributed algorithms for constructing approximate minimum spanning trees in WSN Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures Detecting Malicious Packet Losses Dynamic Search Algorithm In Unstructured Peer-ToPeer Networks 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA 2013/JAVA
12
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Year 2013 2013 2013 2013 2013 2013 2013 2013/.NET 2013/JAVA
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Computers
Sl.No 1. 2. 3. Project Title A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem A Study of k-Coverage and Measures of Connectivity in 3D WSN Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks Year 2013 2013 2013
14
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
4. 5. 6. 7. 8. Algorithmic Aspects of Hardware/Software Partitioning: 1D Search Algorithms An Interleaving Structure for Guaranteed QoS in RealTime Broadcasting Systems An Optimal Encoding to Represent a Single Set in an ROBDD Authenticated Group Key Transfer Protocol Based on Secret Sharing An Application-Level Data Transparent Authentication Scheme without Communication Overhead Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks Design and Analysis of On-Chip Networks for Large-Scale Cache Systems Efficient Microarchitectural Vulnerabilities Prediction Using Boosted Regression Trees and Patient Rule Inductions Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls PERFECTORY: A Fault-Tolerant Directory Memory Architecture Predictive Temperature-Aware DVFS Secure and Efficient Broadcast Authentication in WSN Trade-Offs between Latency, Complexity, and Load Balancing with Multicast Algorithms 2013 2013 2013 2013 2013
Learning Technologies
Sl.No 1. Project Title Deploying a Wearable Computing Platform for
15
Year 2013
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Computing Education 2. 3. 4. 5. Mobile Learning in School Contexts: Can Teachers Alone Make It Happen? To Flow and Not to Freeze: Applying Flow Experience to Mobile Learning An Enhanced Ant Colony Optimization Applied to Capacitated Vehicle Routing Problem Information System Of Relay Protection For Fault Record Analysis 2013 2013 2013/.NET 2013/JAVA
16
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Sl.N o 1.
Project Title Network Coding-Based Protection of Many-to-One Wireless Flows Increasing Packet Delivery in Ad Hoc On-Demand Distance Vector Routing Protocol Coding Documents using Alternative Techniques Investigating Accuracies of Rule Evaluation Models on Randomized Labeling Protection of Database Security via Collaborative Inference Detection Applying Data Mining in Prediction and Classification of Urban Traffic A text clustering framework for information retrieval
17
Year 2013/.NET
2.
2013/JAVA
3. 4.
Cryptography Granular Computing Knowledge Discovery and Data Mining Computer Science & Information Engg. Information Assurance and
2013/.NET 2013/.NET
5.
2013/JAVA
6.
2013/JAVA
7.
2013/JAVA
www.edujobnew s.com
B.TECH PROJECTS LIST 2013
Security 8. Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontology End-to-End Service Support for Mashups Information Technology in Biomedicine Services Computing Affective Computing 2013/JAVA 9. 2013 2013
10. Affect Detection: Interdisciplinary Review of Models, Methods, and Their Applications 11. Predictive Network Anomaly Detection and Visualization 12. Providing Witness Anonymity Under Peer-toPeer Settings
2013
2013
18