BTech-MTech-2014-2015 Projects

JAVA -2014-2015

  1. Key – Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing
  2. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing
  3. A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing
  4. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
  5. Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining
  6. Supporting Privacy Protection in Personalized Web Search Data Mining
  7. Security Evaluation of Pattern Classifiers under Attack Data Mining
  8. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
  9. Efficient Authentication for Mobile and Pervasive Computing Android
  10. Friend book: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing
  11. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Wireless Sensor Networks
  12. Secure Continuous Aggregation in Wireless Sensor Networks Wireless Sensor Networks
  13. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Wireless Sensor Networks
  14. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Wireless Sensor Networks
  15. Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption Network Security
  16. Automatic Test Packet Generation Networking
  17. A System for Denial-of-Service Attack Detection Based on Multivar iate Correlation Analysis Network Security
  18. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing
  19. Trajectory Improves Data Delivery in Urban Vehicular Networks MANET, Ad Hoc Networks
  20. Click Prediction for Web Image Reranking Using Multimodal Sparse Coding Image Processing
  21. Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems Image Processing
  22. Privacy-Enhanced Web Service Composition Services Computing
  23. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact  Information Forensics and Security
  24. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme   Knowledge and Data Engineering
  25. CLOUDQUAL A Quality Model for Cloud Services Industrial Informatics                                                                    
  26. Multi-Core Embedded Wireless Sensor Networks Architecture and Applications Parallel and Distributed Systems
  27. Cross-Layer Approach for Minimizing Routing Disruption in IP Networks Parallel and Distributed Systems
  28. Multicast Capacity in MANET with Infrastructure Support Parallel and Distributed Systems
  29. Efficient Data Collection for Large-Scale Mobile Monitoring Applications Parallel and Distributed Systems
  30. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks Wireless Sensor Networks
  31. Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks  Vehicular Technology
  32. Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery Cloud Computing
  33. Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey Parallel and Distributed Systems
  34. The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
  35. Web Service Recommendation via Exploiting Location and QoS Information Parallel and Distributed Systems
  36. Congestion Aware Routing in Nonlinear Elastic Optical Networks
  37. Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs Mobile Computing
  38. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Cloud Computing
  39. Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks MANET, Ad Hoc Networks
  40. Building Confidential And Efficient Query Services In The Cloud With RASP Data Cloud Computing
  41. An Empirical Performance Evaluation of Relational Keyword Search Systems Data Mining
  42. ITA Innocuous Topology Awareness Parallel and Distributed Systems
  43. Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network. Parallel and Distributed Systems
  44. A Stochastic Model to Investigate Data Center Performance Data Cloud Computing
  45. Distributed , Concurrent , and Independent  Access to Encrypted Cloud Databases Cloud Computing
  46. Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
  47. Expressive , Efficient , and Revocable Data Access Control for Multi – Authority Cloud Storage Cloud Computing
  48. Keyword Query Routing Knowledge and Data Engineering
  49. Fast Nearest Neighbor Search with Keywords Data Mining
  50. Privacy-Preserving and Content-Protecting Location Based Queries Knowledge and Data Engineering
  51. PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks Network Security
  52. Scalable Distributed Service Integrity Attestation for Software-as-a- Service Clouds Cloud Computing
  53. The Client Assignment Problem for Continuous Distributed Computing Systems
  54. Towards Online Shortest Path Computation Knowledge and Data Engineering
  55. A Social Compute Cloud Allocating and Sharing Infrastructure Resources via Social Networks Services Computing
  56. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Parallel and Distributed Systems
  57. Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform Data Mining
  58. Data Mining with Big Data Knowledge and Data Engineering
  59. Facilitating Document Annotation Using Content and Querying Value Knowledge and Data Engineering
  60. An Incentive Framework for Cellular Traffic Offloading Mobile Computing
  61. The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
  62. Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing. Parallel and Distributed Systems
  63. A Qos-Oriented Distributed Routing Protocol For Hybrid Wireless Networks Mobile Computing
  64. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks Networking 
  65. Exploiting Service Similarity for Privacy in Location-Based Search Queries. Parallel and Distributed Systems
  66. Efficient and Privacy Aware Data Aggregation in Mobile Sensing Network Security
  67. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Mobile Computing
  68. Secure Mining of Association Rules in Horizontally Distributed Databases Data Mining
  69. Trusted DB-A trusted hardware based database with privacy and confidentiality Data Mining
  70. A Cocktail Approach for Travel Package Recommendation Knowledge and Data Engineering
  71. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining
  72. Top-k Query Result Completeness Verification in Tiered Sensor Networks Communications
  73. SOS: A Distributed Mobile Q&A System Based on Social Networks Parallel and Distributed Systems
  74. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel and Distributed Systems
  75. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems
  76. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel and Distributed Systems
  77. Performance and cost evaluation of an adaptive encryption architecture for cloud databases Cloud Computing
  78. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Parallel and Distributed Systems
  79. Preserving Location Privacy in Geo-Social Applications Mobile Computing
  80. Keylogging-resistant Visual Authentication Protocols Mobile Computing
  81. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability Mobile Computing
  82. On the Security of Trustee-Based Social Authentications Parallel & Distributed Systems
  83. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing
  84. Towards Differential Query Services in Cost-Efficient Clouds Parallel and Distributed Systems
  85. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Knowledge and Data Engineering
  86. Dealing With Concept Drifts in Process Mining Neural Networks and Learning
  87. Bandwidth Distributed Denial of Service  Attacks and Defense
  88. Behavioral Malware Detection in Delay Tolerant Networks
  89. Privacy-Preserving And Truthful Detection Of Packet Dropping Attacks
  90. Tradeoff Between Reliability And Security In Multiple Access Relay Networks
  91. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
  92. An Error Minimizing Framework for Localizing Jammers in Wireless Sensor Networks
  93. Efficient Instant-Fuzzy Search with Proximity Ranking Data Engineering
  94. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Information Forensics and Security
  95. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites Multimedia

.NET Projects 2014-2015

  1. Optimized multicast routing algorithm based on tree structure in MANETs Communications
  2. Security Analysis of Handover Key Management in 4G LTESAE Networks Mobile Computing
  3. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication Intelligent Transportation Systems
  4. Key Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage Parallel and Distributed Systems
  5. An Empirical Performance Evaluation of Relational Keyword Search Systems Knowledge and Data Engineering
  6. Supporting Privacy Protection in Personalized Web Search Knowledge and Data Engineering
  7. Building Confidential And Efficient Query Services In The Cloud With RASP Data Knowledge and Data Engineering
  8. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel and Distributed Systems
  9. An Empirical Performance Evaluation of Relational Keyword Search Techniques Knowledge and Data Engineering
  10. Autonomous Mobile Mesh Networks Mobile Computing
  11. Consistency as a Service Auditing Cloud Consistency Network and Service Management
  12. Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic Networking
  13. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Parallel and Distributed Systems
  14. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Parallel and Distributed Systems
  15. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage Theory and Implementation Parallel and Distributed Systems
  16. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage Services Computing
  17. LARS An Efficient and Scalable Location-Aware Recommender System Knowledge and Data Engineering
  18. Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs Mobile Computing
  19. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud Services Computing
  20. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Parallel and Distributed Systems
  21. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
  22. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems
  23. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Knowledge and Data Engineering
  24. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Information Forensics and Security
  25. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Parallel and Distributed Systems
  26. Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks Parallel and Distributed Systems
  27. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Mobile Computing
  28. Web Image Re-Ranking Using Query-Specific Semantic Signatures Pattern Analysis and Machine Intelligence
  29. Click Prediction for Web Image Reranking Using Multimodal Sparse Coding Image Processing
  30. Designing an Efficient Image Encryption-Then-Compression System via Prediction Information Forensics and Security
  31. Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count Approach Data Mining
  32. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining With Network Security
  33. Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads Networking
  34. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Networking
  35. A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers Cloud Computing
  36. A UCONABC Resilient Authorization Evaluation for Cloud Computing Cloud Computing
  37. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation Knowledge and Data Engineering
  38. DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks Mobile Computing
  39. Click Prediction for Web Image Reranking Using Multimodal Sparse Coding  Image Processing
  40. A Food Recognition System for Diabetic Patients Based on an Optimized Bag-of Features Model
  41. Achieving Effective Cloud Search Services
  42. An Overlay-Based Data Mining Architecture Tolerant to Physical Network Disruptions
  43. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
  44. Online Payment System using Steganography and Visual Cryptography
  45. Optimal Coordination of Mobile Sensors for Target Tracking Under Additive and Multiplicative Noises
  46. Personalized Recommendation Combining User Interest and Social Circle
  47. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
  48. Sharing Visual Secrets in Single Image Random Dot Stereograms
  49. Streaming Solutions for Fine-Grained Network Traffic Measurements and Analysis
  50. Uniform Embedding for Efficient JPEG Steganography

DATA MINING – JAVA

  1. Facilitating Document Annotation Using Content and Querying Value
  2. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups
  3. Product Aspect Ranking and Its Applications
  4. Interpreting the Public Sentiment Variations on Twitter
  5. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
  6. An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds

Data Mining – .NET

  1. A Group Incremental Approach to Feature Selection Applying Rough Set Technique
  2. Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
  3. Fast nearest Neighbor Search with Keywords
  4. Efficient Prediction of Difficult Keyword Queries over Databases
  5. Web Service Recommendation via Exploiting Location and QoS Information

NETWORKING – JAVA

  1. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
  2. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
  3. Behavioral Malware Detection in Delay Tolerant Networks

NETWORKING – .NET

  1. LocaWard: A Security and Privacy Aware Location-Based Rewarding System
  2. Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads

CLOUD COMPUTING – JAVA

  1. Modeling of Distributed File Systems for Practical Performance Analysis
  2. Secure Deduplication with Efficient and Reliable Convergent Key Management
  3. Transformation-Based Monetary Cost Optimizations for Workflows in the Cloud
  4. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
  5. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage (Cloud Java)

Cloud Computing – .NET

  1. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
  2. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

Mobile Computing – JAVA

  1. Cooperative Spectrum Sharing: A Contract-Based Approach

Dependable and Secure Computing  (Network Security) – JAVA

  1. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
  2. Bandwidth Distributed Denial of Service: Attacks and Defenses (Dependable and secure computing
  3. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities

Image Processing – JAVA

  1. Vector-Valued Image Processing by Parallel Level Sets
  2. Accelerated Learning-Based Interactive Image Segmentation Using Pairwise Constraints
  3. Large Discriminative Structured Set Prediction Modeling With Max-Margin Markov Network for Lossless Image Coding
  4. Image Reconstruction from Double Random Projection
  5. Saliency-Aware Video Compression
  6. Translation Invariant Directional Framelet Transform Combined With Gabor Filters for Image Denoising.

 

Extra Project Titles

Year

Cloud Computing

 
NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 2014
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation 2014
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2014
Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers 2014
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 2014
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage 2014
Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 2014
A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks 2014
Secure kNN Query Processing in Un trusted Cloud Environments 2014
A Mechanism Design Approach to Resource Procurement in Cloud Computing 2014
A Secure Client Side De duplication Scheme in Cloud Storage Environments 2014
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor 2014
 

Network Security

 
   
Secure Deduplication with Efficient and Reliable Convergent Key Management 2014
Building a Scalable System for Stealthy P2P-Botnet Detection 2014
Bandwidth Distributed Denial of Service: Attacks and Defenses 2014
E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 2014
 

Ad hoc Networks & VANET & MANET

 
Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2014
STARS: A Statistical Traffic Pattern Discovery System for MANETs 2014
VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014
AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment 2014
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2014
Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks 2014
Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs 2014

Mobile Computing

Video Dissemination over Hybrid Cellular and Ad Hoc Networks 2014

Wireless Sensor Networks

 
A Survey of Intrusion Detection Systems in Wireless Sensor Networks 2014
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks 2014
Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014
ALBAR Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks 2014
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. 2014
Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014
An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks 2014
Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks 2014
   

Android Projects

 
   
Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
Efficient Authentication for Mobile and Pervasive Computing 2014
Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring 2014
LocaWard A Security and Privacy Aware Location-Based Rewarding System 2014
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014
MOSES: Supporting and Enforcing Security Profiles on Smart phones 2014
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014
SOS A Distributed Mobile Q&A System Based on Social Networks 2014
A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks 2014
Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive 2014
Android College Campus 2014

Data Mining

 
   
Efficient Ranking on Entity Graphs with Personalized Relationships 2014
Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014
Efficient Instant-Fuzzy Search with Proximity Ranking 2014
Temporal Workload-Aware Replicated Partitioning for Social Networks 2014
Distributed Web Systems Performance Forecasting Using Turning Bands Method 2014
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2014
 

Networking and Wireless Communication

 
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks 2014
Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks 2014
HALO: Hop-by-Hop Adaptive Link-State Optimal Routing 2014
A Two stage Deanonymization Attack Against Anonymized Social Networks 2014
Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2014
 

Image Processing and Multimedia

 
   
Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014
Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images 2014
Multi sensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics (Dot Net) 2014
Sharing Visual Secrets in Single Image Random Dot Stereograms (Dot Net) 2014
Feature Match: A General ANNF Estimation Technique and its Applications (Dot Net) 2014
 

J2ME Mobile Based Projects

 
Adaptation of a virtual campus for mobile learning devices 2014
Bluetooth Mobile Based College Campus 2014
ECops via Handheld Mobile Devices 2014
Privacy-Conscious Location-Based Queries in Mobile Environments 2014
Ranking Model Adaptation for Domain-Specific Search 2014
SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2014
The Word in a nut shell : CONCISE RANGE QUERIES 2014

Parallel and Distributed System

LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures 2014
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014
Secure Deduplication with Efficient and Reliable Convergent Key Management 2014


Contact us
for more details about project Abstract, Rough Documentations Review PPT Presentations, Source Code, database and Executable video file.