You are on page 1of 25

IEEE / SOFTWARE

PROJECTS
In various Domains

JAVA * J2EE * J2ME


Latest Projects, 2008, 2009, 2010

Our Service Address

6/1, Selvanaayaki Complex1st Floor, Gokulae Street,


Ramnagar, Coimbatore- 641009.

Mobile: 9894604623 Phone: 0422-4377414


Mai : info@brainrichtech.com Web :
www.brainrichtech.com

We are offering IEEE & Non IEEE Projects


In various Domains including

IEEE Projects on Image Processing


IEEE Projects on Knowledge and Data Mining
IEEE Projects on Networking
IEEE Projects on Artificial Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Pattern Analysis & Machine Intelligence
IEEE Projects on Multimedia
IEEE Projects on Parallel and Distributed Systems
IEEE Projects on Mobile Computing
IEEE Projects on Software Engineering
IEEE Projects on Information Forensics and Security
IEEE Projects on Dependable and Secure Computing
IEEE Projects on Systems, Man & Cybernetics
IEEE Projects on Computers
IEEE Projects on Learning Technologies
PROJECT SUPPORTS & DELIVERABLES

 Project Abstract
 IEEE Paper
 PPT / Review Details
 Project Report
 Working Procedure/Screen Shots
 Materials & Books in CD
 Project Certification
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE DIGITAL IMAGE PROCESSING

S.NO CODE PROJECT TITLE YEAR


01 IP 01 Fast Image Recovery Using Variable Splitting 2010
and Constrained Optimization
02 IP 02 Sliding-Window Raptor Codes for Efficient 2010
Scalable Wireless Video Broadcasting with
Unequal Loss Protection
03 IP 03 Generic Lossless Visible Watermarking—A 2010
New Approach
04 IP 04 Biased Discriminant Euclidean Embedding for 2010
Content-Based Image Retrieval
05 IP 05 Data Embedding in JPEG Bit stream by Code 2010
Mapping
06 IP 06 Video Segmentation Based on Motion 2010
Coherence of Particles in a Video Sequence
07 IP 07 Adaptive Non separable Wavelet Transform via 2010
Lifting and its Application to Content-Based
Image Retrieval
08 IP 08 Multiplicative Noise Removal Using 2010
Variable Splitting and Constrained
Optimization
09 IP 09 Watermarking of Free-view Video 2010
10 IP 10 Ultrasound De speckling for Contrast 2010
Enhancement
11 IP 11 A Logarithmic Quantization Index Modulation 2010
for Perceptually Better Data Hiding
12 IP 12 Contourlet-Based Image Watermarking Using 2010
Optimum Detector in a Noisy Environment
13 IP 13 Cooperation Stimulation Strategies for Peer-to- 2010
Peer Wireless Live Video-Sharing Social
Networks
14 IP 14 A completed modeling of local binary pattern 2010
operator for texture classification
15 IP 15 Soft Edge Smoothness Prior for Color Image 2009
Super-Resolution
16 IP 16 A Shearlet Approach to Edge Analysis and 2009
Detection
17 IP 17 Complex Wavelet Structural Similarity: A New 2009
Image Similarity Index
18 IP 18 A Histogram Modification Framework and Its 2009
Application for Image Contrast Enhancement
19 IP 19 Personal Authentication Using Hand Vein 2009
Triangulation and Knuckle Shape
20 IP 20 Huber Fractal Image Compression 2009
21 IP 21 Active Mask Segmentation of Fluorescence 2009
Microscope Images
22 IP 22 Color Texture Segmentation Based on the 2009
Modal Energy of Deformable Surfaces
23 IP 23 Entropy Interpretation of the Logarithmic 2009
Image Processing Model With Application to
Contrast Enhancement
24 IP 24 A New Look to Multichannel Blind 2009
Image Deconvolution
25 IP 25 Improved Resolution Scalability for 2009
Bilevel Image Data in JPEG2000
26 IP 26 An Adaptable Image Retrieval System With 2009
Relevance Feedback Using Kernel Machines
and Selective Sampling
27 IP 27 A High-Capacity Steganography Scheme for 2009
JPEG2000 Baseline System
28 IP 28 Independent Component Analysis-Based 2008
Background Subtraction for Indoor
Surveillance
29 IP29 Sparse Representation for Color Image 2008
Restoration
30 IP30 High-Fidelity Data Embedding for Image 2008
Annotation
31 IP31 A New Look to Multi channel Blind Image De- 2008
convolution
32 IP32 Image Segmentation Using Information 2008
Bottleneck Method
33 IP33 A Fast Optimization Transfer Algorithm for 2008
Image In painting in Wavelet Domains
34 IP34 Enhancement of Color Images by Scaling the 2008
DCT Coefficients
35 IP35 Improved Resolution Scalability for Bilevel 2008
Image Data in JPEG2000
36 IP36 A Unified Relevance Feedback Framework for 2008
Web Image Retrieval
37 IP37 Optimal Spread Spectrum Watermark 2008
Embedding via a Multi step Feasibility
Formulation
38 IP38 Watermarking of Co lour Images in the DCT 2008
Domain Using Y Channel
39 IP39 A Robust Image Encryption Scheme using 2008
State-Feedback Control
40 IP40 Color Image Retrieval Using M-Band Wavelet 2008
Transform Based Color-Texture Feature
41 IP 41 A Histogram Modification Framework and Its 2008
Application for Image Contrast Enhancement

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE KNOWLEDGE AND DATA MINING

S.NO CODE PROJECT TITLE YEAR


01 KD 01 MILD: Multiple-Instance Learning via 2010
Disambiguation
02 KD 02 LIGHT: A Query-Efficient Yet Low- 2010
Maintenance Indexing Scheme over DHTs
03 KD 03 An Up Down Directed Acyclic Graph 2010
Approach
for Sequential Pattern Mining
04 KD 04 P2P Reputation Management Using Distributed 2010
Identities and Decentralized Recommendation
Chains
05 KD 05 Efficient Algorithm for Localized Support 2010
Vector Machine
06 KD 06 Deriving Concept-Based User Profiles from 2010
Search Engine Logs
07 KD 07 An Efficient Concept-Based Mining Model for 2010
Enhancing Text Clustering
08 KD 08 Adaptive Subspace Symbolization for Content- 2010
Based Video Detection
09 KD 09 2010
Non-Negative Matrix Factorization for
Semisupervised Heterogeneous Data
Coclustering
10 KD 10 Efficient Relevance Feedback for Content- 2010
based Image Retrieval by Mining User
Navigation Patterns
11 KD 11 Adaptive Subspace Symbolization for Content- 2010
Based Video Detection
12 KD 12 Record Matching over Query Results 2010
from Multiple Web Databases
13 KD 13 2009
Modeling Image Data for Effective Indexing
and Retrieval in Large General Image
Databases
14 KD 14 Towards Suspicious Behavior Discovery in 2009
Video Surveillance System
15 KD 15 A Relation-Based Page Rank Algorithm for 2009
Semantic Web Search Engines
16 KD 16 Learning Image-Text Associations 2009
17 KD 17 A Framework for Clustering 2009
Concept-Drifting Categorical Data
18 KD 18 Communication Perspective on Automatic 2009
Text Categorization
19 KD 19 Predicting Missing Items in Shopping Carts 2009
20 KD 20 Exact Knowledge Hiding through Database 2009
Extension
21 KD 21 Fast Query Point Movement Techniques for 2009
Large CBIR Systems
22 KD 22 Evaluating the Effectiveness of Personalized 2009
Web Search
23 KD 23 Similarity-Profiled Temporal Association 2009
Mining
24 KD 24 Batch Mode Active Learning with Applications 2009
to Text Categorization and Image Retrieval
25 KD 25 Enhancing Learning Objects with an Ontology- 2009
Based Memory
26 KD 26 Using Association Rule Mining to Improve 2008
Semantic Web Services Composition
Performance
27 KD 27 Biometric Authentication for Border Control 2008
Applications
28 KD 28 Desktop search in the intranet with integrated 2008
desktop search engines
29 KD 29 A Least Grade Page Replacement Algorithm 2008
for Web Cache Optimization

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE NETWORKING

S.NO CODE PROJECT TITLE YEAR


01 NS 01 Authenticated Group Key Transfer Protocol 2010
Based on Secret Sharing
02 NS 02 S4: Small State and Small Stretch Compact 2010
Routing Protocol for Large Static Wireless
Networks
03 NS 03 Rate Control with Pair wise Intersession 2010
Network Coding
04 NS 04 Equilibrium of Heterogeneous Congestion 2010
Control: Optimality and Stability
05 NS 05 Inside the Permutation-Scanning Worms: 2010
Propagation Modeling and Analysis
06 NS 06 Joint Sink Mobility and Routing to Maximize 2010
the Lifetime of Wireless Sensor Networks: The
Case of Constrained Mobility
07 NS 07 SybilLimit: A Near-Optimal Social Network 2010
Defense Against Sybil Attacks
08 NS 08 2010
A Distributed CSMA Algorithm for
Throughput and Utility Maximization in
Wireless Networks
09 NS 09 Upgrading Mice to Elephants: Effects and End- 2010
Point Solutions
10 NS 10 Distributed Algorithms for Minimum Cost 2010
Multicast With Network Coding
11 NS 11 Delay Analysis for Wireless Networks With 2010
Single Hop Traffic and General Interference
Constraints
12 NS 12 Constrained Relay Node Placement in Wireless 2010
Sensor Networks: Formulation and
Approximations
13 NS 13 Efficient and Dynamic Routing Topology 2010
Inference From End-to-End Measurements
14 NS 14 Provably Secure Nested One-Time Secret 2010
Mechanisms for Fast Mutual Authentication and
Key Exchange in Mobile Communications
15 NS 15 Packet delay modeling of truncated multi- 2010
process arq protocols for parallel
Communications
16 NS 16 Spatio-Temporal Network Anomaly Detection 2009
by
Assessing Deviations of Empirical Measures
17 NS 17 Monitoring the Application-Layer DDoS 2009
Attacks for Popular Websites
18 NS 18 Multiple Routing Configurations for Fast 2009
IP Network Recovery
19 NS 19 Improving Locality of Bit Torrent with ISP 2009
Cooperation
20 NS 20 PRIME: Peer-to-Peer Receiver-Driven Mesh- 2009
Based Streaming
21 NS 21 A Simple and Efficient Hidden Markov Model 2009
Scheme for Host-Based Anomaly Intrusion
Detection
22 NS 22 Plexus: A Scalable Peer-to-Peer Protocol 2009
Enabling Efficient Subset Search
23 NS 23 Capturing Router Congestion and Delay 2009
24 NS 24 Node Isolation Model and Age-Based Neighbor 2009
Selection in Unstructured P2P Networks
25 NS 25 Residual-Based Estimation of Peer and Link 2009
Lifetimes in P2P Networks
26 NS 26 A Peer-to-Peer Resources Search Algorithm 2009
Based on Small-World Model
27 NS 27 Analysis of Shortest Path Routing for Large 2009
Multi-Hop Wireless Networks
28 NS 28 Multicast Capacity of Wireless Ad Hoc 2009
Networks
29 NS 29 Evaluating the Vulnerability of Network Traffic 2009
Using Joint Security and Routing Analysis
30 NS 30 Novel Approach for Computation –Efficient 2009
Rekeying for Multicast Key Distribution
31 NS 31 SIMPS: Using Sociology for Personal Mobility 2009
32 NS 32 DDoS-Shield: DDoS-Resilient Scheduling to 2009
Counter Application Layer Attacks
33 NS 33 Credit Card Fraud Detection Using Hidden 2008
Markov Model
34 NS34 Encryption Techniques for the Security of 2008
Satellite Images
35 NS35 2008
Modeling Node Capture Attacks in Wireless
Sensor Networks
36 NS36 Adaptive Data Hiding in Edge Areas of Images 2008
With Spatial LSB Domain Systems
37 NS37 The Design Trade-Offs of Bit Torrent-Like File 2008
Sharing Protocols
38 NS38 Honey pot Scheme for Distributed Denial-of- 2008
Service Attack
39 NS39 Vulnerability of Network Traffic under Node 2008
Capture Attacks using Circuit Theoretic
Analysis
40 NS40 P2P File Sharing Software in IPv4/IPv6 2008
Network
41 NS41 Design and Implementation of a SIP-based 2008
Centralized Multimedia Conferencing System
42 NS42 Design and Implementation of Distributed 2008
Firewall System for IPv6
43 NS43 A Hypothesis Testing Approach to Semi-fragile 2008
Watermark Based Authentication
44 NS44 A New RMI Framework for Outdoor Objects 2008
Recognition
45 NS45 Contributory group key exchange in the 2008
presence of malicious participants
46 NS46 Schemes for Evaluating Signal Processing 2008
Properties of Audio Watermarking
47 NS47 Double compression in JPEG images 2008
48 NS48 The Evaluation Report of SHA-256 Crypt 2008
Analysis Hash Function
49 NS49 Jig DFS: A Secure Distributed File System 2008
50 NS50 General access structures in audio cryptography 2008
51 NS51 Improving Locality of Bit Torrent with ISP 2008
Cooperation
52 NS52 Minimizing File Download Time in Stochastic 2008
Peer-to-Peer Networks
53 NS53 Triple DES Algorithm Based Image 2008
Watermarking
54 NS 54 Bidirectional Routing Abstraction for 2008
Asymmetric Mobile Ad Hoc Networks

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE MULTIMEDIA

S.NO CODE PROJECT TITLE YEAR


01 M 01 A Stochastic Approach to Image Retrieval 2010
Using Relevance Feedback and Particle Swarm
Optimization
02 M 02 An Efficient and Robust Algorithm for Shape 2010
Indexing and Retrieval
03 M 03 An Adaptive Computational Model for Salient 2010
Object Detection
04 M 04 2010
An Image-Based Approach to Video Copy
Detection With Spatio-Temporal Post-Filtering
05 M 05 A Framework of Enhancing Image 2010
Steganography With Picture Quality
Optimization and Anti-Steganalysis Based
on Simulated Annealing Algorithm
06 M 06 Image Annotation by Graph-Based Inference 2010
With Integrated Multiple/Single Instance
Representations
07 M 07 Network Awareness of P2P Live Streaming 2010
Applications: A Measurement Study
08 M 08 Fine-Granularity Transmission Distortion 2010
Modeling for Video Packet Scheduling Over
Mesh Networks
09 M 09 Investigating the Scheduling Sensitivity of P2P 2009
Video Streaming
10 M 10 Coherent Phrase Model for Efficient Image 2009
Near Duplicate Retrieval
11 M 11 Robust Scaling-Based Image Watermarking 2009
Using Maximum-Likelihood Decoder With
Optimum Strength Factor
12 M 12 LayerP2P: Using Layered Video Chunks in 2009
P2P Live Streaming
13 M 13 2008
Content-Based Image Retrieval Using Multi
resolution Color and Texture Features
14 M 14 Digital-Invisible-Ink Data Hiding Based on 2008
Spread-Spectrum and Quantization Techniques
15 M 15 Dynamic Resource Allocation for Robust 2008
Distributed Multi-Point Video Conferencing
16 M 16 Improving Robustness of Quantization-Based 2008
Image Watermarking via Adaptive Receiver
17 M 17 Locality-Awareness in BitTorrent-Like P2P 2008
Applications
18 M 18 Watermarking Method Based on Significant 2008
Difference of Wavelet Coefficient Quantization
19 M 19 Analyzing Voice Quality in Popular VoIP 2008
Applications
20 M 20 Image Retrieval With Relevance Feedback 2008
Based on Graph-Theoretic Region
Correspondence Estimation
21 M 21 Robust Audio Data Hiding Using Correlated 2008
Quantization With Histogram-Based Detector
22 M 22 Collision Attacks With Budget Constraints on 2008
Key Management Schemes for Secure
Multimedia Multicast

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE AUDIO,SPEECH & VIDEO PROCESSING

S.NO CODE PROJECT TITLE YEAR


01 AV 01 Robust Multiplicative Patchwork Method for 2009
Audio Watermarking
02 AV 02 Scalable Audio Compression at Low Bitrates 2008
03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based 2008
System for Large-Scale Conference Support
04 AV 04 Extracting Question/Answer Pairs In Multi- 2008
Party Meeting
05 AV 05 Hybrid Signal-and-Link-Parametric Speech 2008
Quality Measurement for VoIP
Communications
06 AV 06 Rate-Distortion Optimal Video Transport Over 2008
IP Allowing Packets With Bit Errors

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE ARTIFICAL INTELLIGENCE

S.NO CODE PROJECT TITLE YEAR


01 AI 01 Vehicle Number Plate Recognition Using 2008
Mathematical Morphology and Neural
Networks
02 AI 02 Vision-Based Eye Blink Monitoring System for 2008
Human-Computer Interfacing
03 AI 03 Multi-modal Interfaces for Interaction 2008
Communication between Hearing and Visually
Impaired Individuals: Problems & Issues
04 AI 04 Embedded Vehicle Control System Based on 2008
Voice Processing Technologies
05 AI 05 A Test bed for Voice-Based Robot Control 2008
06 AI 06 Human Voice Based Wheel Chair Control 2008
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE MOBILE COMPUTING

S.NO CODE PROJECT TITLE YEAR


01 MC01 Optimal Jamming Attack Strategies and 2010
Network Defense Policies in Wireless Sensor
Networks
02 MC02 MABS: Multicast Authentication Based on 2010
Batch signature
03 MC03 Handling Mobility in Wireless Sensor and 2010
Actor Networks
04 MC04 Clustering and cluster-based routing 2010
protocol for delay-tolerant mobile networks
05 MC 05 Efficient Load-Aware Routing Scheme for 2010
Wireless Mesh Networks
06 MC 06 Distributed Multilevel Hierarchic Strategy 2010
for Broadcast Collaborative Mobile
Networks
07 MC 07 A Belief Evaluation Framework in 2010
Autonomous MANETs under Noisy and
Imperfect Observation: Vulnerability Analysis
and Cooperation Enforcement
08 MC 08 Vebek: virtual energy-based encryption and 2010
keying for wireless sensor
Networks
09 MC 09 Energy-Efficient Communication Scheme for 2009
Mobile Ad Hoc Networks
10 MC 10 A Novel Scheduled Power Saving Mechanism 2009
for 802.11 Wireless LANs
11 MC 11 MDPF: Minimum Distance Packet Forwarding 2009
for Search Applications in Mobile Ad Hoc
Networks
12 MC 12 Mitigation of Control Channel Jamming under 2009
Node Capture Attacks
13 MC 13 Tabu Search Algorithm for Cluster Building 2009
in Wireless Sensor Networks
14 MC 14 An Energy Efficient Communication Scheme 2009
for Mobile AD HOC Networks
15 MC 15 Hybrid routing in clustered DTNs with message 2007
ferrying
16 MC 16 Transmission Power Control in Wireless Ad 2007
Hoc Networks

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE INFORMATION AND FORENSICS SECURITY

S.NO CODE PROJECT TITLE YEAR


01 IF 01 2010
Edge Adaptive Image Steganography Based on
LSB Matching Revisited
02 IF 02 2010
Blind Authentication: A Secure Crypto-
Biometric Verification Protocol
03 IF 03 2010
Predictive Network Anomaly Detection and
Visualization
04 IF 04 2010
Lossless Data Embedding in Electronic Inks
05 IF 05 2010
SVD-Based Universal Spatial Domain Image
Steganalysis
06 IF 06 2010
Reversible Image Watermarking Using Interpolation
Technique
07 IF 07 2009
MPSteg-Color: Data Hiding Through
Redundant Basis Decomposition
08 IF 08 Temporal Derivative-Based Spectrum and Mel- 2009
Cepstrum Audio Steganalysis
09 IF 09 Halftone Visual Cryptography Via Error 2009
Diffusion
10 IF 10 A Hypothesis Testing Approach to Semifragile 2009
Watermark-Based Authentication
11 IF 11 Unseen Visible Watermarking: A Novel 2009
Methodology for Auxiliary Information
Delivery via Visual Contents
12 IF 12 Watermarking Robustness Evaluation Based on 2009
Perceptual Quality via Genetic Algorithms
13 IF 13 Spread-Spectrum Watermarking Security 2008
14 IF 14 2009
Robust Blind Watermarking of Point-Sampled
Geometry
15 IF 15 Security of Lattice-Based Data Hiding Against 2008
the Watermarked-Only Attack
16 IF 16 Multipurpose Watermarking Based on 2008
Multiscale Curvelet Transform
17 IF 17 Cryptographic Secrecy of Steganographic 2008
Matrix Embedding
18 IF 18 Digital Video Watermarking in P-Frames With 2008
Controlled Video Bit-Rate Increase
19 IF 19 A Novel Difference Expansion Transform for 2008
Reversible Data Embedding
20 IF 20 Adaptive Data Hiding in Edge Areas of Images 2008
With Spatial LSB Domain Systems
21 IF 21 2008
Color Image Watermarking Using
Multidimensional Fourier Transforms

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE Pattern Analysis & Machine Intelligence

S.NO CODE PROJECT TITLE YEAR


01 PA 01 Using Language to Learn Structured 2010
Appearance Models for Image Annotation
02 PA 02 A Boosting Framework for Visuality- 2010
Preserving Distance Metric Learning and Its
Application to Medical Image Retrieval
03 PA 03 Accurate Image Search Using the Contextual 2010
Dissimilarity Measure
04 PA 04 Faster and Better: A Machine Learning 2010
Approach to Corner Detection
05 PA 05 In the Eye of the Beholder: A Survey of Models 2010
for Eyes and Gaze
06 PA 06 Polynomial Time Algorithms for Ratio Regions 2010
and a Variant of Normalized Cut
07 PA 07 Single-Image Super-Resolution Using Sparse 2010
Regression and Natural Image Prior
08 PA 08 Self-Similarity and Points of Interest 2010
09 PA 09 Iris Recognition: On the Segmentation of 2010
Degraded Images Acquired in the Visible
Wavelength
10 PA 10 Image Segmentation with a Unified Graphical 2010
Model
11 PA 11 2010
Auto-Context And Its Application To High-
Level Vision Tasks And 3d Brain Image
Segmentation

12 PA 12 2010
Robust 3d Face Recognition By Local Shape
Difference Boosting
13 PA 13 2010
Rotation Invariant Texture Classification
using LBP Variance (LBPV) with Global
Matching
14 PA 14 A Perceptually Inspired Variation Framework 2009
for Color Enhancement
15 PA 15 Image Transformations and Blurring 2009
16 PA 16 Robust Wavelet-Based Super-Resolution 2009
Reconstruction: Theory and Algorithm
17 PA 17 IRGS: Image Segmentation Using Edge 2009
Penalties and Region Growing
18 PA 18 Real World Image Annotation and Retrieval 2008
19 PA 19 Visual Rank: Applying Page Rank to Large- 2008
Scale Image Search
20 PA 20 Localized Content-Based Image Retrieval 2008
21 PA 21 Annotating Images by Mining Image Search 2008
Results
22 PA 22 A Discriminative Kernel-Based Approach to 2008
Rank Images from Text Queries

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE Internet Computing

S.NO CODE PROJECT TITLE YEAR


01 I 01 Learning-Based Approaches for Matching Web 2010
Data Entities
02 I 02 2010
Peer-to-Peer 3D Streaming
03 I 03 2010
Incentive Mechanisms in P2P Media
Streaming Systems

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE Parallel And Distributed Systems

S.NO CODE PROJECT TITLE YEAR


01 PD 01 An Efficient and Adaptive Decentralized File 2010
Replication Algorithm in P2P File Sharing
Systems
02 PD 02 An Analytical Approach to Optimizing Parallel 2010
Image Registration/Retrieval
03 PD 03 Improving Reliability for Application-Layer 2010
Multicast Overlays
04 PD 04 Impact of Feature Reduction on the Efficiency 2010
of Wireless Intrusion Detection Systems
05 PD 05 Snoogle: A Search Engine for Pervasive 2010
Environments
06 PD 06 A Cross-Layer Approach-Based Gnutella for 2010
Collaborative Virtual Environments over
Mobile Ad Hoc Networks
07 PD 07 Correlation-Based Traffic Analysis Attacks on 2010
Anonymity Networks
08 PD 08 A Hypergraph Approach to Linear Network 2010
Coding in Multicast Networks
09 PD 09 On the Benefits of Cooperative Proxy Caching 2010
for Peer-to-Peer Traffic
10 PD 10 SocioNet: A Social-Based Multimedia Access 2010
System for Unstructured P2P Networks
11 PD 11 Privacy in VoIP Networks: Flow Analysis 2010
Attacks and Defens
12 PD 12 Toward Systematical Data Scheduling for 2010
Layered Streaming in Peer-to-Peer Networks:
Can We Go Farther?
13 PD 13 mTreebone: A Collaborative Tree-Mesh 2010
Overlay Network for Multicast Video
Streaming
14 PD 14 Efficient Broadcasting Using Network Coding 2010
and Directional Antennas in MANETs
15 PD 15 A Distributed Protocol to Serve Dynamic Groups 2010
for Peer-to-Peer Streaming
16 PD 16 Efficient Multicast Algorithms for Multichannel 2010
Wireless Mesh Networks
17 PD 17 A Dynamic Performance-Based Flow Control 2010
Method for High-Speed Data Transfer
18 PD 18 Enforcing Minimum-Cost Multicast Routing 2009
against Selfish Information Flows
19 PD 19 PEACE: A Novel Privacy-Enhanced Yet 2010
Accountable Security Framework for
Metropolitan Wireless Mesh Networks
20 PD 20 Delay Asymptotics and Scalability for Peer-to- 2009
Peer Live Streaming
21 PD 21 Enforcing Minimum-Cost Multicast Routing 2009
against Selfish Information Flows
22 PD 22 Scalable Routing in Cyclic Mobile Networks 2009
23 PD 23 Dynamic Search Algorithm in Unstructured 2009
Peer-to-Peer Networks
24 PD 24 Movement-Assisted Connectivity Restoration in 2009
Wireless Sensor and Actor Networks
25 PD 25 A Faithful Distributed Mechanism for Sharing 2009
the Cost of Multicast Transmissions
26 PD 26 Multipath Dissemination in Regular Mesh 2009
Topologies
27 PD 27 Detecting Malicious Packet Losses 2009
28 PD 28 Diverse Firewall Design 2008
29 PD 29 Free-Riding on BitTorrent-Like Peer-to-Peer 2008
File Sharing Systems: Modeling Analysis and
Improvement
30 PD 30 Computation-Efficient Multicast Key 2008
Distribution

TECHNOLOGY : JAVA / DOT NET / MATLAB


DOMAIN : IEEE Dependable and Secure Computing

S.NO CODE PROJECT TITLE YEAR


01 DSC 01 Layered Approach Using Conditional 2010
Random Fields for Intrusion Detection
02 DSC 02 In-Depth Packet Inspection Using a 2010
Hierarchical Pattern Matching Algorithm
03 DSC 03 An Advanced Hybrid Peer-to-Peer Botnet 2010
04 DSC 04 Error Detection and Fault Tolerance in ECSM 2009
Using Input Randomization
05 DSC 05 Security Analysis of the SASI Protocol 2009
06 DSC 06 Flexible Rollback Recovery in Dynamic 2009
Heterogeneous Grid Computing
07 DSC 07 The Effectiveness of Checksums for 2009
Embedded Control Networks
TECHNOLOGY : JAVA / DOT NET / MATLAB
DOMAIN : IEEE Software Engineering

S.NO CODE PROJECT TITLE YEAR


01 SW 01 On Event-Based Middleware For Location- 2010
Aware Mobile Applications
02 SW 02 Enhanced Modeling and Solution of Layered 2009
Queuing Networks
03 SW 03 COMOM: Efficient Class Oriented 2009
Evaluation of Multiclass Performance Models
04 SW 04 An Investigation Into the Functional Form of 2009
the Size-Defect Relationship For Software
Modules
05 SW 05 Optimized Resource Allocation for Software 2009
Release Planning
06 SW 06 Automatic Extraction of Heap 2009
ReferenceProperties in Object-Oriented
Programs
07 SW 07 CHARMY: A Framework for Designing 2009
andVerifying Architectural Specifications
08 SW 08 Synthesis of Partial Behavior Models from 2009
Properties and Scenarios
09 SW 09 Identification of Move  Method Refactoring 2009
Opportunities
10 SW 10 A Hierarchical Model  for Object-Oriented 2009
Design Quality Assessment
11 SW 11 Variability and  Reproducibility in Software 2009
Engineering: A Study of Four Companies
that  Developed the same System

You might also like